Author and journalist of the latest issue of HA Goodman, "Dismantle the Russian Leakage Myth: How Democrats Drive Another Cold War to Justify the Loss of Clinton," is especially timely given the details of Hillary Clinton's involvement in the Russian-bound Uranium One scandal and the Fusion GPS file. In his latest work, Goodman manages to navigate the sometimes extraordinary level of hypocrisy in which Russian hacking claims have been investigated, based on zero evidence, and misrepresented to the public by the inheritance press.
In his new book's opening chapter, Goodman examines the lack of misleading evidence for Russian hacking claims in various reports on the issue. Goodman points out that even uncertain statements in documents do not provide evidence against Trump or Wikileaks, but are only provided on condition of strong legal rejection that increasingly questions the truth. He writes: "Even with a vague assessment in the report, DHS and other agencies feel the need to write a disclaimer that alienates them legally from the contents of the document."
Goodman writes: "The rejection of the DHS report actually states the Department of Homeland Security" does not provide any guarantees "regarding its findings and data ... DHS and other agencies refuse to guarantee their lofty claims ... No evidence of Russian hacking, Trump colludes with Russia, or WikiLeaks work with Putin, these myths were created to justify a loss of US $ 1.2 billion. "
Ray McGovern, CIA Veteran Analyst and Whistleblower
Goodman wrote that: "Ironically, Trump, a Russian myth founded on a mountain of data that denies its own narrative." Nonetheless, the press of the establishment continues to broadcast allegations of Russian hacking as if based on legitimate findings.
Goodman writes about the old fallacy of the old press from the contents of the report: "Without mentioning WikiLeaks or Julian Assange, the [Grizzly Steppe] report is still used by the media to justify WikiLeaks' false claims associated with Russian intelligence. "
In the second chapter, Goodman observes that Guccifer 2.0 persona also received very little supervision from the legacy press. This silence continues, though Guccifer 2.0 persona becomes october cited in the making of media reports about Russian hacking claims.
Goodman raises a very important question in this chapter: If Guccifer 2.0 does hack DNC, why is there little or no investigation of Guccifer 2.0 by the relevant authorities? This question reinforces the conclusion of Adam Carter, who has convincingly stated that Guccifer 2.0 persona is a creation of DNC and Crowdstrike intended to hide Wikileaks publications from leaked DNC emails - not Russian hackers.
He writes about Crowdstrike: "It's totally unbelievable that a judgment of about 1,000 words from an outside technology company that has a relationship with the Democratic Party has been given so much influence in American politics."
Goodman also pointed out that the military think tanks and British Ukrainian International Institute for Strategic Studies have claimed CrowdStrike's assessment is based on false data, "obtained ... from the internet." Goodman rightly poses a problem with the ongoing use of a corrupted report coming from a private company with financial ties with the DNC.
William Binney, Former NSA's Technical Leader for Intelligence and Reporting.
In his discussion of Guccifer 2.0, Goodman quotes the work of Adam Carter, Forensicator, and Disobedient Medium reporting their findings. He wrote: "A lot of remarkable reports on this topic provide insight into why Guccifer 2.0 is a fake entity used by DNC and possibly the CrowdStrik of watering the waters and confusing people to believe WikiLeaks is part of the Russian Trump narrative."
Goodman cites Adam Carter's indication that Guccifer 2.0 persona is likely not Russian, but deliberately created to give the impression of Russian origin: "Guccifer 2.0 never behaves or communicates like a hacker ... Adam Carter also writes that CrowdStrike executives Shawn Henry and Dmitri Alperovitch are likely to work on behalf of Clinton and DNC in their efforts to perpetuate Guccifer 2.0 operations. "
Goodman quotes the Forensicator's work and this author's report on Forensicator findings. The available analysis was eventually cited by the Veteran Veteran Professional Intelligence for Civilization (VIPS) group in their memorandum to President Trump who expressed serious concern about the legitimacy of Russian hacking allegations.
Forensicator studies show that the Guccifer 2.0 persona actor is located in the US and likely has direct access to a computer containing DNC information when a file published by Guccifer 2.0 persona is copied. This finding is separate from the subject of the origin of the Wikileaks DNC email.
Goodman added this point by discussing an article published by The Nation which included statements from VIPS members and former Director of the National Security Agency Bill Binney, who has long questioned the legitimacy of Russian hacking allegations. The article, though highly qualified later, is a breakthrough in voting legitimate concerns in the lack of evidence that the Russian DNC hack ever happened.
Former FBI Director James Comey (AP Photo / Carlos Osorio)
Goodman stated: "The whole myth of the Russian Trump myth is based on the notion that any profit that Trump obtains from voters who study Clinton's corruption is unfair, while Clinton is merely deserving of extraordinary leads in public fundraising and media collusion." Goodmanbenar points out that in addition to the lack of evidence of Russian hacking, DNC's email publication may have played less of a spectacular defeat to Trump than Comey's famous letter telling Congress about another Clinton email investigation.
Goodman observes that although Mueller is investigating Trump, there seems to be no specific charge against him, less evidence to support a certain fee. He writes: "The best Adam Schiff could come up with evidence of" fraud, "which would have put Bill and Hillary Clinton behind bars for centuries."
The level of ignorance of minds that play around in events, reports, and media coverage of Russian hacking narratives can be overwhelming. By presenting evidence that stands piece by piece, Goodman is able not only to show that there is no evidence of Russian hacking, but the alleged activity may be deliberately and recklessly designed to turn the blame of Hillary Clinton into nuclear power. His analysis is very timely, given the current furore around Clinton's involvement in Uranium One and Fusion GPS Dossier.
removed vote due to this author stealing content
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Terima kasih atas dukungan kalian dan komentar kalian..
I love you guys
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Saya sangat setuju dengan kamu
Jangan pernah takut menyebar kebenaran
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Posting yang sangat bagus dan menarik...good job
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Good post
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Removed vote because of plagiarism.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit