Daily Check-In 02/12/2018

Monday, February 12, 2018

FORMER NSA DIRECTOR SUSAN RICE EMAILED HERSELF AN ACCOUNT OF A MEETING ABOUT TRUMP AND RUSSIA

Jesus fucking tap-dancing Christ, just read this…

RiceEmail

The next paragraph was completely redacted.  The ending said that President Obama asked to be updated in the next couple weeks if there was any reason why things might change.  Comey said sure.

Let’s put this in perspective…

January 5th, 2017 was a few days after the Obama Administration dropped the sanction hammer on Russia, and instead of a response, the Russians held back.  This confused and surprised them, so they tried to find out why.  That’s when they discovered that Mike Flynn had talked to Ambassador Kysliak and told him to hold off until Trump is in office, then they’ll take care of the sanctions and make everything right.

They had evidence that there was a spy and a traitor on their way into the White House.  FBI Director James Comey would brief Trump on the Steele Dossier the very next day.  After that, he would update the group on what happened.

Fast forward to January 20th.  Trump is just sworn in, Susan Rice is out of a job as soon as she leaves the office, and her replacement Mike Flynn is busy texting about setting up deals in the Middle East.  Susan emailed herself a record of this meeting to create a paper  trail, to prevent this from being swept under the rug and forgotten.

Earlier today, Senators Chuck Grassley and Lindsay Graham sent a letter to Susan Rice, asking her why she sent this “unusual email” to herself.

 

DEVIN NUNES WORKED WITH MIKE FLYNN

If anyone’s been wondering why Devin Nunes has been so hardcore about obstructing the investigation, it’s because he’s ear-deep in criminal shit.

NunesFlynn

So, that’s where we’re at.  Devin Nunes, a senior member of the Trump Transition Team, often served as a stand-in for Mike Flynn.  Mike Flynn, who accepted a charge of lying to the FBI in a plea deal for illegal shit he did during the Transition period.

If foreign leaders wanted to talk to Flynn but couldn’t reach him, they’d contact Devin Nunes.  The odds of him not being involved in some seriously criminal shit are smaller than my chances of a threesome with Marylin Monroe and Joan of Arc.

 

JUSTICE DEPARTMENT OFFICIAL BRAND LEAVES PARTLY OVER FEAR SHE MIGHT BE ASKED OVERSEE RUSSIA PROBE

From the article…

Should Rosenstein be fired, Brand would be next in line to oversee Special Counsel Robert Mueller’s investigation into Russia’s meddling in the 2016 election, thrusting her into a political spotlight that Brand told friends she did not want to enter.

She has seen how Rosenstein has been treated, dragged through the mud, and abused over the past year.  If he’s fired, she’s next up, and doesn’t want to go through that.

So, she can either deal with a world of shit, or take a 7 figure payout from Walmart.  Hell, a greeters job might look preferable to running the investigation under Trump.

 

PENNSYLVANIA TO PUSH REPLACING OLDER VOTING MACHINES WITH ONES THAT LEAVE A PAPER TRAIL

While it’s not a full-blown order that all older voting machines must be replaced, it’s a step in the right direction.  Funds need to be approved for the budget, and at $3,000 per machine and 20,000 voting machines throughout the state, it’ll cost the state $60,000,000 to replace all of them.  Granted, not all of them need replacing, but that figure represents the largest amount it should cost to do this.

 

PRESIDENT TRUMP’S BUDGET WOULD ADD $7.2 TRILLION IN FEDERAL DEFICITS OVER 10 YEARS

Here’s the thing with Presidential Budgets, they’re a lot like Christmas Wish Lists.  They have a whole ton of crazy things like a pony, a quad, and parents who love and cherish their kid, but in reality they’ll be lucky to get a My Little Pony doll, a Hot Wheels car, and for their parents to remember their name.

This budget calls for cuts to every social program like Medicaid, SNAP, and PBS, increased spending on the Military, selling off roads and airports to raise capital, and doubling funding for Trump’s wall.

By the way, it blows up the deficit at a rate unseen since… the last Republican President.  Funny how Republicans only care about growing the deficit when it’s a Democratic President that proposes tax cuts and spending increases.

As it is, I’m highly doubtful that this will ever see the light of day. Why? To get this through both the House and Senate, it needs to have enough support to get a majority and a cloture majority, respectively.

Getting through the House is possible without any Democrats joining, but will require getting the Freedom Caucus on board.  They are the most obnoxious, odious, and offensive gaggle of Tea Partiers that have ever existed.  Two things they hate are helping poor people in any way shape and form, and increasing the deficit.  They might hate the poor more than they hate debt.

As far as the Senate goes, it will require at least 9 Democrats to pass, if not more.  While there are 5 Democratic Senators running for re-election in solid Red states, that still leaves at least 4 needed.  None of them will vote to cut Medicaid or PBS, or allocate $7.5 Billion for the wall.

There will have to be a compromise between the two houses of Congress, and agreement on what that will contain.

That said, join the fight at Protect My Public Media.  https://protectmypublicmedia.org

 

RUMOR MILL: NOT ALL RESISTORS ARE REAL, INFRASTRUCTURE WEEK, AND DONNIE JR’S WIFE GETS POWDERED

There were a couple stories from Twitter the last few days that were of interest.

First, more members of the Resistance are catching on to the fact that they’re being infiltrated by bots and trolls.  Hell, even I have gotten a few bots following me.  It’s good to see that others are catching on, and realizing that this is a setup for a future battle.  When the fecal matter strikes the mechanical air circulation device, expect these bots to go on the attack.  They will swarm and report the voices of the Resistance en masse.  That’s part of the reason why I do this blog.  When things go sideways, I have a record.

Also, once again it’s Infrastructure Week.  At least, that’s how it starts.  The last few times we saw this, gigantic developments in the Russian story occurred.  If the trend continues, expect something big, like finding out that Obama told the FBI Director that everything must be done “by the book.”  Oh, wait…

Finally, there was a story earlier today about Donnie Jr.’s wife getting rushed to the hospital after opening an envelope filled with a white powder.  Immediately after, Julian Assange claims the same thing happened to him last week from an envelope with an American stamp.  A few things don’t make sense with this story.  Donnie Jr. and his wife are both under United States Secret Service (USSS) protection.  Part of their standard operating procedure is to check incoming mail and packages for threats, weapons, and chemicals.  So, either this fell through the cracks, the USSS isn’t doing their job, or it’s a hoax/false flag.  As soon as J-Ass opened his mouth, I’m convinced it’s a false flag.  Expect to see a Twitter rant about this shit in the morning from the Dotard.

 

That’s it for today.  I’ve done quite a bit today on this blog, but there’s always more to do.  That’s one of the things I like and don’t like.  I can always find a new story idea.  I’m not sure what the new next one is, but I’ve wanted to write about Mueller’s Gameplan.  I think I can see where this is going, but there’s still quite a lot of unknowns involved.  Also, I’d like to expand on my alternate universe war gaming.

 

Thank you, and have a good one.

“Without Journalists, it’s just propaganda.”

– Katy Tur

Voter Rolls – The Easy Target

One element of the Russian Investigation that has drawn a lot of attention is what the Russians hacked and why.

We know they hacked email accounts from the Democratic National Committee, and we’ve heard reports that they hacked the Republican National Committee as well.  They were hacked for compromising information.We know that they have hacked the emails of several journalists, and  they exploited Social Engineering techniques to manipulate people on FaceBook, Twitter, YouTube, and other social media sites.  We’ve seen reports about how the state voter rolls were compromised, and how chaos was created at the polling places through DDoS’s and other methods.

But one thing we haven’t heard any reports about were the voting totals themselves. There have been rumors, reports, and analyses from the edges of the spectrum, but no reports from any official, semi-official, or under-the-table sources.

Why is that?

The fringes will say that this is because the real evidence of the scope of the corruption is being hidden and obfuscated from the public, because this would cause a complete and total collapse in the fabric of democratic society.  The official sources say that there was no evidence of vote totals being changed.  Then the fringes will say that the totals were changed without a trail, and talk about how easy it is to hack a voting machine, the official sources say that this isn’t how it works, then they start arguing with each other and calling each other names.

So, two groups people argue about whether or not the vote totals themselves were changed, while completely ignoring everything else that took place.

What do I think?

From what I’ve seen, there is not enough evidence to suggest that vote totals were changed.  Not only that, but they wouldn’t need to be changed, and the amount of effort needed to change them wouldn’t be worth the return on investment.  Instead, hacking the voter rolls would be more effective, require minimal effort, and would slide under the radar, not being detected until someone went digging.

 

THE HACKER MENTALITY

Before I go into details about how the American Voting System works, let me describe how a hacking a little bit, and what a hacker thinks.

When most people think of hackers, they think of some neckbeard sitting behind a keyboard punching out obscure code to bring down a secure server while sipping energy drinks and talking about how corruption of “The Man”.  Okay, that’s part of it, but there’s more to hacking than bad hygiene and a caffeine addiction.

Hacking is about exploring a system, finding the weakness inherit in the system. That weakness could be a code exploit, a network weakness, or a PEBKAC* weakness.  What they do with that information depends on the hacker.  Good hackers, or White Hats, will inform the system owner of the exploit and seek to get it fixed.  Evil hackers, or Black Hats, will use that information for nefarious means.  The morally ambiguous Grey Hats fall somewhere in the middle.

How do I know so much about this?  I’ve been in IT most of my life, and, when I was younger, many years ago, may or may not…

Look, I’m pretty sure EVERYTHING I might have done is beyond the Statute of Limitations, but I’m still not going to go into details.  Just in case.  Needless to say, I know the hacker mentality.

 

FINDING THE EXPLOIT

Any system designed by man or used by man can be defeated or compromised by man.  Whether it’s a security system, a computer network, or the mail server at a Fortune 500 company, anything can be broken into.

The questions that a hacker asks are “What is the end goal?”, “Is it worth the effort?”, “What’s the risk?”, and “Is there an easier way into the system?”

What is the end goal?

Most hackers go into a system with an end goal in mind.  It could be exploration, curiosity, trying to find incriminating evidence, grabbing information for personal gain, or getting access for future use.  Sometimes, it’s just to say “I did it.”

Is it worth the effort?

This part varies from hacker to hacker.  Sometimes, it’s an easy job, like a brute-force attack* to get into an email account when most of the password is known.  Other times, the hack could require months of work and weeks of meticulous planning, but the reward is amazing.

What’s the risk?

Once again, this varies from hacker to hacker, and job to job.  Getting access to a secured laptop containing a rival company’s secrets might carry some significant legal risk if caught, but is nothing compared to trying to get into the NSA’s database from the outside.  The biggest reason I greatly scaled down when I did was the penalties involved jumped up from a couple weeks in Juvi to several years in Federal prison.

Is there an easier way into the system?

This is a question that every decent hacker asks.  Is there an easier way to get what I need than what’s given.  Is there an easier way into the database than trying to hack it from an outside connection?  Can I get into the mail server from any computer in the company, or only some of them?  Could I get someone else to get me in to the building by pretending that I’m lost and on my way to an interview or presentation?

This is called finding the exploit.  Finding and researching the easiest way into the system.  IT Professionals, Disaster Recovery Specialists, Security Specialists, Mechanics, and Engineers do this all of the time.  They’ll study all of the aspects of a system, whether it’s a computer network, a data center, a shopping mall, a car, or a bridge, and look for ways to break it.  They’ll go out of their way to find new and exciting ways of destroying things, then redesign them to stand up to that weakness.

Hackers do the same thing.  They study a system, and look for the weakest part of it.  They’ll find the easiest way to do the most amount of work, or damage.  Sometimes, that easiest part is an open wireless network, or a known code exploit, or it’s person who doesn’t know how to use their computer.

 

DOING THE JOB

Now that the hacker has studied the system for an exploit, they have to find a way to pull it off.  An exploit can have multiple ways of being, well, exploited.

Let’s say that a hacker wants access to a corporate mail server so that they can read the mail of the board members, and while researching the system found that there’s a code exploit that allows for a program to sit on the server, hidden from the world, and silently forward all mail sent to selected people and groups to a dummy mailbox for future collection.  Anything that gets sent to Bill@Microsoft.com would get forwarded to some random and obscure mail account hosted in Azerbaijan.

But how does the hacker get the program on the server?

There’s a few different ways they could do this.  They could go phishing* for an employee or contractor to get them to run the program.  Similarly, they could go spear-phishing* to one of the board members directly, and get their login information so then the hacker could login as the board member and install the code themselves.  They could set the program up in some other file to run as a trojan* once it gets downloaded onto a computer.  They could execute a bit of social engineering* and get their way into the building with direct physical access to the computers.  They could set up a man-in-the-middle attack and pretend to be the help desk, after causing someone to call in a help ticket.  Or, they could brute force* their way in with Systems Administrator credentials.

How they go about doing the hack is up to their own personal interest and skills.  It only matters that it works.

 

WHAT DOES THIS HAVE TO DO WITH VOTER ROLLS?

Let’s say you’re Hacker Hackovsky, the famous Eastern European hacker, and you’ve been approached by a shady Mr. NOT-RUSSIAN speaking with a terrible American accent, to find a way to influence the American Presidential Election.  At first, you say no, but Mr. NOT-RUSSISAN drive a truckload of bitcoin up to your house, and says “We don’t need a win, we need chaos.  A win for our guy would be good, but chaos is better.”  After doing the math and realizing that this much bitcoin could be turned into real money somewhere, you accept the job.

You have a month to do research before deciding on the methods and targets.  During this month, you discover the following:

  • The American Voting System is ugly.  The voting machines change from state to state, and county by county.
  • Some machines are brand new with a paper trail, while others are more than 15 years old, and not connected to any network.
  • Vote totals are meticulously scrutinized.  A deviation of a couple votes in a polling place out of 1,000 could trigger a full-scale investigation.
  • Most towns and communities have individual polling places.
  • Several states have laws that require new voters to show ID before voting.
  • American Media is ugly, with multiple “sides” reporting the same story to the delight of their audiences.
  • The higher the population density, the more likely the populace is liberal.
  • Older white people love “our guy”, but the young and minorities don’t.
  • Social Media allows people to share ideas, regardless of the truth behind the claims.
  • There are a lot of Americans who do not use critical thinking skills, and therefore don’t ask if the person on the other side is even a person, let alone where they come from.
  • While each county has control over their individual voting machines, the states have control over the voter rolls, the list of who gets to vote where.
  • This list is stored on government databases maintained by each state.
  • While some states have caught up to modern times with security features and real-time change tracking, most of them are on old systems with no change tracking at all.
  • The couple months before the election are the busiest time for these voter rolls to be changed, and there’s little to no way to slow down access to them.
  • “Our Guy” has access to multiple national databases, including a health care company that can access all Americans based on address.  One of these databases includes all voters in America.
  • “Our Guy” also has access to a data analysis firm that can crunch all of this down to specific areas of the country to minimize the amount of work needed, allowing for microtargeting of people.
  • “Our Guy” is very divisive.  Violent extremists and racists love him.
  • “Our Guy” is running against “Her”, a woman that will make life miserable for your benefactor, should she be elected.
  • Two other minor candidates are running, and one of them, “The Other Woman”, is an asset and ally of the cause, and friendly to your benefactor.
  • “Our Guy” is a sore loser, and likely to whine about his loss for years.
  • You also have access to one of the most sophisticated propaganda machines in the world, and several friendly Americans that are willing to spread it, whether they know it or not.

Give the above, what’s the best course of action to cause chaos, and possibly get “Our Guy” elected?

Changing the vote totals at the machine level is out.  There are too many machines, and many of them require physical access.  That means having someone walk into a polling place, knowing the machine ahead of time, plug a USB drive in to the machine or connect an even older peripheral to it, and upload data to corrupt the vote totals.  All while standing in wide view of dozens of people, without drawing any attention.  Then, having to do this for multiple machines, per polling precinct, across the country.  Let’s say there’s 100,000 places to vote in the United States, and an average of 6 machines.  To affect half, this would require 300,000 people with direct access to the voting machines.  Then, those 300,000 would have to stay silent and execute the job perfectly.  Not gonna happen.

Changing the vote totals at the county or state levels are out, too.  There’s a very short window in which to operate, and these systems will be protected, monitored, checked, and double checked throughout the night.  The results have to be hand delivered to the county office under police guard, and once they’re certified, that paper trail will be used to show what it’s supposed to be.

So if you can’t change the vote totals, you can change who votes and how they vote.

How?  Alter the voter rolls, and target specific groups with the propaganda you want.

The voter rolls are different from state to state, but all have basic information like name, date of birth, address, precinct, party, and how often or last time they voted.  They likely also have a social security number, which is used as an ID number in a lot of systems, even though it shouldn’t be used that way.

What else uses SSN’s in their database?  Health care databases.  You could take data from the voter roll database, search for a matching SSN, then see if the information is up to date.  If it’s not, no need to worry, the person doesn’t live there and won’t vote.  If it does match, you could take that data, then see what their party is, how often they vote, and compare that to any active social media profiles that match, and compare that to known demographics and stats, like the likelihood that a Democrat who votes every year and follows progressive causes on FaceBook would vote for Trump.

Once this data is collected, you could determine whether propaganda or voter suppression is the best weapon for certain areas.

The propagandists can craft the messages that will get the best outcome to the right location.  You could buy advertising on Social Media to target largely white areas of Michigan, Pennsylvania, and Ohio with ads that show “Her” supporting the boogeyman of the day, whether it’s Muslims, Blacks, or Mexicans.  You could also have the propagandists craft a message showing “Her” attacking minorities and have it run in inner cities.  You could have them buy ads promoting “The Other Woman” as a protest vote, knowing that it would not affect “Our Guy.”

Meanwhile, you edit the voter rolls in states and cities where your work will have the greatest impact.  Choose states that require active checking of the voter rolls, like Texas, or have new Voter ID laws like Wisconsin or North Carolina.  Change some entries on the voter rolls, like middle initials, or street addresses, or zip codes.  Add or remove a Jr. suffix in the database.  Flip party affiliations.  Change the spelling of the last name.  Something small, innocuous, but devastating.  Remember, if the information on the ID doesn’t match what the voter rolls say it should be, they can’t vote.

One of these by themselves will create chaos, but all of it together has a small chance of electing “Our Guy”, but only if everything and everyone works.  It’s a stretch, but can be done with the resources available.  Meanwhile, changing the vote totals would require a small army and/or time travel to pull off, and if your plan requires time travel, it’s a bad plan.

 

THE HOUSE WITHOUT LOCKS

Any system made by man can be defeated by man.

When it comes to breaking into a house, or a computer, or a system, it’s not always about whether or not security is used, but whether the security is worth the hassle.

Think of a burglar looking for a house to rob.  They look at the security that each house has in place.  One has a fence, another an alarm system, another several REALLY BIG FUCKING DOGS, and another has absolutely nothing.  No deadbolt, no locks, no “Beware of Dog” sign, no alarm, no random gun crap lying around, nothing.  Each house has about the same stuff, but this one has no security.

Were the vote totals changed?  Highly unlikely.  The amount of time, effort, energy, and resources needed to pull that off would be astronomical, and would be outed faster closeted Bible-thumping politician.  The vote totals are the house with 10 locks, big dogs, and an alarm with camera controlled machine guns.

The voter rolls, on the other hand, are relatively unsecured.  They were easy to access, easy to change, and easy to manipulate.  They were the house with no locks, the windows are open, and the big screen TV is visible from the street.

So, that’s why there are no credible reports about the vote totals being hacked, but several confirmed reports of voter rolls being attacked.  Why change the vote totals themselves when suppressing those who can vote can be done for 1/100th the cost?

 

TERMINOLOGY

PEBKAC: Problem Exists Between Keyboard And Chair.  An IT acronym used to describe the location of an error.  Also called a PBKC error, it is used by IT technicians to describe a problem or issue created by a user.  If you’re IT person ever says this you, they’re a dick.

Brute Force Attack:  Repeatedly attempting to force ones way into a system, usually by attempting different passwords over and over again.  This is very effective on older systems without failed user login lockouts on a few attempts, or if most of the name and/or password are known.

Phishing:  A method of gaining access to a system by sending out bait and getting the user give over the required information, all while pretending to be a legitimate source.

Spear Phishing:  A focused phishing attack, targeting one member or small group, often including personalized information in the attack.

Trojan:  A piece of software, usually malware*, hidden in another piece of software to get it past security.

Man In The Middle:  A type of hacker attack where the user is tricked into communicating with a malicious third party, often while trying to contact a legitimate person.

Social Engineering:  The art of hacking people, businesses, and society.  Exploiting people and their weaknesses for personal benefit.  This could be done through researching the target and/or taking advantage of existing societal norms.

Malware:  Malicious Software.

Daily Check-In 02/09/2018

Friday.  The opening night of the Olympics.  So, it’s a quiet night, right?

Hahahahahahahahahahahahahahahaha

TRUMP WILL NOT RELEASE DEMOCRAT MEMO ‘RIGHT AWAY’

Ok, raise your hands if you’re surprised by this at all?  Anyone?  Anyone?

So, it looks like Trump, for the first time in his life, is worried about secrets getting out.  Of course, when it comes to exposing his secrets, then he cares.

I’m sure this will be released right after his taxes, or Melania’s immigration paperwork, or Jared’s finalized SF-86 get released.

Of course, this isn’t over.  Not by a long shot.  Representative Adam Schiff also ran this past the DOJ and FBI to see if they had any problems with it, but they didn’t, aside from at most a couple small redactions.  The Democrats can still release the memo legally by bringing this to a vote in the House, or it could be read on the House or Senate floor.

 

ANOTHER WIFEBEATER RESIGNS FROM THE WHITE HOUSE

Less than a day after Trump praised Rob Porter, a speechwriter who allegedly beat his wife resigned today.

Hiring wife beaters, criminals, and cheats isn’t a bug, it’s a feature.

 

RACHEL BRAND, NO. 3 AT JUSTICE DEPARTMENT, TO STEP DOWN

Rachel Brand stepped down from her position as the Third in Command at the Department of Justice today.  This is still a developing story, but one rumor is that a Fortune 500 company gave her an offer that she couldn’t refuse.

Why is this important?  Because of the ever-present threat of Donald Trump trying to fire Rod Rosenstein as Deputy Attorney General.

Because Attorney General Jeff Sessions recused himself from any matters involving the campaign, which includes the Russian Investigation, Jeff can’t do anything to remove Robert Mueller or stop his team.  If Rod Rosenstein is fired, then oversight of the investigation would fall to the Associate Attorney General, Rachel Brand.

But she just quit, so who’s next?  Well, that’s where things get interesting.

According to Executive Order 13787, the next in line is the United States Attorney for the Eastern District of Virginia (EDVA).  Up until October, that attorney was Dana Boente, but he was fired by Jeff Sessions the weekend before Manafort and Gates were giving a matching set of bracelets.  Currently, the Acting US Attorney in EDVA is Tracy Doherty-McCormick.  She was named the first assistant back in October 2016.

Fun Fact.  EO 13787 revoked EO 13775 by changing the order of succession to the following:

(a) United States Attorney for the Eastern District of Virginia;

(b) United States Attorney for the Eastern District of North Carolina; and

(c) United States Attorney for the Northern District of Texas.

13775 had the following:

(a) United States Attorney for the Eastern District of Virginia;

(b) United States Attorney for the Northern District of Illinois; and

(c) United States Attorney for the Western District of Missouri.

But 13775 revoked EO 13672 signed by President Obama a week before he left office.  In that order, Obama changed the succession chain to the following:

(a) United States Attorney for the District of Columbia;

(b) United States Attorney for the Northern District of Illinois; and

(c) United States Attorney for the Central District of California.

Notice how he took EDVA out of the list?  Obama purposefully removed Dana Boente from the succession list.  At the time, people assumed that Boente must have done something wrong to piss off Obama.  When Trump signed this on February 9, 2017, this was seen as nothing more than a ‘fuck you’ to Obama.  Instead, Obama gave Trump a poison pill to swallow.

EDVA was already working with the FBI on the Russian Investigation in February.  Boente briefed Rosenstein on Trump and Russia.

By the time Sessions fired Boente, the first series of indictments were being delivered.  Dana Boente is now the FBI General Counsel.  Trump and Sessions can’t touch him now.

Obama played Trump like a fiddle.  He told him to not hire Mike Flynn, and he put this poison pill EO out there, knowing that Trump just couldn’t help himself in undoing what Obama did.

 

DUMBED DOWN BRIEFINGS STILL TOO HARD FOR TRUMP TO READ

Trump, by all standards, is functionally illiterate.  Not just illiterate, but wallows in his ignorance like a pig wallows in shit.

At this point, I’m surprised he was able to give the Russians any Intel from Mossad.  Did someone give him a coloring book with Mossad’s secrets in it?

 

JOHN KELLY WANTS TO STEP DOWN

Kelly supposedly offered his resignation, but it was refused.  As much as Trump hates people making him look bad, he hates confrontation more.

He might be wondering what he has to do to get fired.

 

SENATOR FEINSTEIN SHREDS GRASSLEY’S CRIMINAL REFERRAL OF STEELE

The short version is “I can’t say exactly why this is bullshit, but it’s bullshit on so many levels, it’s a video game of bullshit.”

 

TRANSCRIPT FROM FEBRUARY 5 HOUSE INTEL COMMITTEE MEETING SHOW NUNES IS A TOTAL DICK

If you get time, read this.  The disfunction and partisan brinksmanship is astounding.  The entire GOP delegation wants to make this an investigation into Christopher Steele, while the Democrats ask “Why won’t you approve our subpoenas for Cohen’s bank accounts or travel records?”

 

DOZENS IN WHITE HOUSE UNABLE TO GET PERMANENT SECURITY CLEARANCE

This, of course, includes Jared Kushner.

There are many things that can cause the FBI to disqualify someone from getting a security clearance, but in normal times, one or two people not being able to get a clearance after several months would be a major scandal and embarrassment.  For Trump, this is barely a blip on the radar.

 

JONATHAN WINER: HIS STORY

Winer is likely to be the target in Devin Nunes’s next memo.  Winer, a former member of the State Department, passed the Cody Shearer memo on to Christopher Steele.  What really scared Winer was that these two different people both alluded to potential corruption and blackmail connections to Trump from Russia, and they did so with independent sources.

It’s like the Intel version of the Scientific Method.  If the research can be recreated, it fucking happened.

 

TRUMP MAD AT HOPE HICKS

Meanwhile, the President has told associates he’s dismayed at how the allegations involving his former staff secretary accused of domestic abuse were handled, but he isn’t certain how to solve the mushrooming controversy, a person familiar with the conversations tells CNN. Trump was not consulted when Hicks and several other aides drafted a White House statement defending Porter, and he is under the impression that Hicks has let her romantic relationship with Porter cloud her judgment, a source familiar said.

 

RAND PAUL: THE ONE MAN GOVERNMENT SHUTDOWN

Rand Paul, who just voted to cut taxes by $1.5 Trillion a few weeks back, decided that he didn’t want any more government spending increases, so he started a filibuster to prevent the Senate from voting on a spending bill until after Midnight.  This caused the government to shut down for a few hours.

Remember, this guy got the fuck beat out of him by his neighbor a couple months ago.

 

RUMOR MILL:  ALEX WALDMAN

This came in from Ale, aka @aliasvaughn around 8pm EST.

Remember last week or so when Sean Hannity got locked out of Twitter, and Julian Assange DM’ed a parody account saying he had some dirt on Senator Mark Warner?  Daily Check-In 01/30/2018 has the details on that.

Well, it looks like these men aren’t too bright.  Even after getting outed, Sean ran a story on his Fox News show claiming that Mark Warner was corrupt because he was texting with a lobbyist “connected to Clinton.”  Sean had screenshots of Mark texting a man named Alex Waldman, telling him to be careful.  Sean wanted to make this into a devastating scandal.  And it would have worked too, if Marco Rubio didn’t say on Twitter that Mark Warner told the committee about this conversation months ago.

While Sean tried to make this the next biggest scandal that will take down the Russian Investigation this week, Ale caught something interesting.

The man in the texts was Alex Waldman.  And according to Ale, he works for Oleg Deripaska.

Don’t know who that is?  Neither do I.  I can’t find much on Google about this guy, except a LinkedIn profile of a man by that name who works at Highline Capital Management in New York, and formerly for Kynikos Associates.  Both of these are financial companies that do mutual funds and investment stuff…I think.

So, why is a banker in New York being told by a United States Senator on the Intelligence Committee being told to be careful?  And what was Julian Assange doing with these texts?

I don’t know who he is, but he may be in danger.

I don’t know what Ale’s working at, or what she knows, but her research is solid and her hunches are usually spot-on.

 

 

That’s it for today.  I want to put together a story or two over the weekend, but I’ll see what I can do.  Next article up in the queue is about voter rolls versus voting machines, and why one is a much easier hacking target than the other.

 

Thank you, and have a good one.

 

“Without Journalists, it’s just propaganda.”

– Katy Tur

Daily Check-In 02/08/2018

Thursday.

OLEG DERIPASKA TIED DIRECTLY TO RUSSIAN GOVERNMENT

A big shout out to Alexei Nalvany for getting his hands on some footage from Oleg’s yacht.

So, quick refresher:  Donald Trump brings Paul Manafort onto his campaign last year, in spite of the objections of everyone who thinks this looks shady AF.  Manafort sets up a deal with Oleg to give him information on the campaign.  Oleg is tight enough with the Russian Government that he can have one of the Deputy Prime Ministers and a close associate of Vladimir Putin, Sergei Prikhodko, on his yacht with a bunch of escorts in August 2016.  Manafort was the campaign manager from June until August, when he was “fired” after evidence of his laundering money for Former Ukrainian President and Putin Puppet Viktor Yanukovych was published by the New York Times.

I put fired in quotes because while he was no longer officially part of the campaign, rumor has it that Paul was still in communication with Trump and some other senior members.

Trump talks to Paul, Paul talks to Oleg, Oleg talks to Sergei, Sergei talks to Vladimir.

 

DOW DROPS 1000 POINTS AGAIN

There are two numbers that one should not live their life by; their weight and the Dow Jones.

After a 600 point drop on Friday, 1200 down on Monday, 500 up on Tuesday, and a semi-stable Wednesday, the Dow dropped again by over 1000 points today.

It’s so scary I heard some of the computer stock brokers reformatted themselves.

 

GEORGE W. BUSH: RUSSIA INTERFERED IN OUR ELECTION

The Former President of the United States said this.  Not just that, but one of only two living Republican Former Presidents, and the only one not having serious health problems.

This is interesting not just because W is enjoying not being the worst President of the last 30 years, but because former VP’s and Presidents have the option to receive the PDB, the Presidential Daily Briefing, the same intelligence report given to the current President every day.  They see what Trump sees, and unlike Trump, they can read.

They know what’s going on, and have known for a long time.  Something I said several months ago was that when the fecal matter strikes the mechanical air circulation device  (when the shit hits the fan), the Ex-Presidents will stand, side by side, and address the nation.  When they start speaking out against Trump and Russia, consider that the end of the act, and the beginning of the next one.

 

LARGE RUSSIAN DELEGATION AT PRAYER BREAKFAST

As I mentioned a few days ago, expect to hear more about the right wing connections among the religious groups.  One to keep an eye on is between the American Evangelicals and the Russian Orthodox Church.

 

REPUBLICANS BUILDING PHYSICAL WALL BETWEEN HOUSE INTEL STAFFERS

Aside from the fact that the Republicans are building an ACTUAL FUCKING WALL IN THE OFFICE THEIR STAFFERS SHARE, the most important piece was a quote from Congressman Tom Rooney.

Rooney said one reason for the tension is an erosion of trust, exacerbated by an ongoing ethics investigation into the “entire Republican staff,” including “the woman up front that answers the phone” for alleged leaks. He later added that the matter was being handled by the Office of Congressional Ethics.

Yes.  That’s right.  The ENTIRE staff is under investigation, and their solution isn’t to work together or instruct the staff on proper ways of handling secrets, but to build a wall to keep the Democrats from seeing what they do.

Next week they’ll set up a bathroom schedule so that D’s and R’s don’t pee together.

 

PA SUPREME COURT: EQUAL, COMPACT AND CONTIGUOUS DISTRICTS ARE A CONSTITUTIONAL REQUIREMENT

The decision from the court came down, and in doing so they defined the requirements for legislative districts.  They need to be equal, compact, and contiguous, as best as possible.  Also, special attention should be paid to existing boundaries, and townships should not be split unless absolutely necessary.

How are these currently handled?  Poorly. Hence the reason this case went all the way to the State Supreme Court.

What this also does is give other states, and possibly the Federal government, precedence and direction on how to handle these cases in the future.

The Republican Legislature has a short time to submit a redrawn map to the Governor for approval.  If neither happens, then the court will use a mathematically drawn map generated by computer algorithm.

 

OP-ED FROM HUFFPO: WHITE WOMEN WHO ENABLE TRUMP DO NOT DESERVE THE BENEFIT OF YOUR DOUBT

This is a great article that I’m glad someone else wrote, because it perfectly illustrates something that I’ve been guilty of doing.

I’m not blaming evil white women for being evil white women.  I’m blaming everyone else but the evil white women.

I’m blaming the men around them for the women’s actions.

When Ivanka pulled background moves to keep Chris Christie out of the White House, I blamed Jared Kushner.

When Kellyanne Conway repeatedly violated ethics rules and introduced the world to “Alternative Facts,” I blamed whoever wrote her notes.

When Sarah Huckabee Sanders lies to the nation repeatedly, I blamed her parents for raising her this way.

When Melania married Donald Trump for money, starting an affair with him while he was already married, I rationalized it as taking a job.

When Hope Hicks obstructed justice on Air Force One, I wondered “Surely that can’t be right…”

When Hope Hicks wrote a statement praising a wife beater, I blamed the culture she’s in.

When Hope Hicks… You know, I’m noticing a pattern here.

I have to start blaming evil women, especially the evil white women, for being evil white women.

Hope Hicks, Ivanka, Kellyanne, and Melania.  They are not innocent bystanders.  They are co-conspirators.

I will try to do my best for equal rights.  I will do my best to assign blame where it belongs, regardless of gender.  We can’t have equality until evil white women get the punishment they deserve.

 

FBI SURVEILLANCE OF CARTER PAGE MIGHT HAVE PICKED UP BANNON

Carter Page talked to Steve Bannon in January 2017, while he was under a FISA warrant. So, that means the FBI likely has notes on this conversation, if not the call itself.  Supposedly, Bannon called Page and told him to stay off of television.

Why is this coming out now?

Bannon is supposed to meet with Mueller soon, and rumor has it he flipped like a gymnast.  This could be a leak to let him know what the FBI knows about him, or it’s designed to discredit Bannon.

I wonder where this is heading.

 

SENATE JUDICIARY COMMITTEE TO RELEASE ADDITIONAL TRUMP TOWER TRANSCRIPTS

The transcripts for 6 people interviewed about the June 9 Trump Tower meeting, including Donnie Jr., should be released sometime soon.  Of course, using Senate time, sometime soon should be within a month or two.

Also, Senator Chuck Grassely couldn’t help but take a shot at Senator Diane Feinstein in his press release.

 

GOVERNMENT SHUTDOWN 2: RAND PAUL BOOGALOO

Rand Paul is a dick.  He’s also neck deep in Russian activity and connections, just like his daddy, Ron Paul.  I still enjoy Rand asking on Twitter one day “Am I under investigation?”

Yes, Rand.  Yes, you are.

 

RUMOR MILL:  THE CURIOUS CASE OF JOHN KELLY

Whatever good will John Kelly had with the Rumor Mill is quickly evaporating.

When John Kelly took over as the White House Chief of Staff, he was supposed to be the adult in the room.  A lifetime of honorable service in the Marines, an unapproachable character, and a take-no-prisoners attitude.  He was supposed to bring stability to the White House.

When he took his position, everyone in the Rumor Mill proclaimed his appointment as a defining moment.  Louise called him a White Hat.  Countercheckist was in full support.  The ex-soldiers were thrilled.

Then, we spent the next several months learning about him.  And he’s been a colossal dickbag.

He’s attacked a black House representative for defending a Gold Star widow.  He has called immigrants lazy.  He’s been a mouthpiece for racist and sexist actions coming from Trump.

And now, it turns out that he looked the other way when his friend Rob Porter couldn’t get a security clearance because he beat both of his ex-wives.

So, what happened?  Is John Kelly still a White Hat Good Guy?  Is he pretending to be a massive dickbag?  Are these his true colors?  Is he actually enabling Trump’s racism?

I’m not sure, and the opinions are still split.  Louise stands by him being a White Hat.  Claude isn’t so sure.  The ex-soldiers are ready to throw him under the bus.

Me?  I want to hold out hope, but at this point I’m not so sure anymore.  His main job is to keep Trump from starting a war and doing anything too stupid.  Everything else is secondary, but it shows the man’s character.

If it turns out that years from now, he was acting like a massive dickbag to fit in, fine.  But until then, that White Hat is a little dirty.

 

That’s it for today.  If this seems a little light on the extraneous thoughts, I have a very stupid reason.

Yesterday, I’m loading the dishwasher, and I grabbed a steak knife by the blade.  I didn’t hurt myself too much, but I did cut the tip of my finger.  Nothing bad, and I was able to work through it yesterday.  Today, I can plow through it, but it’s amazing how many typing strokes and trackpad motions are done with the pointer finger.

So that’s me, being a dumbass.

 

Thank you, and have a good one.

 

“Without Journalists, it’s just propaganda.”

– Katy Tur