Ewent, you stated that, "the RNC by Trump's own admission in the 2nd campaign debate, 'donated $100 million,' to his campaign." You seem to be implying that this money came from Putin/Russia. If came from the RNC (Republican National Committee), what manner of mental gymnastics (or auditory hallucination) leads you to believe that the money came from Putin/Russia. A link would also be helpful.
In what manner specifically did the Republican Party "build a wall around Trump to 'protect themselves'." That's a rather vague statement. Got a link?
Can you give specific examples of actions taken by Repubicans to "shove Russian meddling in the elections under the rug?"
You post is fuzzy and nonsensical--and fact-free.
Randy, you state that the dossier "contained info about Flynn and other Trump cronies meetings with the Russians." The notion that there is something wrong or even remotely irregular about the officials and diplomats of one government speaking with the officials and diplomats of another government is mistaken. Actually, that's their job.
Maybe you can give me some kind of explanation for this bizarre belief. Something you heard someone say several times today, perhaps?
They were discussing it on CNN today, Sharon. The dossier wasn't used to start the Russian investigation. Flynn had already caused suspicion by his contacts with Russian officials.The buffoon Trump made it serious by firing Comey.
Just why did so many of Trump's cronies and family members hide or forget about their meeting with the Russians if there was nothing there, Sharon? Make it semi believable at least!
"Just why did so many of Trump's cronies and family members hide or forget about their meeting with the Russians if there was nothing there..."
You keep saying things like this as if it means there IS something there. It doesn't - that you can't (or won't) come up with answers does not mean anything at all (except maybe that you won't make an effort to answer your own "what ifs"). What WILL mean something was there is when it is found, not when imagination (or lack thereof) tells some people that there was without ever knowing if it is true or not.
Okay Dan, you explain all the lies then! And please make it plausible if you're going to try to run interference for someone else.
Or do you simply believe they all "forgot" they met with the Russians when they filled out the forms? If so, I've got some swampland around the Okefenokee I wanta sell you.
There was nothing whatsoever that was suspicious about Flynn's contacts with Russian officials. This was normal everyday diplomacy. I already provided a link and quotes above on this, but I will repeat them.
ames Kunstler's summary of the original accusations against Mike Flynn:
"This is what it comes down to: General Mike Flynn, designated National Security Advisor, conferred with Russian Ambassador Sergey Kislyak after the 2016 election about two pressing matters: a vote in the UN orchestrated against Israel, and sanctions imposed against Russia by outgoing President Obama on December 28, two weeks before the inauguration. Both these matters could be viewed as bits of mischief designed deliberately to create foreign policy problems for the incoming administration.
"Flynn’s discussions with Ambassador Kislyak amounted to what are called 'back channel talks.' These informal, probing communications occur all the time and everywhere in American foreign policy, especially the transitional months every four or eight years when a new president comes in. They are necessarily secret because they concern issues of high sensitivity. Every incoming presidential staff in my lifetime (going back to Dwight Eisenhower) has conducted back-channel talks with foreign diplomats in order to directly assess where things stand, minus public posturing and bloviating.
"And so that is what Mike Flynn did, as incoming National Security Advisor, after an eight-year run of worsening relations with Russia under Obama that Trump publicly pledged to improve." http://kunstler.com/clusterfuck-nation/what-now-3/
You have to provide me with examples of Trump's cronies and family members "hiding or forgetting" meeting with Russians, for me to address this. Was criminal or seditious activity alleged? There's nothing suspicious or irregular about ANYONE talking to or meeting with or doing business with Russians. Or at least not unless they are engaging in criminal activity, such as accepting bribes from Russia to sell them 20% of the US's uranium or something.
So why did they all forget then, Sharon? For the 2nd time? Sessions forgot, Kushner forgot, Flynn forgot, Don Jr. forgot, Papadopoulas forgot, Roger Stone forgot,Manafort forgot, etc. etc. etc.! Geeze, amnesia abounds......
Your link to the Nation's article states, "Data-transfer speeds across networks and the Internet measured in megabits per second (or megabytes per second) can easily achieve rates that greatly exceed the cited reference in the VIPS memo of 1,976 megabytes in 87 seconds (∼22.71 megabytes per second or ∼181.7 megabits per second), and well beyond 50 megabytes, depending on the capacity of the network and the method of access to that network. Speeds across the network vary greatly, and sustained write speeds copied out to local devices are often quite a bit slower."
The Nation does not give any basis for the assertion that these high download speeds are possible--and admit that "The third-party analysis of the “Guccifer 2.0' claims (including from Adam Carter and the Forensicator) analyzed in the VIPS memo directly contradict [the hacking] conclusion."
Here's what Forensicator and other analysts have to say about that:
-----------------------------------------------------------------------------------------
23 meg data transfer, transocean does not exist of 2 gig in 87 seconds. It does not exist locally, maybe now it does in certain point to point nodes only, but not through an IP."The metadata established several facts in this regard with granular precision: On the evening of July 5, 2016, 1,976 megabytes of data were downloaded from the DNC’s server. The operation took 87 seconds. This yields a transfer rate of 22.7 megabytes per second.
On the evening of July 5, 2016, 1,976 megabytes of data were downloaded from the DNC’s server. The operation took 87 seconds. This yields a transfer rate of 22.7 megabytes per second.These statistics are matters of record and essential to disproving the hack theory. No Internet service provider, such as a hacker would have had to use in mid-2016, was capable of downloading data at this speed. Compounding this contradiction, Guccifer claimed to have run his hack from Romania, which, for numerous reasons technically called delivery overheads, would slow down the speed of a hack even further from maximum achievable speeds.What is the maximum achievable speed?
Forensicator recently ran a test download of a comparable data volume (and using a server speed not available in 2016) 40 miles from his computer via a server 20 miles away and came up with a speed of 11.8 megabytes per second—half what the DNC operation would need were it a hack.
Other investigators have built on this finding. Folden and Edward Loomis say a survey published August 3, 2016, by www.speedtest.net/reports is highly reliable and use it as their thumbnail index. It indicated that the highest average ISP speeds of first-half 2016 were achieved by Xfinity and Cox Communications. These speeds averaged 15.6 megabytes per second and 14.7 megabytes per second, respectively. Peak speeds at higher rates were recorded intermittently but still did not reach the required 22.7 megabytes per second.“A speed of 22.7 megabytes is simply unobtainable, especially if we are talking about a transoceanic data transfer,” Folden said. “Based on the data we now have, what we’ve been calling a hack is impossible.”
Last week Forensicator reported on a speed test he conducted more recently. It tightens the case considerably. “Transfer rates of 23 MB/s (Mega Bytes per second) are not just highly unlikely, but effectively impossible to accomplish when communicating over the Internet at any significant distance,” he wrote. “Further, local copy speeds are measured, demonstrating that 23 MB/s is a typical transfer rate when using a USB–2 flash device (thumb drive).
https://www.thenation.com/article/a-new … -dnc-hack/
---------------------------------------------------------------------------------------
So basically, the Nation pulled the claim that such speeds are possible out of their ass, while forensic analysts have conclusively shown that this is not true.
The Nation article you cited then goes on to make one of the more risible comments I've heard in a long time: "However, this VIPS memo could have easily raised the necessary and critical questions without resorting to law-of-physics." Geez! The NERVE of Binney, bringing the laws of physics into this discussion! He should be ashamed! He didn't have to do THAT!
The author does ask one question that seems relevant. "It’s equally plausible that the cited July 5, 2016, event was carried out on a server separate from the DNC or elsewhere, and with data previously copied, transferred, or even exfiltrated from the DNC."
William Binney, Skip Folden, Ed Loomis, Ray McGovern, and Kirk Wiebe responded to this: "Yes, the claimed “hack” could have been done on a secondary computer (not “server”), but in either case had to come originally from the DNC server. This has no effect on the transfer rate, which precluded a “hack”—a point the authors of the dissenting memo keep missing."
They further state that, "This is correct, but has no bearing on the conclusions. Direct access was required in either case, whether the alleged “hack” occurred on the DNC server or on a copy made earlier by a person with direct access."
Independent research into the metadata associated with the July 5, 2016, cyber-event that was blamed on “Russian hacking” shows that what actually took place was a copy onto an external storage device, and that the copy took place on the East Coast of the United States by someone with physical access to the DNC server or computers.
If you'll scroll down a bit in the link you provided, you can see the heading Why This Is Important, by William Binney, Skip Folden, Ed Loomis, Ray McGovern, and Kirk Wiebe, in which they respond to these and other objections to their analysis.
To be fair, still further down the page in this same article by the Nation, there is the heading, Independent Review of Reporting and Analysis on the 2016 Compromise of the DNC Computer Network.
The basic thrust of their criticism seems to be that quite a bit of critical information is missing from the metadata, and he goes on to describe some fairly convoluted ways of achieving the high speed of the download.
The answers to just about all of these questions could be obtained by an FBI examination of the DNC's server.
Unfortunately, the FBI never examined the DNC's server. This is mighty peculiar. As William Binney observes, "Most curiously, the FBI did not have access to the DNC computers to do its own forensics, even though prominent politicians were calling the alleged Russian hack “an act of war.”
Further, James Comey, testifying before the Senate Intelligence Committee, stated that, "The FBI requested direct access to the Democratic National Committee’s (DNC) hacked computer servers but was denied." The DNC told BuzzFeed in a statement published last week that the FBI never requested access to its servers after they were breached. But a senior law enforcement official disputed that characterization the following day. “The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated,” the official said.
Binney also notes that, "For more than a year, we have been pointing out that any data acquired by a hack would have had to come across the Internet. The blanket coverage of the Internet by the NSA, its UK counterpart GCHQ, and others would be able to produce copies of that data and show where the data originated and where it went. But US intelligence has produced no evidence that hacking by Russia led to it acquiring the DNC e-mails and passing them on to WikiLeaks."
In other words, the FBI should be able to produce unassailable proof in this matter, yet they have not.
More juicy--and somewhat related--IT stuff: https://www.zerohedge.com/news/2017-12- … ars-docket
by Scott Belford 7 years ago
Donald Trump, as late as January 1, 2017, has refused to acknowledge what most everybody, Democrats and Republicans (less Trump supporters) alike know to be true ... Vladimir Putin is behind the arguably successful attack on America's democracy by swaying American voters to vote for Trump rather...
by Allen Donald 5 years ago
Today in Helsinki, President Trump sided with Russian President Vladimir Putin against the U.S. Intelligence services, basically stating that he believed there wasn't any interference by Russia in the U.S. elections and believing President Putin over his own intelligence agencies.This comes after a...
by Susie Lehto 7 years ago
“The whole Russian hacking narrative is either propaganda intended to incite the American people, to anger toward Russia for some reason, or our intelligence community is so ignorant and naive that they should all be replaced.” ~ John McAfee, founder of McAfee virus protection* ...
by Scott Belford 2 days ago
The consequences of how this aggression by Putin unfolds are enormous. The worst, of course, is the possibility of nuclear war. The best (which would be negatively consequential to Putin) is that Russia has an epiphany and removes its troops from the Ukrainian border. Any move at...
by Jack Lee 6 years ago
This is a shocking relvelation, if true, undermines our whole democratic process...Why is this not headline news?
by JAKE Earthshine 5 years ago
NY Times Reports: STUNNING: Another demonstrably unprecedented and EARTH-Shaking Development *******: We don't know for sure but how many more blatant, abominable and exceedingly destructive public displays of favoring and appeasing dictator Vladimir Putin do his last few remaining followers need...
Copyright © 2024 The Arena Media Brands, LLC and respective content providers on this website. HubPages® is a registered trademark of The Arena Platform, Inc. Other product and company names shown may be trademarks of their respective owners. The Arena Media Brands, LLC and respective content providers to this website may receive compensation for some links to products and services on this website.
Copyright © 2024 Maven Media Brands, LLC and respective owners.
As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.
For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy
Show DetailsNecessary | |
---|---|
HubPages Device ID | This is used to identify particular browsers or devices when the access the service, and is used for security reasons. |
Login | This is necessary to sign in to the HubPages Service. |
Google Recaptcha | This is used to prevent bots and spam. (Privacy Policy) |
Akismet | This is used to detect comment spam. (Privacy Policy) |
HubPages Google Analytics | This is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy) |
HubPages Traffic Pixel | This is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized. |
Amazon Web Services | This is a cloud services platform that we used to host our service. (Privacy Policy) |
Cloudflare | This is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy) |
Google Hosted Libraries | Javascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy) |
Features | |
---|---|
Google Custom Search | This is feature allows you to search the site. (Privacy Policy) |
Google Maps | Some articles have Google Maps embedded in them. (Privacy Policy) |
Google Charts | This is used to display charts and graphs on articles and the author center. (Privacy Policy) |
Google AdSense Host API | This service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy) |
Google YouTube | Some articles have YouTube videos embedded in them. (Privacy Policy) |
Vimeo | Some articles have Vimeo videos embedded in them. (Privacy Policy) |
Paypal | This is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy) |
Facebook Login | You can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy) |
Maven | This supports the Maven widget and search functionality. (Privacy Policy) |
Marketing | |
---|---|
Google AdSense | This is an ad network. (Privacy Policy) |
Google DoubleClick | Google provides ad serving technology and runs an ad network. (Privacy Policy) |
Index Exchange | This is an ad network. (Privacy Policy) |
Sovrn | This is an ad network. (Privacy Policy) |
Facebook Ads | This is an ad network. (Privacy Policy) |
Amazon Unified Ad Marketplace | This is an ad network. (Privacy Policy) |
AppNexus | This is an ad network. (Privacy Policy) |
Openx | This is an ad network. (Privacy Policy) |
Rubicon Project | This is an ad network. (Privacy Policy) |
TripleLift | This is an ad network. (Privacy Policy) |
Say Media | We partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy) |
Remarketing Pixels | We may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites. |
Conversion Tracking Pixels | We may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service. |
Statistics | |
---|---|
Author Google Analytics | This is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy) |
Comscore | ComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy) |
Amazon Tracking Pixel | Some articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy) |
Clicksco | This is a data management platform studying reader behavior (Privacy Policy) |