Daily Check-in 02/16/2018

Friday, February 16, 2018.

13 RUSSIANS, 3 COMPANIES INDICTED BY SPECIAL COUNSELOR MUELLER

Special Counselor Robert Mueller indicted 13 Russians and 3 Russian entities for their actions in to influence the 2016 Presidential Election.

This indictment lays out the who, how, where, what, when, and why of the Russian Influence Operation.  It describes how they started this op back in 2014, which coincides with the Ukrainian Revolution.

The Russians used stolen identities to bypass security measures in PayPal, and used those accounts to pay for advertisements on Facebook and other social media sites.  They also paid for expenses for the Trump Campaign, even at low-level like parades.

Here are some excerpts from the indictments.  They can be found Here, at justice.gov.

Defendants’ operations included supporting the presidential campaign of then-candidate Donald J. Trump (“Trump Campaign”) and disparaging Hillary Clinton. Defendants made various expenditures to carry out those activities, including buying political advertisements on social media in the names of U.S. persons and entities. Defendants also staged political rallies inside the United States, and while posing as U.S. grassroots entities and U.S. persons, and without revealing their Russian identities and ORGANIZATION affiliation, solicited and compensated real U.S. persons to promote or disparage candidates. Some Defendants, posing as U.S. persons and without revealing their Russian association, communicated with unwitting individuals associated with the Trump Campaign and with other political activists to seek to coordinate political activities.

There has been a lot of talk about the Russians organizing opposing rallies, and using friendly sources in the U.S. as feet on the ground.  This confirms it.

In order to carry out their activities to interfere in U.S. political and electoral processes without detection of their Russian affiliation, Defendants conspired to obstruct the lawful functions of the United States government through fraud and deceit, including by making expenditures in connection with the 2016 U.S. presidential election without proper regulatory disclosure; failing to register as foreign agents carrying out political activities within the United States; and obtaining visas through false and fraudulent statements.

So, we have Russians giving money to the Trump Campaign, and several FARA violations as well.  Not to mention, lying on an entry visa.

Defendants and their co-conspirators used their fictitious online personas to interfere with the 2016 U.S. presidential election. They engaged in operations primarily intended to communicate derogatory information about Hillary Clinton, to denigrate other candidates such as Ted Cruz and Marco Rubio, and to support Bernie Sanders and then-candidate Donald Trump.

Yes.  Attack everyone except Trump. and Bernie.  I mentioned in Trump vs. Bernie how this was Putin’s goal for the U.S. Presidential Election.

On or about February 10, 2016, Defendants and their co-conspirators internally circulated an outline of themes for future content to be posted to ORGANIZATION-controlled social media accounts. Specialists were instructed to post content that focused on “politics in the USA” and to “use any opportunity to criticize Hillary and the rest (except Sanders and Trump–we support them).”

That quote is interesting.  That sounds like a direct quote from an internal email or some other type of surveillance.  Remember, The Dutch Had Eyes on Cozy Bear.

 From at least April 2016 through November 2016, Defendants and their co-conspirators, while concealing their Russian identities and ORGANIZATION affiliation through false personas, began to produce, purchase, and post advertisements on U.S. social media and other online sites expressly advocating for the election of then-candidate Trump or expressly opposing Clinton. Defendants and their co-conspirators did not report their expenditures to the Federal Election Commission, or register as foreign agents with the U.S. Department of Justice. The political advertisements included the following:

  • April 6, 2016 “You know, a great number of black people support us saying that #HillaryClintonlsNotMyPresident”
  • April 7, 2016 “I say no to Hillary Clinton / I say no to manipulation”
  • April 19, 2016 “JOIN our #HillaryClintonForPrison2016”
  • May 10, 2016 “Donald wants to defeat terrorism … Hillary wants to sponsor it”
  • May 19, 2016 “Vote Republican, vote Trump, and support the Second Amendment!”
  • May 24, 2016 “Hillary Clinton Doesn’t Deserve the Black Vote”
  • June 7, 2016 “Trump is our only hope for a better future!”
  • June 30, 2016 “#Never Hillary #Hillary F orPrison #Hillary4 Prison #HillaryForPrison2016 #Trump2016 #Trump #Trump4President”
  • July 20, 2016 “Ohio Wants Hillary 4 Prison”
  • August 4, 2016 “Hillary Clinton has already committed voter fraud during the Democrat Iowa Caucus.”
  • August 10, 2016 “We cannot trust Hillary to take care of our veterans!”
  • October 14, 2016 “Among all the candidates Donald Trump is the one and only who can defend the police from terrorists.”
  • October 19, 2016 “Hillary is a Satan, and her crimes and lies had proved just how evil she is.”

I have personally seen several of those ads on Facebook.  Plus, this mentions that coconspirators helped pay for these ads.  The Russians had help.

To pay for the political advertisements, Defendants and their co-conspirators established various Russian bank accounts and credit cards, often registered in the names of fictitious U.S. personas created and used by the ORGANIZATION on social media. Defendants and their coconspirators also paid for other political advertisements using PayPal accounts.

PayPal.  This is the first time I’ve talked about PayPal, but it won’t be the last.  EBay announced that they’ll be cutting ties with PayPal in 2020.  Not only that, but PayPal co-founder and Trump enabler Peter Theil is leaving Silicon Valley.

Beginning in at least 2016, Defendants and their co-conspirators used, without lawful authority, the social security numbers, home addresses, and birth dates of real U.S. persons without their knowledge or consent. Using these means of stolen identification, Defendants and their coconspirators opened accounts at a federally insured U.S. financial institution (“Bank I”)

Louise Mensch reported last may about Silicon Valley Bank, a subsidiary of Alfa Bank, being under FISA investigation.  They could have used any bank in the United States, but there’s this little thing called the Patriot Act.  Part of it requires that all new bank accounts created require proof of human beingness and a physical presence. This prevents rampant fraud and money laundering.  The Russians would need feet on the ground to pull this off, and there’s just enough here to make me think SVB was used to set up the American Accounts.

Defendants and their co-conspirators purchased credit card and bank account numbers from online sellers for the unlawful purpose of evading security measures at PayPal, which used account numbers to verify a user’s identity. Many of the bank account numbers purchased by Defendants and their co-conspirators were created using the stolen identities of real U.S. persons. After purchasing the accounts, Defendants and their co-conspirators submitted these bank account numbers to PayPal.

See “California Man” below.

On or about August 18, 2016, the real “Florida for Trump” Facebook account responded to
the false U.S. persona “Matt Skiber” account with instructions to contact a member of the Trump
Campaign (“Campaign Official l “) involved in the campaign’s Florida operations and provided Campaign Official 1’s email address at the campaign domain donaldtrump.com. On approximately the same day, Defendants and their co-conspirators used the email address of a false U.S. persona, joshmilton024@gmail.com, to send an email to Campaign Official 1 at that donaldtrump.com email account, which read in part:

“Hello [Campaign Official l], [w]e are organizing a state-wide event in Florida on August, 20 to support Mr. Trump. Let us introduce ourselves first. “Being Patriotic” is a grassroots conservative online movement trying to unite people offline. . . . [W]e gained a huge lot of followers and decided to somehow help Mr. Trump get elected. You know, simple yelling on the Internet is not enough. There should be real action. We organized rallies in New York before. Now we’re focusing on purple states such as Florida.” The email also identified thirteen “confirmed locations” in Florida for the rallies and requested the campaign provide “assistance in each location.”

Here’s more proof that the Russians were trying to coordinate their events with Trump’s campaign. The group asked Florida for Trump for help in location scouting.

On or about August 24, 2016, Defendants and their co-conspirators updated an internal ORGANIZATION list of over 100 real U.S. persons contacted through ORGANIZATION controlled false U.S. persona accounts and tracked to monitor recruitment efforts and requests. The list included contact information for the U.S. persons, a summary of their political views, and activities they had been asked to perform by Defendants and their co-conspirators.

If some random person in the Summer of 2016 reached out from Heart of Texas, Blacktivists, or one of the other groups mentioned, and asked you to recruit for their cause, congratulations.  You’ve been had by the Russians.  And, you’re probably under surveillance by the USIC as well.

 Use of U.S. Computer Infrastructure

To hide their Russian identities and ORGANIZATION affiliation, Defendants and their co- conspirators—particularly POLOZOV and the ORGANIZATION’s IT department—purchased space on computer servers located inside the United States in order to set up virtual private networks (“VPNs”). Defendants and their co-conspirators connected from Russia to the U.S.-based infrastructure by way of these VPNs and conducted activity inside the United States— including accessing online social media accounts, opening new accounts, and communicating with real U.S. persons—while masking the Russian origin and control of the activity.

Defendants and their co-conspirators also registered and controlled hundreds of web-based email accounts hosted by U.S. email providers under false names so as to appear to be U.S. persons and groups. From these accounts, Defendants and their co-conspirators registered or linked to online social media accounts in order to monitor them; posed as U.S. persons when requesting assistance from real U.S. persons; contacted media outlets in order to promote activities inside the United States; and conducted other operations, such as those set forth below.

Now we get to the IT side of things.  The Russians, with help here in the United States, purchased server space here, as well as a VPN connection that terminates in this country.  My guess is that these servers were located out west, like Arizona or California.  I’ve seen quite a few suspicious “news” sites on Facebook that Whois’ed to the same server farms out there.  They looked identical to sites from St. Petersburg, Moscow, or Crimea.  On top of this, they also used email services based in the United States to make these social media platforms.

Destruction of Evidence

In order to avoid detection and impede investigation by U.S. authorities of Defendants’ operations, Defendants and their co-conspirators deleted and destroyed data, including emails, social media accounts, and other evidence of their activities.

  1. Beginning in or around June 2014, and continuing into June 2015, public reporting began to identify operations conducted by the ORGANIZATION in the United States. In response, Defendants and their co-conspirators deleted email accounts used to conduct their operations.
  2. Beginning in or around September 2017, U.S. social media companies, starting with Facebook, publicly reported that they had identified Russian expenditures on their platforms to fund political and social advertisements. Facebook’s initial disclosure of the Russian purchases occurred on or about September 6, 2017, and included a statement that Facebook had “shared [its] findings with US authorities investigating these issues.”
  3. Media reporting on or about the same day as Facebook’s disclosure referred to Facebook working with investigators for the Special Counsel’s Office of the U.S. Department of Justice, which had been charged with investigating the Russian government’s efforts to interfere in the 2016 presidential election.
  4. Defendants and their co-conspirators thereafter destroyed evidence for the purpose of impeding the investigation. On or about September 13, 2017, KAVERZINA wrote in an email to a family member: “We had a slight crisis here at work: the FBI busted our activity (not a joke). So, I got preoccupied with covering tracks together with the colleagues.” KAVERZINA further wrote, “I created all these pictures and posts, and the Americans believed that it was written by their people.”

As soon as Facebook shared their findings on the activity came out, they were literally destroying the evidence of their activities when one of them emailed a family member saying that she was busy with that.  That also says that we somehow had eyes on them.

Daily Check-In 10/17/2017 has a write-up of the boss of the Internet Research Agency.  He’s been called “Putin’s Chef”, so the use of Concord Catering in the indictment kind of makes sense now.

These indictments are important for several reasons.

  • They establish specific crimes against the United States performed by Russian nationals.
  • This shows directly that the Russians wanted Trump to win the election.
  • It shows that Americans helped in this matter.
  • Any action taken against the Special Counselor or Rod Rosenstein will be seen as helping Russia AND Obstruction of Justice.
  • The timing comes right after the IC heads told Congress that Russia attacked us and will attack us again.
  • It gives Congress time to either put election reforms and protections in place, or show their true colors.

Are these Russians going to get extradited to the United States?  Not unless they leave Russia.  Remember a few weeks ago when a a Russian hacker was captured on vacation in Spain and sent here?  If any of them try to leave Russia, they stand a good chance of getting stopped, detained, and shipped here to face trial.

Now, the Americans that helped them are a different story.

 

“CALIFORNIA MAN” RICHARD PINEDO PLEADS GUILTY

About an hour after the indictments dropped and the Trump supporters twisted themselves into knots saying “See, no Americans were involved!”, Mueller busts out a guilty plea for Richard Pinedo.

Richard ran a company called Auction Essentials, where he would sell bank account numbers on the dark web to anyone who had the money.  He would either set up the accounts himself, or buy them from someone else.  Richard would sell these accounts, and ask no questions.

It turns out that he sold some of these bank accounts to the Russians in the indictment, and they were used to bypass the PayPal verification system.  Anyone can set up an account with them, but to have it listed in the U.S., they require it being linked to a U.S. bank account.

I’ve never liked PayPal, and never will.  It’s too easy to scam people with it by reversing charges without proof, and the fraud protection sucked.  But they were the first “Internet Currency”, and without them, Elon Musk wouldn’t have launched an electric car into space.

There is a Richard Pinedo, of Ventura County, California that belongs to the Ventura County Tea Party.  I do not know yet if this is the same person or not, but I would not be surprised in the slightest at this point.

 

HOW TRUMP USED INTERMEDIARIES TO PAY OFF HIS AFFAIRS

Now that I’ve spent a lot of time talking about Russia fucking America, let me talk about Trump fucking young women.  More to the point, how his friends covered it up.

Ronan Farrow of the New Yorker broke one hell of a story about a young woman in the Adult Entertainment Industry that allegedly had an affair with Donald Trump just a few months after his wife gave birth to their son Barron, and how about a decade later, this woman was paid into silence.

No, it’s not Stormy Daniels.

It’s former Playmate of the Year Karen McDougall.

Their stories are almost the exact same.  They fucked Trump, he offered to pay them, they said no, it went on for a while, then they split up.  Years later, right before the election, a surrogate for Trump offers to pay the women if they’ll keep their mouth shut.

For Karen, that surrogate is David Pecker, owner of American Media, which owns the National Enquirer.  He bought her story for $150,000, promised her a platform for articles, and a couple other things.

Instead of publishing, Pecker buried the story.

Karen told her story, even at the risk of legal action, because she doesn’t want other women to go through what she’s gone through.

If you’re wondering who Ronan Farrow is, Ask Harvey Weinstein.

 

IN OTHER NEWS…

FCC CHAIRMAN AJIT PAI UNDER INVESTIGATION FOR POSSIBLY COLLUDING WITH SINCLAIR BROADCASTING

FACEBOOK TAKES DOWN NALVANY VIDEO

SCHIFF: HOUSE INTELLIGENCE COMMITTEE HAS PROOF OF RUSSIAN COLLUSION

 

RUMOR MILL: THE MEDIA CONSPIRACY

While most of Twitter and Reddit are talking about what’s going on today, I ran across a very interesting thread by Lincoln’s Bible.  He’s the one who mentioned a few weeks back about a lot of Anti-Trump movies in the pipeline in Hollywood.  This came out earlier in the day, right after the Ronan Farrow story broke.  It answered a question I had  a while back during the election.

We know that Trump is an asshole, a misogynist and a racist.  The Billy Bush Pussygate tape showed the first two definitively, and there are strong rumors of the last from several people that worked on The Apprentice.  Among these include Tom Arnold and George Takei.  Before the election, there was a large outcry for the behind-the-scenes tapes to leak out showing Trump dropping the N-word.  But the owner of that show, Mark Burnett, refused to release anything.

Why?  Why would he not do what was being seen as a patriotic duty and release information vital to the fate of the country?

Lincoln’s Bible answered that question…they be mobbed up.

Burnett and Pecker hold power over Trump, and are both fond of Vladimir Putin.  They hold undue leverage over Trump, and others in society.  Burnett made half the country think Donald Trump was what a good boss should be, and Pecker has been running Pro-Trump or Anti-Democrat stories on his tabloid rag for about two years.

I’m not sure where this is leading, but it’ll be interesting.  Not necessarily good, but interesting.

 

That’s it for today, I think.

So, what happens now?  I don’t know.  I still haven’t heard a confirmation that Rick Gates has signed his flipping paperwork, but that’ll probably happen Tuesday when the courts open.  There’s a reason the Russian Indictments came out today.  As I said, this makes it nearly impossible to fire Robert Mueller before he lays out Obstruction of Justice charges.  The end game is not Obstruction, but it will be the low-hanging fruit that gets Trump and Pence out of office.  Once they’re out, the Mueller can go for the kill.

Corruption.  Abuse of Power.  RICO.  Human Trafficking.  Money Laundering.  Espionage.  Treason.

I don’t how fast things will go from here on out.  I think these just bought several months, but I think things will accelerate from here on out.

Why?  I don’t know, I just got a feeling that things will go on a little faster from here on out, until we get to indictments against Trump for Obstruction of Justice.

Also, I’ve learned over the past couple years to always bet on stupid when Trump is involved.  Rule 45:  Out of all possible outcomes, pick the dumbest one available.

 

Thank you, and have a good one.

 

“Without Journalists, it’s just propaganda.”

– Katy Tur

Daily Check-In 02/15/2018

Thursday, February 15.

STEVE BANNON SPOKE TO SPECIAL COUNSELOR MUELLER’S TEAM FOR 20 HOURS LAST WEEK

20 hours.  That’s 2 and a half 8 hour days.  Half a workweek.  In other words, it’s a long ass time to spend talking to an investigator.

Steve Bannon, former Trump Campaign Manager and Chief Strategist in the White House, was fired by Donald Trump back in August 2017.

Steve connects the dots between Trump, the Mercers, the Racists and Nazis, and big data firms.  I’ve talked about Steve having to sing like a bird to avoid the gallows, and it sounds like he did just that.

In contrast, he only answered a couple dozen pre-arranged questions from the House Intelligence Committee.  Not a question or comment more.  It’s almost like he knows that there’s a mole in the HIC that reports direct to Trump **cough**Nunes**cough**.

 

RICK GATES PLEA DEAL INCOMING

Last time we received reports like this, it was right before Mike Flynn pleaded guilty and turned States Evidence.

Rick Gates, Paul Manafort’s business partner and the Chief of Staff to the Trump Inaugural Committee Chairman Tom Barrack, had a Queen for a day interview.

Yes, I had to Google that, too.  And no, I don’t think he was wearing a tiara and waving at crowds of passers by.

A Queen for a day interview is also known as a Proffer Interview.  During this, the perp tells the prosecutors EVERYTHING.  They answer any question asked, and they have to be truthful.  In return, the prosecutor will not use what they found out against the perp, and the perp gets a plea deal.

Rick Gates can deliver EVERYONE connected to the money.

 

RUSSIANS USED MAINSTREAM MEDIA TO INFLUENCE ELECTION

From the “No shit, Sherlock” department…

After a study of the Russian Social Media activity, it turns out that the Russians used a lot of Main Stream Media to further their agenda.

The timing is the interesting part.

The bots and trolls would jump on a story they liked immediately.  Like, it was just published, and already trending.

It’s almost like this was coordinated.  More on that in the Rumor Mill.

 

FLORIDA SHOOTER WAS RED HAT WEARING MAGA WHITE SUPREMACIST

I refuse to speak his name.  Speaking the name of a monster gives power to the monster.

According to reports, he was expelled from school and joined a group of White Supremacists who trained him to use an AR-15 and other weapons.  He also took video of himself training wearing his MAGA Redcap.

I look forward to the time when I’m old hear tales of horror as the grandchildren of Trump Supporters find MAGA hats buried in the attic or the closet.  The Redcap will earn its place in history next to the white hood and the swastika.

 

ONE YEAR AGO: TRUMP ENDED RULE THAT COULD HAVE PREVENTED MASS SHOOTING IN FLORIDA

This whole thing could have been avoided.

 

GUN LOBBY CONTRIBUTED NEARLY $6 MILLION TO GOP IN 2016, JUST OVER $100K TO DEMOCRATS

If you’re sick and tired of “Thoughts and Prayers”, vote out the Republicans.

 

NRA, TRUMP, AND RUSSIA

Fuck the NRA.  May those traitorous shits get the fate reserved for the worst of the sinners.

 

$26 MILLION FROM INAUGURAL FUND TO MELANIA’S FRIEND

In the middle of this tragedy, the Trump Inauguration Committee released their tax forms today.  There were some pretty interesting answers to the question “Where did the money go?”

Well, looks like $26 million of that went to her friend.

One of the companies, WIS Media Partners of Marina del Rey, California, was created by a longtime friend of Mrs. Trump, Stephanie Winston Wolkoff, according to a person familiar with the firm. Records show that the firm was created in December 2016, but otherwise there is very little information available about it.

Also reaping payments for event production services was Hargrove, Inc., of Lanham, Md., a company that plans trade shows and other events, which was paid $25 million. David Monn of New York, who also is known for orchestrating society events and planned a state dinner for former President Barack Obama, was paid $3.7 million, and a company called Production Resource Group of New Windsor, N.Y., was paid $2.7 million, according to the tax return.

Other expenses for which the committee paid directly included ticketing, on which it spent $4.1 million, and promotional gifts, on which it spent $560,000.

It also spent heavily on payroll and administrative expenses, including spending $9.4 million on travel, $4.6 million on salaries and benefits for its 208 employees, $500,000 on legal fees and $237,000 on fund-raising.

Out of $107 million, nearly half of that went to two “event planners”, one of them being a company belonging to Melania’s friend that was started about a month before the inauguration.

This is a textbook case of embezzlement.

The friend, Stephanie Winston Wolkoff, was also paid $1.6 million on top of the $25 million.  She now has an unpaid position in the White House, working for the First Lady.

So, I’m going follow up on my pledge that I recently made and blame evil white women.  Let’s stop pretending that Melania is innocent in this whole ordeal.  She may not be “Traitor to the Country” evil, but is at least “Let’s take the money and run” evil.

 

TRUMP TRAVEL BAN UNCONSTITUTIONAL

I know this seems like a repeat, and it is.  Each and every travel ban, and each iteration of it has been struck down by the courts.  It might have something to do with the obvious racist overtones…

Who the fuck am I kidding?

Trump flat out called for banning all Muslims from coming into the country, and wanted to kick out the ones already here.

This time, the ban was ruled unconstitutional because of the undue burdens it put on families of immigrants from countries on the ban by preventing Aunts and Uncles from visiting or gaining legal status.

Every American is an immigrant or descendants of immigrants.  Whether it’s 1 generation, 2 generations, 10, or 10,000, we are all immigrants.

 

PRIEBUS ON CHAOS IN TRUMP WHITE HOUSE: ‘TAKE EVERYTHING YOU’VE HEARD AND MULTIPLY IT BY 50’

A new book is coming out talking about how the White House Chief of Staff shapes a presidency.  Reince Preibus was interviewed regarding his time in the clusterfuck known as the Trump Presidency.  He described it as, well, a clusterfuck.

Below is an excerpt from the book.

Priebus, who left the White House last summer, said Attorney General Jeff Sessions twice tried to resign, but he convinced Sessions otherwise, according to excerpts published by The Associated Press.

“I said, ‘You cannot resign. It’s not possible. We are going to talk about this right now,’” Priebus recalled telling Sessions.

The attorney general, who has faced periodic criticism from President Trump, later offered his resignation, but Priebus urged Trump not to accept it, the former chief of staff said.

Priebus also said he didn’t support Trump picking a fight over the crowd size at his inauguration, which was smaller than former President Obama’s. However, Priebus ultimately relented, saying it wasn’t worth “going to go to war over” with Trump

So, in some roundabout way, Preibus is the reason that Jeff Sessions is still the Attorney General.

 

STORMY WATCH: SHE HAS A DRESS

Remember Monica Lewinsky and the Blue Dress?  If you don’t recall, here’s the short version…

Monica blew Bill Clinton and he came a little on her dress.  Instead of taking it to the cleaners, she kept it.  At some point, the news came out that this dress existed.

Well, it looks like Stormy Daniels has her own…dress?

Somehow, she has proof.  I don’t want to know.

 

RUMOR MILL:  TIP OF THE ICEBERG

Circling back to the WaPo story about Russia using the MSM to push their stories, Countercheckist and Louise Mensch had some things to say about that.  I linked to the Twitter thread right above, but here’s what’s going on…

I’ve described before how Louise said that the FBI is investigating Fox News as a company and Sean Hannity individually for pushing Russian propaganda.  We’ve also seen how Julian Assange is getting information to him, and how the White House and Fox News orchestrated the Seth Rich story to distract from Robert Mueller being named the Special Counselor to investigate Russia.  There’s a litany of other on-air personalities across multiple networks and journalists across the industry that were hacked by Russians.

Whether through blackmail or coercion, these people pushed the Russian agenda, often at the insistence and timing of Russia.  They were compensated for their actions in Bitcoin. When a story favorable to the Russians would drop, they would target it with their bots and trolls to increase the noise level.

How would they get these stories to the journalists?  Two ways.

First, semi-organically through Social Media.  An anonymous post on 4Chan, 8Chan, or Reddit would get picked up by the bots on Twitter, and those bots would get enough traction so that sites like Breitbart (who has Yandex search engine optimization code on their site to the time of this post) or Daily Caller would write a story about the Twitter trend. A site on the left would write a counter piece, and eventually Fox News and MSNBC would pick up the counterpoints.

The other method was through lobbyists.  These lobbyists, like Adam Waldman, would hire journalists and outlets to hire puff pieces on behalf of their clients, like Oleg Deripaska.  These pieces would end up getting picked up by the bots, then the cycle begins anew.

I first mentioned Adam Waldman last week in Daily Check-In 02/09/2018  after his texts ended up on Fox News.  If he was the contact between Deripaska and the media, Waldman should be very careful about where he gets his dinner for the next couple months.

Because of the Bitcoin usage, there will be a lot of tax stuff and money laundering charges coming down the pipe, but that is the least of the problems these people face.

Knowingly and willingly spreading propaganda of a hostile foreign power is Espionage at the least, Treason at the worst.  Both are Capital crimes in the United States.  That means the Death Penalty is an option.

On a brighter note, the Ex-President of Guatemala was arrested.  He’s looking at corruption charges.  This is the second Head of State in the last few days to face possible charges.  Israeli Police recommend bribery charges against Benjamin Netenyahu.  Netenyahu is deeply tied to Jared Kushner’s real estate empire, and was the recipient of bribes that came from money laundered through Kushner’s real estate.

When the Heads of State start falling, some serious shit is coming down the pipeline.

 

That’s it for today.  Nothing extra witty, but I was thinking about all of the scandals that Trump faces right now, and their unprecedented breadth and speed at which they’re coming down.  At first it was just a Watergate Speed Run, but now we’ve got the Lewinsky Speed Run, the Whitewater Speed Run, the Teapot Dome Speed Run, and probably a couple others as well.  This is what happens when a career criminal gets thrust into the most scrutinized position in the world.  Every single thing he’s done will come to light, and we’ve barely seen the tip of the iceberg.

 

 

Thank you, and have a good one.

 

“Without Journalists, it’s just propaganda.”

– Katy Tur

Voter Rolls – The Easy Target

One element of the Russian Investigation that has drawn a lot of attention is what the Russians hacked and why.

We know they hacked email accounts from the Democratic National Committee, and we’ve heard reports that they hacked the Republican National Committee as well.  They were hacked for compromising information.We know that they have hacked the emails of several journalists, and  they exploited Social Engineering techniques to manipulate people on FaceBook, Twitter, YouTube, and other social media sites.  We’ve seen reports about how the state voter rolls were compromised, and how chaos was created at the polling places through DDoS’s and other methods.

But one thing we haven’t heard any reports about were the voting totals themselves. There have been rumors, reports, and analyses from the edges of the spectrum, but no reports from any official, semi-official, or under-the-table sources.

Why is that?

The fringes will say that this is because the real evidence of the scope of the corruption is being hidden and obfuscated from the public, because this would cause a complete and total collapse in the fabric of democratic society.  The official sources say that there was no evidence of vote totals being changed.  Then the fringes will say that the totals were changed without a trail, and talk about how easy it is to hack a voting machine, the official sources say that this isn’t how it works, then they start arguing with each other and calling each other names.

So, two groups people argue about whether or not the vote totals themselves were changed, while completely ignoring everything else that took place.

What do I think?

From what I’ve seen, there is not enough evidence to suggest that vote totals were changed.  Not only that, but they wouldn’t need to be changed, and the amount of effort needed to change them wouldn’t be worth the return on investment.  Instead, hacking the voter rolls would be more effective, require minimal effort, and would slide under the radar, not being detected until someone went digging.

 

THE HACKER MENTALITY

Before I go into details about how the American Voting System works, let me describe how a hacking a little bit, and what a hacker thinks.

When most people think of hackers, they think of some neckbeard sitting behind a keyboard punching out obscure code to bring down a secure server while sipping energy drinks and talking about how corruption of “The Man”.  Okay, that’s part of it, but there’s more to hacking than bad hygiene and a caffeine addiction.

Hacking is about exploring a system, finding the weakness inherit in the system. That weakness could be a code exploit, a network weakness, or a PEBKAC* weakness.  What they do with that information depends on the hacker.  Good hackers, or White Hats, will inform the system owner of the exploit and seek to get it fixed.  Evil hackers, or Black Hats, will use that information for nefarious means.  The morally ambiguous Grey Hats fall somewhere in the middle.

How do I know so much about this?  I’ve been in IT most of my life, and, when I was younger, many years ago, may or may not…

Look, I’m pretty sure EVERYTHING I might have done is beyond the Statute of Limitations, but I’m still not going to go into details.  Just in case.  Needless to say, I know the hacker mentality.

 

FINDING THE EXPLOIT

Any system designed by man or used by man can be defeated or compromised by man.  Whether it’s a security system, a computer network, or the mail server at a Fortune 500 company, anything can be broken into.

The questions that a hacker asks are “What is the end goal?”, “Is it worth the effort?”, “What’s the risk?”, and “Is there an easier way into the system?”

What is the end goal?

Most hackers go into a system with an end goal in mind.  It could be exploration, curiosity, trying to find incriminating evidence, grabbing information for personal gain, or getting access for future use.  Sometimes, it’s just to say “I did it.”

Is it worth the effort?

This part varies from hacker to hacker.  Sometimes, it’s an easy job, like a brute-force attack* to get into an email account when most of the password is known.  Other times, the hack could require months of work and weeks of meticulous planning, but the reward is amazing.

What’s the risk?

Once again, this varies from hacker to hacker, and job to job.  Getting access to a secured laptop containing a rival company’s secrets might carry some significant legal risk if caught, but is nothing compared to trying to get into the NSA’s database from the outside.  The biggest reason I greatly scaled down when I did was the penalties involved jumped up from a couple weeks in Juvi to several years in Federal prison.

Is there an easier way into the system?

This is a question that every decent hacker asks.  Is there an easier way to get what I need than what’s given.  Is there an easier way into the database than trying to hack it from an outside connection?  Can I get into the mail server from any computer in the company, or only some of them?  Could I get someone else to get me in to the building by pretending that I’m lost and on my way to an interview or presentation?

This is called finding the exploit.  Finding and researching the easiest way into the system.  IT Professionals, Disaster Recovery Specialists, Security Specialists, Mechanics, and Engineers do this all of the time.  They’ll study all of the aspects of a system, whether it’s a computer network, a data center, a shopping mall, a car, or a bridge, and look for ways to break it.  They’ll go out of their way to find new and exciting ways of destroying things, then redesign them to stand up to that weakness.

Hackers do the same thing.  They study a system, and look for the weakest part of it.  They’ll find the easiest way to do the most amount of work, or damage.  Sometimes, that easiest part is an open wireless network, or a known code exploit, or it’s person who doesn’t know how to use their computer.

 

DOING THE JOB

Now that the hacker has studied the system for an exploit, they have to find a way to pull it off.  An exploit can have multiple ways of being, well, exploited.

Let’s say that a hacker wants access to a corporate mail server so that they can read the mail of the board members, and while researching the system found that there’s a code exploit that allows for a program to sit on the server, hidden from the world, and silently forward all mail sent to selected people and groups to a dummy mailbox for future collection.  Anything that gets sent to Bill@Microsoft.com would get forwarded to some random and obscure mail account hosted in Azerbaijan.

But how does the hacker get the program on the server?

There’s a few different ways they could do this.  They could go phishing* for an employee or contractor to get them to run the program.  Similarly, they could go spear-phishing* to one of the board members directly, and get their login information so then the hacker could login as the board member and install the code themselves.  They could set the program up in some other file to run as a trojan* once it gets downloaded onto a computer.  They could execute a bit of social engineering* and get their way into the building with direct physical access to the computers.  They could set up a man-in-the-middle attack and pretend to be the help desk, after causing someone to call in a help ticket.  Or, they could brute force* their way in with Systems Administrator credentials.

How they go about doing the hack is up to their own personal interest and skills.  It only matters that it works.

 

WHAT DOES THIS HAVE TO DO WITH VOTER ROLLS?

Let’s say you’re Hacker Hackovsky, the famous Eastern European hacker, and you’ve been approached by a shady Mr. NOT-RUSSIAN speaking with a terrible American accent, to find a way to influence the American Presidential Election.  At first, you say no, but Mr. NOT-RUSSISAN drive a truckload of bitcoin up to your house, and says “We don’t need a win, we need chaos.  A win for our guy would be good, but chaos is better.”  After doing the math and realizing that this much bitcoin could be turned into real money somewhere, you accept the job.

You have a month to do research before deciding on the methods and targets.  During this month, you discover the following:

  • The American Voting System is ugly.  The voting machines change from state to state, and county by county.
  • Some machines are brand new with a paper trail, while others are more than 15 years old, and not connected to any network.
  • Vote totals are meticulously scrutinized.  A deviation of a couple votes in a polling place out of 1,000 could trigger a full-scale investigation.
  • Most towns and communities have individual polling places.
  • Several states have laws that require new voters to show ID before voting.
  • American Media is ugly, with multiple “sides” reporting the same story to the delight of their audiences.
  • The higher the population density, the more likely the populace is liberal.
  • Older white people love “our guy”, but the young and minorities don’t.
  • Social Media allows people to share ideas, regardless of the truth behind the claims.
  • There are a lot of Americans who do not use critical thinking skills, and therefore don’t ask if the person on the other side is even a person, let alone where they come from.
  • While each county has control over their individual voting machines, the states have control over the voter rolls, the list of who gets to vote where.
  • This list is stored on government databases maintained by each state.
  • While some states have caught up to modern times with security features and real-time change tracking, most of them are on old systems with no change tracking at all.
  • The couple months before the election are the busiest time for these voter rolls to be changed, and there’s little to no way to slow down access to them.
  • “Our Guy” has access to multiple national databases, including a health care company that can access all Americans based on address.  One of these databases includes all voters in America.
  • “Our Guy” also has access to a data analysis firm that can crunch all of this down to specific areas of the country to minimize the amount of work needed, allowing for microtargeting of people.
  • “Our Guy” is very divisive.  Violent extremists and racists love him.
  • “Our Guy” is running against “Her”, a woman that will make life miserable for your benefactor, should she be elected.
  • Two other minor candidates are running, and one of them, “The Other Woman”, is an asset and ally of the cause, and friendly to your benefactor.
  • “Our Guy” is a sore loser, and likely to whine about his loss for years.
  • You also have access to one of the most sophisticated propaganda machines in the world, and several friendly Americans that are willing to spread it, whether they know it or not.

Give the above, what’s the best course of action to cause chaos, and possibly get “Our Guy” elected?

Changing the vote totals at the machine level is out.  There are too many machines, and many of them require physical access.  That means having someone walk into a polling place, knowing the machine ahead of time, plug a USB drive in to the machine or connect an even older peripheral to it, and upload data to corrupt the vote totals.  All while standing in wide view of dozens of people, without drawing any attention.  Then, having to do this for multiple machines, per polling precinct, across the country.  Let’s say there’s 100,000 places to vote in the United States, and an average of 6 machines.  To affect half, this would require 300,000 people with direct access to the voting machines.  Then, those 300,000 would have to stay silent and execute the job perfectly.  Not gonna happen.

Changing the vote totals at the county or state levels are out, too.  There’s a very short window in which to operate, and these systems will be protected, monitored, checked, and double checked throughout the night.  The results have to be hand delivered to the county office under police guard, and once they’re certified, that paper trail will be used to show what it’s supposed to be.

So if you can’t change the vote totals, you can change who votes and how they vote.

How?  Alter the voter rolls, and target specific groups with the propaganda you want.

The voter rolls are different from state to state, but all have basic information like name, date of birth, address, precinct, party, and how often or last time they voted.  They likely also have a social security number, which is used as an ID number in a lot of systems, even though it shouldn’t be used that way.

What else uses SSN’s in their database?  Health care databases.  You could take data from the voter roll database, search for a matching SSN, then see if the information is up to date.  If it’s not, no need to worry, the person doesn’t live there and won’t vote.  If it does match, you could take that data, then see what their party is, how often they vote, and compare that to any active social media profiles that match, and compare that to known demographics and stats, like the likelihood that a Democrat who votes every year and follows progressive causes on FaceBook would vote for Trump.

Once this data is collected, you could determine whether propaganda or voter suppression is the best weapon for certain areas.

The propagandists can craft the messages that will get the best outcome to the right location.  You could buy advertising on Social Media to target largely white areas of Michigan, Pennsylvania, and Ohio with ads that show “Her” supporting the boogeyman of the day, whether it’s Muslims, Blacks, or Mexicans.  You could also have the propagandists craft a message showing “Her” attacking minorities and have it run in inner cities.  You could have them buy ads promoting “The Other Woman” as a protest vote, knowing that it would not affect “Our Guy.”

Meanwhile, you edit the voter rolls in states and cities where your work will have the greatest impact.  Choose states that require active checking of the voter rolls, like Texas, or have new Voter ID laws like Wisconsin or North Carolina.  Change some entries on the voter rolls, like middle initials, or street addresses, or zip codes.  Add or remove a Jr. suffix in the database.  Flip party affiliations.  Change the spelling of the last name.  Something small, innocuous, but devastating.  Remember, if the information on the ID doesn’t match what the voter rolls say it should be, they can’t vote.

One of these by themselves will create chaos, but all of it together has a small chance of electing “Our Guy”, but only if everything and everyone works.  It’s a stretch, but can be done with the resources available.  Meanwhile, changing the vote totals would require a small army and/or time travel to pull off, and if your plan requires time travel, it’s a bad plan.

 

THE HOUSE WITHOUT LOCKS

Any system made by man can be defeated by man.

When it comes to breaking into a house, or a computer, or a system, it’s not always about whether or not security is used, but whether the security is worth the hassle.

Think of a burglar looking for a house to rob.  They look at the security that each house has in place.  One has a fence, another an alarm system, another several REALLY BIG FUCKING DOGS, and another has absolutely nothing.  No deadbolt, no locks, no “Beware of Dog” sign, no alarm, no random gun crap lying around, nothing.  Each house has about the same stuff, but this one has no security.

Were the vote totals changed?  Highly unlikely.  The amount of time, effort, energy, and resources needed to pull that off would be astronomical, and would be outed faster closeted Bible-thumping politician.  The vote totals are the house with 10 locks, big dogs, and an alarm with camera controlled machine guns.

The voter rolls, on the other hand, are relatively unsecured.  They were easy to access, easy to change, and easy to manipulate.  They were the house with no locks, the windows are open, and the big screen TV is visible from the street.

So, that’s why there are no credible reports about the vote totals being hacked, but several confirmed reports of voter rolls being attacked.  Why change the vote totals themselves when suppressing those who can vote can be done for 1/100th the cost?

 

TERMINOLOGY

PEBKAC: Problem Exists Between Keyboard And Chair.  An IT acronym used to describe the location of an error.  Also called a PBKC error, it is used by IT technicians to describe a problem or issue created by a user.  If you’re IT person ever says this you, they’re a dick.

Brute Force Attack:  Repeatedly attempting to force ones way into a system, usually by attempting different passwords over and over again.  This is very effective on older systems without failed user login lockouts on a few attempts, or if most of the name and/or password are known.

Phishing:  A method of gaining access to a system by sending out bait and getting the user give over the required information, all while pretending to be a legitimate source.

Spear Phishing:  A focused phishing attack, targeting one member or small group, often including personalized information in the attack.

Trojan:  A piece of software, usually malware*, hidden in another piece of software to get it past security.

Man In The Middle:  A type of hacker attack where the user is tricked into communicating with a malicious third party, often while trying to contact a legitimate person.

Social Engineering:  The art of hacking people, businesses, and society.  Exploiting people and their weaknesses for personal benefit.  This could be done through researching the target and/or taking advantage of existing societal norms.

Malware:  Malicious Software.

Daily Check-In 02/08/2018

Thursday.

OLEG DERIPASKA TIED DIRECTLY TO RUSSIAN GOVERNMENT

A big shout out to Alexei Nalvany for getting his hands on some footage from Oleg’s yacht.

So, quick refresher:  Donald Trump brings Paul Manafort onto his campaign last year, in spite of the objections of everyone who thinks this looks shady AF.  Manafort sets up a deal with Oleg to give him information on the campaign.  Oleg is tight enough with the Russian Government that he can have one of the Deputy Prime Ministers and a close associate of Vladimir Putin, Sergei Prikhodko, on his yacht with a bunch of escorts in August 2016.  Manafort was the campaign manager from June until August, when he was “fired” after evidence of his laundering money for Former Ukrainian President and Putin Puppet Viktor Yanukovych was published by the New York Times.

I put fired in quotes because while he was no longer officially part of the campaign, rumor has it that Paul was still in communication with Trump and some other senior members.

Trump talks to Paul, Paul talks to Oleg, Oleg talks to Sergei, Sergei talks to Vladimir.

 

DOW DROPS 1000 POINTS AGAIN

There are two numbers that one should not live their life by; their weight and the Dow Jones.

After a 600 point drop on Friday, 1200 down on Monday, 500 up on Tuesday, and a semi-stable Wednesday, the Dow dropped again by over 1000 points today.

It’s so scary I heard some of the computer stock brokers reformatted themselves.

 

GEORGE W. BUSH: RUSSIA INTERFERED IN OUR ELECTION

The Former President of the United States said this.  Not just that, but one of only two living Republican Former Presidents, and the only one not having serious health problems.

This is interesting not just because W is enjoying not being the worst President of the last 30 years, but because former VP’s and Presidents have the option to receive the PDB, the Presidential Daily Briefing, the same intelligence report given to the current President every day.  They see what Trump sees, and unlike Trump, they can read.

They know what’s going on, and have known for a long time.  Something I said several months ago was that when the fecal matter strikes the mechanical air circulation device  (when the shit hits the fan), the Ex-Presidents will stand, side by side, and address the nation.  When they start speaking out against Trump and Russia, consider that the end of the act, and the beginning of the next one.

 

LARGE RUSSIAN DELEGATION AT PRAYER BREAKFAST

As I mentioned a few days ago, expect to hear more about the right wing connections among the religious groups.  One to keep an eye on is between the American Evangelicals and the Russian Orthodox Church.

 

REPUBLICANS BUILDING PHYSICAL WALL BETWEEN HOUSE INTEL STAFFERS

Aside from the fact that the Republicans are building an ACTUAL FUCKING WALL IN THE OFFICE THEIR STAFFERS SHARE, the most important piece was a quote from Congressman Tom Rooney.

Rooney said one reason for the tension is an erosion of trust, exacerbated by an ongoing ethics investigation into the “entire Republican staff,” including “the woman up front that answers the phone” for alleged leaks. He later added that the matter was being handled by the Office of Congressional Ethics.

Yes.  That’s right.  The ENTIRE staff is under investigation, and their solution isn’t to work together or instruct the staff on proper ways of handling secrets, but to build a wall to keep the Democrats from seeing what they do.

Next week they’ll set up a bathroom schedule so that D’s and R’s don’t pee together.

 

PA SUPREME COURT: EQUAL, COMPACT AND CONTIGUOUS DISTRICTS ARE A CONSTITUTIONAL REQUIREMENT

The decision from the court came down, and in doing so they defined the requirements for legislative districts.  They need to be equal, compact, and contiguous, as best as possible.  Also, special attention should be paid to existing boundaries, and townships should not be split unless absolutely necessary.

How are these currently handled?  Poorly. Hence the reason this case went all the way to the State Supreme Court.

What this also does is give other states, and possibly the Federal government, precedence and direction on how to handle these cases in the future.

The Republican Legislature has a short time to submit a redrawn map to the Governor for approval.  If neither happens, then the court will use a mathematically drawn map generated by computer algorithm.

 

OP-ED FROM HUFFPO: WHITE WOMEN WHO ENABLE TRUMP DO NOT DESERVE THE BENEFIT OF YOUR DOUBT

This is a great article that I’m glad someone else wrote, because it perfectly illustrates something that I’ve been guilty of doing.

I’m not blaming evil white women for being evil white women.  I’m blaming everyone else but the evil white women.

I’m blaming the men around them for the women’s actions.

When Ivanka pulled background moves to keep Chris Christie out of the White House, I blamed Jared Kushner.

When Kellyanne Conway repeatedly violated ethics rules and introduced the world to “Alternative Facts,” I blamed whoever wrote her notes.

When Sarah Huckabee Sanders lies to the nation repeatedly, I blamed her parents for raising her this way.

When Melania married Donald Trump for money, starting an affair with him while he was already married, I rationalized it as taking a job.

When Hope Hicks obstructed justice on Air Force One, I wondered “Surely that can’t be right…”

When Hope Hicks wrote a statement praising a wife beater, I blamed the culture she’s in.

When Hope Hicks… You know, I’m noticing a pattern here.

I have to start blaming evil women, especially the evil white women, for being evil white women.

Hope Hicks, Ivanka, Kellyanne, and Melania.  They are not innocent bystanders.  They are co-conspirators.

I will try to do my best for equal rights.  I will do my best to assign blame where it belongs, regardless of gender.  We can’t have equality until evil white women get the punishment they deserve.

 

FBI SURVEILLANCE OF CARTER PAGE MIGHT HAVE PICKED UP BANNON

Carter Page talked to Steve Bannon in January 2017, while he was under a FISA warrant. So, that means the FBI likely has notes on this conversation, if not the call itself.  Supposedly, Bannon called Page and told him to stay off of television.

Why is this coming out now?

Bannon is supposed to meet with Mueller soon, and rumor has it he flipped like a gymnast.  This could be a leak to let him know what the FBI knows about him, or it’s designed to discredit Bannon.

I wonder where this is heading.

 

SENATE JUDICIARY COMMITTEE TO RELEASE ADDITIONAL TRUMP TOWER TRANSCRIPTS

The transcripts for 6 people interviewed about the June 9 Trump Tower meeting, including Donnie Jr., should be released sometime soon.  Of course, using Senate time, sometime soon should be within a month or two.

Also, Senator Chuck Grassely couldn’t help but take a shot at Senator Diane Feinstein in his press release.

 

GOVERNMENT SHUTDOWN 2: RAND PAUL BOOGALOO

Rand Paul is a dick.  He’s also neck deep in Russian activity and connections, just like his daddy, Ron Paul.  I still enjoy Rand asking on Twitter one day “Am I under investigation?”

Yes, Rand.  Yes, you are.

 

RUMOR MILL:  THE CURIOUS CASE OF JOHN KELLY

Whatever good will John Kelly had with the Rumor Mill is quickly evaporating.

When John Kelly took over as the White House Chief of Staff, he was supposed to be the adult in the room.  A lifetime of honorable service in the Marines, an unapproachable character, and a take-no-prisoners attitude.  He was supposed to bring stability to the White House.

When he took his position, everyone in the Rumor Mill proclaimed his appointment as a defining moment.  Louise called him a White Hat.  Countercheckist was in full support.  The ex-soldiers were thrilled.

Then, we spent the next several months learning about him.  And he’s been a colossal dickbag.

He’s attacked a black House representative for defending a Gold Star widow.  He has called immigrants lazy.  He’s been a mouthpiece for racist and sexist actions coming from Trump.

And now, it turns out that he looked the other way when his friend Rob Porter couldn’t get a security clearance because he beat both of his ex-wives.

So, what happened?  Is John Kelly still a White Hat Good Guy?  Is he pretending to be a massive dickbag?  Are these his true colors?  Is he actually enabling Trump’s racism?

I’m not sure, and the opinions are still split.  Louise stands by him being a White Hat.  Claude isn’t so sure.  The ex-soldiers are ready to throw him under the bus.

Me?  I want to hold out hope, but at this point I’m not so sure anymore.  His main job is to keep Trump from starting a war and doing anything too stupid.  Everything else is secondary, but it shows the man’s character.

If it turns out that years from now, he was acting like a massive dickbag to fit in, fine.  But until then, that White Hat is a little dirty.

 

That’s it for today.  If this seems a little light on the extraneous thoughts, I have a very stupid reason.

Yesterday, I’m loading the dishwasher, and I grabbed a steak knife by the blade.  I didn’t hurt myself too much, but I did cut the tip of my finger.  Nothing bad, and I was able to work through it yesterday.  Today, I can plow through it, but it’s amazing how many typing strokes and trackpad motions are done with the pointer finger.

So that’s me, being a dumbass.

 

Thank you, and have a good one.

 

“Without Journalists, it’s just propaganda.”

– Katy Tur