McMaster: Rusland manipuleert de Mexicaanse verkiezingen…….. ha! ha! ha! ha! ha! ha! ha!

Nadat
CIA directeur Mike Pompeo eerder al beweerde dat de Russen de VS congresverkiezingen van 2018 hebben gemanipuleerd (jazeker, die
moeten nog plaatsvinden!! ha! ha!), kwam flapdrol McMaster met het
bericht dat Rusland de komende Mexicaanse presidentsverkiezingen manipuleert…… 
Het Witte Huis weigert verder commentaar te leveren op deze grove en smerige beschuldiging……

Je hebt het vast al geraden: er is niet een flinter bewijs
geleverd voor deze stellingen, je roept ‘t gewoon een keer of
honderd, geholpen door de reguliere (massa-) media, gesteund door het grootste
deel van de westerse politici en het gros van de mensen gelooft de leugen…… 

De
Mexicaanse media hebben de regerende PRI partij beschuldigd van het
bezig zijn met het manipuleren van de komende verkiezingen, de
zittende regering heeft zelfs de wetgeving aangepast mocht het
vanwege deze manipulaties tot grote protesten komen na de
verkiezingen….. 
Echter zoals je begrijpt heeft dit niets, maar dan
ook helemaal niets met Rusland te maken……

Moet je nagaan: er zijn bewijzen te over dat de VS verkiezingen elders manipuleert, sterker nog, zelfs democratisch gekozen regeringen laat afzetten door manipulaties van o.a. de CIA…….. (‘democratie brengen’, de code die het leger aan foute oorlogshitsende VS politici gebruikt, als de VS weer een bloedige illegale oorlog begint…)

Lees
het volgende bericht van Jason Ditz, geplaatst op ANTIWAR:

McMaster:
Russia Meddling in Mexico’s Election

White
House Declines to Offer Details on Accusation

Jason
Ditz
Januari 7, 2018 McMaster
MexicoRussia

A
video clip has emerged from a recent talk by National Security
Adviser H.R. McMaster, is which he accused Russia of “a 
sophisticated
effort”
 to
meddle in the upcoming Mexican elections.


Putin en de Mexicaanse president Nieto

McMaster
claimed that the public had seen “initial signs” of such
meddling, but did not elaborate in the talks. The White House has
subsequently refused to comment on the accusation.

Recent
media reports have 
suggested
that the ruling PRI has been setting the stage for a rigged 
election,
with changes to the internal security laws made supposedly to prevent
larger protests in such an eventuality.

The
problem is, such allegations haven’t had even a plausible
connection to Russia, and the US claims seem based on just the
ongoing US supposition that Russia would want to be involved in
anything. In keeping with that, CIA Director Mike
Pompeo 
accused Russia
of interfering in the 2018 US Congressional elections, even though
campaigning hasn’t really even started in that case.

Last
5 posts by Jason Ditz

WannaCry niet door Noord-Korea ‘gelanceerd!’

CounterPunch bracht afgelopen woensdag een
artikel waarin gehakt wordt gemaakt van de bewering dat Noord-Korea
achter de WannaCry ‘cyberaanval’ zou zitten……. Homeland
Security (DHS) adviseur Tom Bossart kwam een paar weken geleden met deze waanzinnige claim (op 19 december 2017). Met deze claim moet het publiek nog verder worden opgezweept in de richting van een (illegale) oorlog tegen Noord-Korea…….

Bewijzen werden weer niet geleverd,
sterker nog: Gregory Elich, de schrijver van het hierna opgenomen
artikel toont middels een indrukwekkend aantal feiten aan dat
Noord-Korea niet achter deze cyberaanval kan zitten, zoals
Noord-Korea ook de Sony hack niet heeft uitgevoerd, de hack waarbij
Contopee malware werd gebruikt door de Lazarus Group….

Zoals eerder gesteld: het is duidelijk dat de Trump
administratie Noord-Korea zoveel mogelijk in een kwaad daglicht wil
stellen en ook deze beschuldiging is gericht op het angst- en
haatzaaien voor resp. tegen Noord-Korea……

De landen die het meest getroffen werden door WannaCry waren Rusland en China; waarom zou Noord-Korea deze landen aanvallen, het gaat immers om de laatste landen die het nog opnemen voor Noord-Korea??!!!

Het is even een zit, maar daarna zal
niemand je nog overtuigen dat Noord-Korea achter WannaCry zit:

The
WannaCry Cyberattack: What the Evidence Says and Why the Trump
Administration Blames North Korea

Photo by Blogtrepreneur | CC BY 2.0

by GREGORY
ELICH
JANUARY
3, 2018

On
December 19, in a Wall Street Journal editorial that drew much
attention, Homeland Security Advisor Tom Bossert asserted that North
Korea was “directly responsible” for the WannaCry cyberattack
that struck more than 300,000 computers worldwide. The virus
encrypted files on infected computers and demanded payment in return
for supposedly providing a decryption key to allow users to regain
access to locked files. Bossert charged that North Korea was “using
cyberattacks to fund its reckless behavior and cause disruption
across the world.” 
[1]

At
a press conference on the same day, Bossert announced that the
attribution was made “with evidence,” and that WannaCry “was
directed by the government of North Korea,” and carried out by
“actors on their behalf, intermediaries.” 
[2] The
evidence that led the U.S. to that conclusion? Bossert was not
saying, perhaps recalling the ridicule that greeted the FBI and
Department of Homeland Security’s misbegotten report on the hacking
of the Democratic National Committee.

The
centerpiece of the claim of North Korean culpability is the
similarity in code between the Contopee malware, which opens backdoor
access to an infected computer, and code in an early variant of
WannaCry. 
[3]

Contopee
has been linked to the Lazarus group, a cybercrime organization that
some believe launched the Sony hack, based on the software tools used
in that attack. Since North Korea is widely considered to be behind
the cyberattack on Sony, at first glance that would appear to seal
the argument.

It
is a logical argument, but is it founded on valid premises? Little is
known about Lazarus, aside from the operations that are attributed to
it. The link between Lazarus and North Korea is a hypothesis based on
limited evidence. It may or may not be true, but the apparent linkage
is far weaker than mainstream media’s conviction would have one
believe. Lazarus appears to be an independent organization possibly
based in China, which North Korea may or may not have contracted to
perform certain operations. That does not necessarily mean that every
action – or even any action at all – Lazarus performs is at North
Korea’s behest.

In
Bossert’s mind as well as that of media reporters, Lazarus – the
intermediaries Bossert refers to – and North Korea are synonymous
when it comes to cyber operations. North Korea gives the orders and
Lazarus carries them out. James Scott, a senior fellow at the
Institute for Critical Infrastructure Technology, notes that
“speculation concerning WannaCry attributes the malware to the
Lazarus Group, not to North Korea, and even those connections are
premature and not wholly convincing. Lazarus itself has never been
definitively proven to be a North Korean state-sponsored advanced
persistent threat (APT); in fact, an abundance of evidence suggests
that the Lazarus group may be a sophisticated, well-resourced, and
expansive cyber-criminal and occasional cyber-mercenary collective.”
Furthermore, Scott adds, the evidence used to tie Lazarus to North
Korea, “such as an IP hop or some language indicators, are
circumstantial and could even be intentional false flags” to
misdirect investigators. 
[4]

Whether
an association exists or not between Lazarus and North Korea has
little meaning regarding a specific attack. Joseph Carson of Thycotic
emphasizes “that it is important to be clear that [Lazarus] is a
group and motives can change depending on who is paying. I have found
when researching hacking groups they can one day be working for one
government under one alias and another using a different alias. This
means that association in cyberspace means nothing.” 
[5]

It
is considered a particularly damning piece of evidence that some of
the tools used in an early variant of WannaCry share characteristics
with those deployed in the cyberattack on Sony. 
[6] However,
there is ample cause for doubting North Korea’s role in the Sony
hack, as I have written about before. 
[7] Following
the Sony breach, IT businessman John McAfee revealed that he had
contact with the group that attacked Sony. “It has to do with a
group of hackers” motivated by dislike of the movie industry’s
“controlling the content of art,” he said, and the FBI was wrong
in attributing the attack to North Korea. 
[8]

If
attribution of the Sony hack to North Korea does not hold up, then
linkage based on tool usage falls apart.

Once
malware is deployed, it often appears for sale on the Dark Web, where
it can be purchased by cybercriminals. The reuse of code is a
time-saving measure in building new threats. Indeed, malware can find
its way onto the market quite rapidly, and almost as soon as WannaCry
was wreaking havoc back in May, it was reported that “researchers
are already finding variants” of WannaCry “in the wild.” 
[9]

According
to Peter Stephenson of SC Media, “The most prevailing [theory] uses
blocks of code that were part of known Korean hacks appearing in the
WannaCry code as justification for pinning the attacks on NK. That’s
really not enough. These blocks of code are readily available in the
underground and get reused regularly.” 
[10]

Commonality
of tool usage means less than we are led to believe. “While malware
may initially be developed and used by a single actor,” Digital
Shadows explains, “this does not mean that it will permanently
remain unique to that actor. Malware samples might be accidentally or
intentionally leaked, stolen, sold, or used in independent operations
by individual members of the group.” 
[11]

Shared
code is not the same as attribution. Code can be rewritten and erased
by anyone, and shared code is often reused,” observes Patrick
Howell O’Neill of Cyberscoop. “The same technique could
potentially be used to frame another group as responsible for a hack
but, despite a lot of recent speculation, there is no definitive
proof.” 
[12]

None
of the shared code was present in WannaCry’s widespread attack on
May 12. Although it is more likely than not that the same actor was
behind the early variants of WannaCry and the May version, it is not
certain. Alan Woodward, cybersecurity advisor to Europol, points out,
“It is quite possible for even a relatively inexperienced group to
obtain the malicious WannaCry payload and to have repackaged this.
Hence, the only thing actually tying the May attacks to the earlier
WannaCry attacks is the payload, which criminals often copy.” 
[13]

The
most devastating component WannaCry utilized in its May 12 attack is
EternalBlue, an exploit of Windows vulnerabilities that was developed
by the National Security Agency and leaked by Shadow Brokers. The NSA
informed Microsoft of the vulnerability only after it learned of the
software’s theft. According to Bossert, the NSA informs software
manufacturers about 90 percent of the time when it discovers a
vulnerability in operating software. It keeps quiet about the
remaining ten percent so that it can “use those vulnerabilities to
develop exploits for the purpose of national security for the
classified work we do.” 
[14] Plainly
put, the NSA intentionally leaves individuals and organizations
worldwide exposed to potential security breaches so that it can
conduct its own cyber operations. This is less than reassuring.

The
May variant of WannaCry also implemented DoublePulsar, which is a
backdoor implant developed by the NSA that allows an attacker to gain
full control over a system and load executable malware.

The
two NSA-developed components are what allowed WannaCry to turn
virulent last May. After loading, EternalBlue proceeds to infect
every other vulnerable computer on the same network. It
simultaneously generates many thousands of random IP addresses and
launches 128 threads at two-second intervals, seeking vulnerabilities
in computers that it can exploit at each one of the generated
external IP addresses.
[15]

China
and Russia were among the nations that were most negatively impacted
by the malware. 
[16] WannaCry
initially targeted Russian systems, which would seem an odd thing for
North Korea to do, given that Russia and China are the closest things
it has to allies. 
[17]

Digital
Shadows reports that “the malware appeared to spread virtually
indiscriminately with no control by its operators,” and a more
targeted approach “would have been more consistent with the
activities of a sophisticated criminal outfit or a
technically-competent nation-state actor.” 
[18]

Flashpoint
analyzed the ransom note that appeared on infected computers. There
were two Chinese versions and an English version. The Chinese texts
were written by someone who is fluent, and the English by someone
with a strong but imperfect command of English. Ransom notes in other
languages were apparently translated from the English version using
Google translator. 
[19] It
has been pointed out that this fact does not disprove the U.S.
attribution of North Korea, as that nation could have hired Chinese
cybercriminals. True enough, but then North Korea does not have a
unique ability to do so. If so inclined, anyone could contract
Chinese malware developers.  Or cybercriminals could act on
their own.

Lazarus
and North Korean cyber actors have a reputation for developing
sophisticated code. The hallmark of WannaCry, however, is its sheer
sloppiness, necessitating the release of a series of new versions in
fairly quick succession. Alan Woodward believes that WannaCry’s
poorly designed code reveals that it had been written by “a less
than experienced malware developer.” 
[20]

Important
aspects of the code were so badly bungled that it is difficult to
imagine how any serious organization could be responsible.

IT
security specialists use virtual machines, or sandboxes, to safely
test and analyze malware code. A well-designed piece of malware will
include logic to detect the type of environment it is executing in
and alter its performance in a virtual machine (VM) environment to
appear benign. WannaCry was notably lacking in that regard. 
“The authors did not appear to be concerned with thwarting
analysis, as the samples analyzed have contained little if any
obfuscation, anti-debugging, or VM-aware code,” notes LogRhythm
Labs. 
[21]

James
Scott argues that “every WannaCry attack has lacked the stealth,
sophistication, and resources characteristic of [Lazarus sub-group]
Bluenoroff itself or Lazarus as a whole. If either were behind
WannaCry, the attacks likely would have been more targeted, had more
of an impact, would have been persistent, would have been more
sophisticated, and would have garnered significantly greater
profits.” The EternalBlue exploit was too valuable to waste “on a
prolific and unprofitable campaign” like the May 12 WannaCry
attack. By contrast, Bluenoroff “prefers to silently integrate into
processes, extort them, and invisibly disappear after stealing
massive fiscal gains.” 
[22]Bogdan
Botezatu of Bitdefender, agrees. “The attack wasn’t targeted and
there was no clear gain for them. It’s doubtful they would use such
a powerful exploit for anything else but espionage.” 
[23]

WannaCry
included a “kill switch,” apparently intended as a poorly thought
out anti-VM feature. “For the life of me,” comments Peter
Stephenson, “I can’t see why they might think that would
work.” 
[24]When
the software executes it first attempts to connect to a hostname that
was unregistered. The malware would proceed to run if the domain was
not valid. A cybersecurity researcher managed to disable WannaCry by
registering the domain through NameCheap.com, shutting down with ease
the ability of WannaCry to infect any further computers. 
[25]

Once
WannaCry infected a computer, it demanded a ransom of $300 in bitcoin
to release the files it had encrypted. After three days, the price
doubled. The whole point of WannaCry was to generate income, and it
is here where the code was most inept.

Ideally,
ransomware like WannaCry would use a new account number for each
infected computer, to better ensure anonymity. Instead, WannaCry
hard-coded just three account numbers, which basically informed
authorities what accounts to monitor. 
[26] It
is an astonishing botch.

Incredibly,
WannaCry lacked the capability of automatically identifying which
victims paid the ransom. That meant that determining the source of
each payment required manual effort, a daunting task given the number
of infected computers. 
[27]Inevitably,
decryption keys were not sent to paying victims and once the word got
out, there was no motivation for anyone else to pay.

In
James Scott’s assessment, “The WannaCry attack attracted very
high publicity and very high law-enforcement visibility while
inflicting arguably the least amount of damage a similar campaign
that size could cause and garnering profits lower than even the most
rudimentary script kiddie attacks.” Scott was incredulous over
claims that WannaCry was a Lazarus operation. “There is no logical
rationale defending the theory that the methodical [Lazarus], known
for targeted attacks with tailored software, would suddenly launch a
global campaign dependent on barely functional ransomware.” 
[28]

One
would never know it from news reports, but cybersecurity attribution
is rarely absolute. Hal Berghel, of the Department of Computer
Science at the University of Nevada, comments on the “absence of
detailed strategies to provide justifiable, evidence-based
cyberattribution. There’s a reason for that: there is none. The
most we have is informed opinion.”  The certainty with which
government officials and media assign blame in high-profile
cyberattacks to perceived enemies should at least raise questions.
“So whenever a politician, pundit, or executive tries to attribute
something to one group or another, our first inclination should
always be to look for signs of attribution bias, cognitive bias,
cultural bias, cognitive dissonance, and so forth. Our first
principle should be cui bono: What agendas are hidden? Whose
interests are being represented or defended? What’s the motivation
behind the statement? Where are the incentives behind the leak or
reportage? How many of the claims have been

substantiated
by independent investigators?” 
[29]

IT
security specialist Graham Cluley raises an important question. “I
think in the current hostile climate between USA and North Korea it’s
not unhelpful to retain some skepticism about why this claim might
have been made, and what may have motivated the claim to be made at
the present time.” 
[30]

To
all appearances, WannaCry was the work of amateurish developers who
got hold of NSA software that allowed the malware to spread like
wildfire, but their own code was so poorly written that it failed to
monetize the effort to any meaningful degree.

WannaCry
has its uses, though. The Trump administration’s public attribution
is “more about the administration’s message that North Korea is a
dangerous actor than it is about cybersecurity,” says Ross Rustici,
head of Intelligence Research at Cybereason. “They’re trying to
lay the groundwork for people to feel like North Korea is a threat to
the homeland.” 
[31] It
is part of a campaign by the administration to stampede the public
into supporting harsh measures or possibly even military action
against North Korea.

Notes:

[1] Thomas
P. Bossert, “It’s Official: North Korea is Behind WannaCry,”
Wall Street Journal,” December 19, 2017.

[2] “Press
Briefing on the Attribution of the WannaCry Malware Attack to North
Korea,” Whitehouse.gov, December 19, 2017.

[3] “WannaCry
and Lazarus Group – the Missing Link?” SecureList, May 15, 2017.

[4] James
Scott, “There’s Proof That North Korea Launched the WannaCry
Attack? Not So Fast! – A Warning Against Premature, Inconclusive,
and Distracting Attribution,” Institute for Critical Infrastructure
Technology, May 23, 2017.

[5] Eduard
Kovacs, “Industry Reactions to U.S. Blaming North Korea for
WannaCry,” Security Week, December 22, 2017.

[6] “WannaCry:
Ransomware Attacks Show Strong Links to Lazarus Group,” Symantec
Official Blog, May 22, 2017.

[7] Gregory
Elich, “Who Was Behind the Cyberattack on Sony?” Counterpunch,
December 30, 2014.

[8] David
Gilbert, Gareth Platt, “John McAfee: ‘I Know Who Hacked Sony
Pictures – and it Wasn’t North Korea,” International Business
Times, January 19, 2015.

[9] Amanda
Rousseau, “WCry/WanaCry Ransomware Technical Analysis,” Endgame,
May 14, 2017.

[10] Peter
Stephenson, “WannaCry Attribution: I’m Not Convinced Kim Dunnit,
but a Russian…”, SC Media, May 21, 2017.

[11] Digital
Shadows Analyst Team, “WannaCry: An Analysis of Competing
Hypotheses,” Digital Shadows, May 18, 2017.

[12] Patrick
Howell O’Neill, “Researchers: WannaCry Ransomware Shares Code
with North Korean Malware,” Cyberscoop, May 15, 2017.

[13] Alan
Woodward, “Attribution is Difficult – Consider All the Evidence,”
Cyber Matters, May 24, 2017.

[14] Thomas
P. Bossert, “It’s Official: North Korea is Behind WannaCry,”
Wall Street Journal,” December 19, 2017.

[15] Luke
Somerville, Abel Toro, “WannaCry Post-Outbreak Analysis,”
Forcepoint, May 16, 2017.

Sarah
Maloney, “WannaCry / WCry /WannaCrypt Attack Profile,”
Cybereason, May 16, 2017.

Rohit
Langde, “WannaCry Ransomware: A Detailed Analysis of the Attack,”
Techspective, September 26, 2017.

[16] Eduard
Kovacs, “WannaCry Does Not Fit North Korea’s Style, Interests:
Experts,” Security Week, May 19, 2017.

[17] “A
Technical Analysis of WannaCry Ransomware,” LogRhythm, May 16,
2017.

[18] Digital
Shadows Analyst Team, “WannaCry: An Analysis of Competing
Hypotheses,” Digital Shadows, May 18, 2017.

[19] Jon
Condra, John Costello, Sherman Chu, “Linguistic Analysis of
WannaCry Ransomware Messages Suggests Chinese-Speaking Authors,”
Flashpoint, May 25, 2017.

[20] Alan
Woodward, “Attribution is Difficult – Consider All the Evidence,”
Cyber Matters, May 24, 2017.

[21] Erika
Noerenberg, Andrew Costis, Nathanial Quist, “A Technical Analysis
of WannaCry Ransomware,” LogRhythm, May 16, 2017.

[22] James
Scott, “There’s Proof That North Korea Launched the WannaCry
Attack? Not So Fast! – A Warning Against Premature, Inconclusive,
and Distracting Attribution,” Institute for Critical Infrastructure
Technology, May 23, 2017.

[23] Eduard
Kovacs, “WannaCry Does Not Fit North Korea’s Style, Interests:
Experts,” Security Week, May 19, 2017.

[24] Peter
Stephenson, “WannaCry Attribution: I’m Not Convinced Kim Dunnit,
but a Russian…”, SC Media, May 21, 2017.

[25] Rohit
Langde, “WannaCry Ransomware: A Detailed Analysis of the Attack,”
Techspective, September 26, 2017.

[26] Jesse
Dunietz, “The Imperfect Crime: How the WannaCry Hackers Could Get
Nabbed,” Scientific American, August 16, 2017.

[27] Andy
Greenberg, “The WannaCry Ransomware Hackers Made Some Major
Mistakes,” Wired, May 15, 2017.

[28] James
Scott, “WannaCry Ransomware & the Perils of Shoddy Attribution:
It’s the Russians! No Wait, it’s the North Koreans!” Institute
for Critical Infrastructure Technology, May 18, 2017.

[29] Hal
Berghel, “On the Problem of (Cyber) Attribution,” Computer —
IEEE Computer Society, March 2017.

[30] Scott
Carey, “Should We Believe the White House When it Says North Korea
is Behind WannaCry?” Computer World, December 20, 2017.

[31] John
P. Mello Jr., “US Fingers North Korea for WannaCry Epidemic,”
Tech News World, December 20, 2017.

===================================

Zie ook: ‘False flag terror’ bestaat wel degelijk: bekentenissen en feiten over heel smerige zaken……….

       en: ‘CIA de ware hacker en manipulator van verkiezingen, ofwel de laatste Wikileaks documenten……...’

       en: ‘CIA speelt zoals gewoonlijk vuil spel: uit Wikileaks documenten blijkt dat CIA zelf de verkiezingen manipuleerde, waar het Rusland van beschuldigde……..

       en: ‘‘Russische bemoeienis’ met de Nederlandse verkiezingen….. Waaruit blijkt nu die manipulatie, gezien de verkiezingsuitslag?

      en: ‘CIA malware voor manipulaties en spionage >> vervolg Wikileaks Vault 7

      en: ‘Eichelsheim (MIVD) ‘waarschuwt voor agressie CIA en NAVO……….’

      en: ‘WikiLeaks: Seth Rich Leaked Clinton Emails, Not Russia

      en: ‘Campagne Clinton, smeriger dan gedacht…………‘ (met daarin daarin opgenomen de volgende artikelen: ‘Donna Brazile Bombshell: ‘Proof’ Hillary ‘Rigged’ Primary Against Bernie‘ en ‘Democrats in Denial After Donna Brazile Says Primary Was Rigged for Hillary‘) Hierover zal ik wellicht later vandaag nog een bericht publiceren.

       en: ‘Clinton te kakken gezet: Brazile (Democratische Partij VS) draagt haar boek op aan Seth Rich, het vermoorde lid van DNC die belastende documenten lekte

       en: ‘Murray, ex-ambassadeur van GB: de Russen hebben de VS verkiezingen niet gemanipuleerd

      en: ‘‘Russische manipulaties uitgevoerd’ door later vermoord staflid Clintons campagneteam Seth Rich……… AIVD en MIVD moeten hiervan weten!!

      en: ‘Obama gaf toe dat de DNC e-mails expres door de DNC werden gelekt naar Wikileaks….!!!!

      en: VS ‘democratie’ aan het werk, een onthutsende en uitermate humoristische video!

      en: ‘Democraten VS kochten informatie over Trump >> Forgetting the ‘Dirty Dossier’ on Trump

      en: ‘Hillary Clinton moet op de hoogte zijn geweest van aankoop Steele dossier over Trump……..

      en: ‘Flashback: Clinton Allies Met With Ukrainian Govt Officials to Dig up Dirt on Trump During 2016 Election

      en: ‘FBI Director Comey Leaked Trump Memos Containing Classified Information

      en: ‘Publicly Available Evidence Doesn’t Support Russian Gov Hacking of 2016 Election

      en: ‘Russia Is Trolling the Shit out of Hillary Clinton and the Mainstream Media

      en: ‘CIA chef Pompeo waarschuwt voor complot van WikiLeaks om de VS op alle mogelijke manieren neer te halen……. ha! ha! ha! ha! ha! ha! ha! ha!

      en: ‘Russische ‘hacks’ door deskundigen nogmaals als fake news doorgeprikt >> Intel Vets Challenge ‘Russia Hack’ Evidence

      en: ‘Rusland krijgt alweer de schuld van hacken, nu van oplichters Symantec en Facebook……. ha! ha! ha! ha! ha! ha! ha!

      en: ‘Russiagate, of: hoe de media u belazeren met verhalen over Russische bemoeienis met de VS presidentsverkiezingen……..

       en: ‘Donna Brazile (Democratische Partij VS) draagt haar boek op aan Seth Rich, het vermoorde lid van DNC die belastende documenten lekte

       en: ‘CIA deed zich voor als het Russische Kaspersky Lab, aldus Wikileaks Vault 8…..

Ollongren: arme huurders gaan er niet op achteruit, dat lijkt maar zo en haar ouders hebben haar geleerd dat anders zijn niet zo erg is……. AUW!!!

De misselijkmakende en autocratische D66 praatjesmaker Ollongren, u weet wel, die zelfs een referendum over het afschaffen van het raadgevend referendum wil verbieden, was gisteren te gast op Radio1 (na 9.30 u.). Plag, de presentator die haar interviewde, haalde een uitspraak aan die de ouders van Ollongren hadden gemaakt en die zo te horen tot het levensmotto van Ollongren behoort: ‘Anders zijn is niet zo erg…’  ha! ha! ha! ha! ha! ha! ha! Te gek dat iemand iets dergelijks als wijs ziet, want dat die mening is Ollongren toegedaan. Met andere woorden: Ollongren vindt het niet zo erg als iemand anders is, waarmee ze in feite stelt, dat anders zijn weliswaar erg is, ‘maar niet zo heel erg……….’

Een goed begin is het halve werk moet je maar denken en jong geleerd is…….

Onderwerp was vooral de woningmarkt en niet het Zweedse Russische duikboot-syndroom*, waar Ollongren overduidelijk aan lijdt, gezien haar domme uitlatingen over Russische inmenging in de politiek van de VS en Nederland, naast ‘uiteraard’ het manipuleren van de westerse bevolkingen middels advertenties en berichten, respectievelijk op mediaorganen als Facebook en RT…….**

Ollongren liet zeer begaan weten dat zij en D66 voor gelijkwaardigheid staan…… ha! ha! ha! ha! ha! ha! Oh, vandaar dat de onderlaag zo ongelofelijk hard wordt gepakt als het aan D66 ligt (en niet alleen als regeringspartij, maar ook als gedoogpartner voor bijvoorbeeld Rutte 2)….. Nee, ik begrijp het helemaal, als je die onderlaag niet flink pakt, komen de Nederlanders met een inkomen van boven de € 40.000,– in opstand, omdat die laagstbetaalden dan zomaar € 1.000,– in de maand overhouden, het kan toch gvd niet de bedoeling zijn dat deze mensen na aftrek van de enorme huren die ze moeten betalen een bedrag van € 1.000,– in de maand overhouden en zo fatsoenlijk kunnen rondkomen >> het moet niet gekker worden in dit land zou fascist Eerdmans zeggen.

Of het nu echt nodig is dat de laagstbetaalden nog meer moeten inleveren, daar men de huurtoeslag niet meer koppelt aan de bijstandsnorm, althans ik geef de vraag van Plag weer, zoals deze echt zou moeten hebben geluid.

Nou daar ging het mensen, Ollongren legde even uit hoe ingewikkeld e.e.a. in elkaar steekt en dat met andere woorden, die laagstbetaalden en degenen die zich sterk maken voor deze groep, zoals de Woonbond, niet moeten zeuren, ze snappen het gewoonweg niet……..

De hufter >> mensen die werkelijk geen cent meer kunnen missen, gaan er straks in totaal € 100,– per jaar op achteruit…… Nogmaals, deze mensen kunnen letterlijk geen cent extra missen, daar ze deze niet hebben!!

En ja hoor, alsof Ollongren al jaren in de Kamer zit (houdt u vast!): als deze mensen er op achteruit gaan, zullen Ollongren en D66 ADHD zwatelaar Koolmees dat ‘repareren…….’ ha! ha! ha! ha! ha! ha! ha! Jezus, dat lamme gelul hebben we iets te vaak gehoord, ook vaak uit de keel van oplichterspartijen VVD, CDA en PvdA…… Als je daarna gaat kijken wat er met die belofte is gebeurd, blijkt dit keer op keer een loze belofte te zijn geweest, ofwel een leugen om het plebs rustig te houden…… Ach zoals gezegd, die arme mensen, zo’n 4 miljoen die tegen, op of onder de armoedegrens leven (dat is 3 keer in armoede leven), komen toch niet in opstand en door dit soort uiterst smerige maatregelen komen ze financieel volledig onder water te staan…..

Schuldhulpverlening voor deze mensen kost tegenwoordig ook een flink kapitaal aan belastinggeld, maar ‘dat schijnt de moeite wel waard te zijn…..’ Dat die mensen en hun kinderen daardoor getraumatiseerd worden, interesseert het geteisem in Rutte 3 (en een groot deel van de Tweede Kamer) al helemaal niet………

Voorts durfde Ollongren te zeggen dat met het doorstromen van mensen op de huurmarkt, de goedkoopste huizen ten goede komen aan de laagstbetaalden……. ha! ha! ha! ha! ha! ha! ha! Ik weet niet waar die huizen staan, maar ik kan ze niet vinden. Tegenwoordig betaal je voor een huis met energieklasse D, bouwjaar 1970 (dus al zeker 4 keer afbetaald, gezien de kostprijs van zo’n huis), met ‘het geweldige oppervlak’ van 55 vierkante meter, al snel meer dan € 600,– per maand (zelfs op het platte land!!), haal daar de huursubsidie vanaf en de laagstbetaalden zijn één derde van hun inkomen kwijt, dus voor iemand met een inkomen van netto € 1.000,– in de maand, blijft er dan 660 euro over om alles van te betalen…. Ik weet niet hoe het u vergaat, maar daar zou ik niet van rond kunnen komen en die mensen ‘ook niet’, zoals de praktijk uitwijst……

Overigens zijn de huren de laatste 8 jaar zo enorm gestegen, dat huurders heel vaak meer kwijt zijn aan een dak boven het hoofd dan kopers……. Dit terwijl ze uiteindelijk niets overhouden aan zo’n huis, zelfs niet als ze er al 50 jaar wonen…… Alles met de welwillende instemming van D666……..

De huisjesmelkers, zoals de koninklijke zwendelaar prins Bernhard jr. (die ze ‘natuurlijk’ niet noemde), zullen worden aangepakt aldus Ollongren, daarmee is ze zo ongeveer de twintigste bewindspersoon die met deze loze belofte komt…. Ollongren merkte op, dat vooral de studenten die uitgebuit worden, zelf moeten reageren als ze teveel betalen…… Als ze dat doen, staan ze binnen de kortste keren op straat en met het grote tekort aan studentenwoningen, zullen ze wel uitkijken zaken openbaar te maken…….. Houdt u nogmaals vast, want Ollongren kwam met alweer een loze belofte: als het nodig is zullen we maatregelen nemen….. ha! ha! ha! ha! ha! ha! Die maatregelen zijn al zo’n 50 jaar nodig, huppeltrut!!

En nee, Ollongren wil niet zoals de jongeren van de SP stellen dat prins Bernhard jr. de huisjesmelker van het jaar is, dat gaat haar te ver…… ha! ha! ha! ha! ha! ha! ha! Ja, kijk als het nu een louche huisjesmelker was, had ze bij wijze van spreken al lang getekend, maar iemand van het koningshuis huisjesmelker noemen, gaat haar veel te ver, ze is zelf tenslotte niet voor niets zelf van adel (adel: afstammelingen van figuren die de rest er met moord, knechting en repressie eronder wisten te houden, zeg maar afstammelingen van psychopaten……)…….

Alsof die Bernhard zoals alle andere uitvreters van het koninklijk huis (in brede zin) geen voorbeeldfunctie hebben, m.a.w.: die Bernhard is in feite nog smeriger bezig, dan de eerste beste andere huisjesmelker………

Toen Plag begon over het bouwen van huizen was ik intussen dermate kotsmisselijk geworden dat ik nog net de wc haalde voor ik moest kotsen….. Uiteraard niets over de smerige truc waarvoor ook D66 verantwoordelijk is: de enorme sloop van betaalbare sociale huurwoningen, ook door D66 wethouders in gang gezet, waarna men er veel minder huizen en veel te duur voor terug bouwde (vaak nog in combinatie met koophuizen), gevolg: een gigantische huizenbubbel, waar vooral de huurders het kind van de rekening zijn……..

Godallemachtig wat een schoft die Ollongren!!

*  De Zweedse overheid heeft in het verleden nogal eens geclaimd dat Russische duikboten in haar territoriale wateren opereerden, zonder daar ook maar een flinter van bewijs voor te leveren…….

** Zie: ‘Kajsa Ollongren (D66 vicepremier): Nederland staat in het vizier van Russische inlichtingendiensten……. ha! ha! ha! ha! ha! ha! ha! ha!‘       en: ‘Ollongren gesteund door Thomas Boesgaard (AD), ‘Rusland verpakt het nepnieuws gekoppeld aan echt nieuws…..’ Oei!!

Zie wat betreft deze zaak ook:

Russiagate, of: hoe de media u belazeren met verhalen over Russische bemoeienis met de VS presidentsverkiezingen……..

Russische ‘hacks’ door deskundigen nogmaals als fake news doorgeprikt >> Intel Vets Challenge ‘Russia Hack’ Evidence

CIA deed zich voor als het Russische Kaspersky Lab, aldus Wikileaks Vault 8…..‘ (zie ook de andere links onder dat bericht)

Publicly Available Evidence Doesn’t Support Russian Gov Hacking of 2016 Election

Murray, ex-ambassadeur van GB: de Russen hebben de VS verkiezingen niet gemanipuleerd

The Attack on ‘Fake News’ Is Really an Attack on Alternative Media

Wat betreft huurders en leugens van Rutte 3:

Marnix Norder (PvdA en Aedes topgraaier) valt eigen beleid als wethouder aan: er wordt te weinig gebouwd

Beleggers klagen over regels voor nieuwbouw, waar huurders het slachtoffer zijn van expres gecreëerde woningnood……..

Huurverhoging 2019 ‘beperkt’: de huur van een sociale huurwoning mag maximaal met 4,1 tot 5,6% worden verhoogd…… ha! ha! ha! ha! ha!

Rutte’s leugen groeit tot reusachtige proporties: verhoging afvalstoffenheffing, bovenop de kosten voor de energietransitie en de btw verhoging‘ (waar nu dus nog een achterlijk hoge huurverhoging bovenop komt…)

Rutte 3 met high five na algemene beschouwingen, een high five voor het belazeren van het Nederlandse volk

Troonrede: ‘Meer mensen moeten voelen dat het goed gaat’ >> ‘iedereen gaat erop vooruit…

Prinsjesdag hysterie, overgoten met een saus van Rutte 3 leugens

Rutte, Hoekstra en CPB liegen dat bijna iedereen er 1,5% op vooruit gaat in 2019

‘Scheefwoners’ worden in het plan van Ronnes (CDA Tweede Kamer) volkomen onterecht nog harder gepakt met mega huurverhogingen……

Jan Kamminga (VVD en Vastgoed Belang): overheid moet meer huurhuizen bouwen, zodat welgestelden daar mooie winsten op kunnen halen……

Koninklijke Beroepsorganisatie voor Gerechtsdeurwaarders klaagt over politie acties bij ontruimingen van woonhuizen…….

Rechter probeert recht te spreken wat krom is: verhuurders mogen de inkomensgegevens van hun huurders inzien en misbruiken……… Niet in 1942, maar in 2018!!

Paping (Woonbond) is blij met hypocriete ‘zorg’ bij woningcorporaties voor armlastige huurders……….

Rotterdam helpt Blok (VVD), de financiële- en bouwmaffia met de sloop van 20.000 goedkope huurwoningen….

Scheefwonen? En Airbnb dan?

Rutte 3 regeerakkoord: een aantal losse flodders op een rij, zoals >> ‘iedereen gaat erop vooruit…..’ ha! ha! ha! ha! ha! ha! ha!

Overspannen huizenmarkt? De Hypotheker: ‘er is geen sprake van een huizenbubbel……’ ha! ha! ha! ha! ha! ha! ha! ha!

‘False flag terror’ bestaat wel degelijk: bekentenissen en feiten over heel smerige zaken……….

False Flag operaties ofwel terreur, dit is het moedwillig schade toebrengen aan eigen zaken dan wel zaken als het vermoorden van eigen burgers of burgers elders, met de opzet een tegenstander de schuld te geven, worden afgedaan als samenzweringstheorieën of complottheorieën. Echter een groot aantal feiten en bekentenissen bewijzen dat deze terreur wel degelijk bestaat en dat al heel lang………

In feite werd dit al duidelijk uit de Vault 7 en Vault 8 documenten op Wikileaks, waaruit bleek, dat de CIA en NSA over een groot aantal ‘instrumenten’ beschikken, waarmee men via het internet zaken kan manipuleren door te hacken en de schuld daarvoor in de schoenen van een ‘vijandige’ staat kan schuiven. in feite een ‘false flag’ operatie………

VS Generaal H.R. McMaster zei gisteren dat de vijanden van de VS, Rusland en China, plus extreem rechtse en linkse activisten vitriool spuien op het internet om het volk aan het twijfelen te brengen over de maatschappij waarin zij leven…… ha! ha! ha! ha! ha! ha! ha! E.e.a. werd een uur geleden gemeld op BBC World Service (rond 12.09 u. CET), ook al kan McMaster niet één bewezen feit opnoemen (zoals gewoonlijk in dit soort angst- en haatzaaierij)……. Als er nu één ‘land’ is dat zich wel bewezen met dergelijke zaken bezighoudt, is het de VS zelf wel!!

Van een aantal zaken was ik wel op de hoogte en toch verbaasde mij het enorme aantal ‘false flag operaties’, die niet zelden tot een enorm aantal moorden, nou zeg maar gerust ‘massamoorden’ hebben geleid, neem de aanleiding voor de illegale oorlogen die de VS voerde tegen Noord-Vietnam (plus tegelijkertijd in het geheim tegen andere landen in de regio) en Irak…..

Ook terreuraanslagen in Europa waren niet zelden ‘false flag operaties’, ofwel ‘false flag terreur…’

Overigens niets nieuws onder de zon, er bestaan al meer dan 2.000 jaar van dit soort operaties.

Het volgende artikel vond ik op het blog van Stan van Houcke, het origineel komt van Newsweek (een regulier nieuwsmedium*), van Houcke nam het over van WashingtonsBlog. Lezen mensen en geeft het door, je weet niet wat je leest!! Hiermee maken wat mij betreft de uitdragers van ‘Russische manipulaties’ in de VS presidentsverkiezingen en manipulaties in EU landen, zich voorgoed totaal ongeloofwaardig (al waren deze beweringen al langer bewezen lariekoek).

There
Are Now So Many Admissions by Government Officials of False Flag
Terror that Only the Willfully Ignorant Still Doubt the Reality
of the Concept

← Newsweek: “U.S. Government Planned False Flag Attacks to Start War”

Posted
on
 December
17, 2017
 by WashingtonsBlog

Presidents,
Prime Ministers, Congressmen, Generals, Spooks, Soldiers and Police
ADMIT to False Flag Terror

Scores
of government officials throughout the world have 
admitted (either
orally, in writing, or through photographs or videos) to carrying out
– or seriously proposing – false flag attacks:

  1. Japanese
    troops set off a small explosion on a train track in 1931, and
    falsely blamed it on China in order to justify an invasion of
    Manchuria. This is 
    known
    as
     the
    “Mukden Incident” or the “Manchurian Incident”. The Tokyo
    International Military Tribunal 
    found:
    “Several of the participators in the plan, including Hashimoto [a
    high-ranking Japanese army officer], 
    have
    on various occasions 
    admitted their
    part in the plot and have stated that the object of the ‘Incident’
    was to afford an excuse for the occupation of Manchuria by the
    Kwantung Army ….” And see 
    this,
    this and this.

(2)
A major with the Nazi SS 
admitted at
the Nuremberg trials that – under orders from the chief of the
Gestapo – he and some other Nazi operatives faked several attacks
on their own people and resources which they blamed on the Poles, to
justify the invasion of Poland. The staged attacks 
included:

  • The
    German radio station at Gleiwitz [details below]

  • The
    strategic railway at Jabłonków Pass, located on the border between
    Poland and Czechoslovakia

  • The
    German customs station at Hochlinden

  • The
    forest service station in Pitschen

  • The
    communications station at Neubersteich

  • The
    railroad station in Alt-Eiche

  • A
    woman and her companion in Katowice

The
details of the Gleiwitz radio station incident 
include:

On
the night of 31 August 1939, a small group of German operatives
dressed in Polish uniforms and led by Naujocks seized the Gleiwitz
station and broadcast a short anti-German message in Polish (sources
vary on the content of the message). The Germans’ goal was to make
the attack and the broadcast look like the work of anti-German Polish
saboteurs.

To
make the attack seem more convincing, the Germans used human corpses
to pass them off as Polish attackers. They murdered Franciszek
Honiok, a 43-year-old unmarried German Silesian Catholic farmer known
for sympathizing with the Poles. He had been arrested the previous
day by the Gestapo. He was dressed to look like a saboteur, then
killed by lethal injection, given gunshot wounds, and left dead at
the scene so that he appeared to have been killed while attacking the
station. His corpse was subsequently presented to the police and
press as proof of the attack.

  1. The
    minutes of the high command of the Italian government –
    subsequently approved by Mussolini himself – 
    admitted that
    violence on the Greek-Albanian border was carried out by Italians
    and falsely blamed on the Greeks, as an excuse for Italy’s 1940
    invasion of Greece.

  1. Nazi
    general Franz Halder also testified at the Nuremberg trials that
    Nazi leader Hermann Goering 
    admitted to
    setting fire to the German parliament building in 1933, and then
    falsely blaming the communists for the arson.

  1. Soviet
    leader Nikita Khrushchev 
    admitted in
    writing that the Soviet Union’s Red Army shelled the Russian
    village of Mainila in 1939 – while blaming the attack on Finland –
    as a basis for launching the “Winter War” against Finland.
    Russian president Boris Yeltsin 
    agreed that
    Russia had been the aggressor in the Winter War.

  1. The
    Russian Parliament, current Russian president Putin and former
    Soviet leader Gorbachev all 
    admit that
    Soviet leader Joseph Stalin ordered his secret police to execute
    22,000 Polish army officers and civilians in 1940, and then falsely
    blamed it on the Nazis.

  1. The
    British government 
    admits that
    – between 1946 and 1948 – it bombed 5 ships carrying Jews who
    were Holocaust survivors attempting to flee to safety in Palestine
    right after World War II, set up a fake group called “Defenders of
    Arab Palestine”, and then had the psuedo-group falsely claim
    responsibility for the bombings (and see 
    thisthis and this).

  1. Israel admits that
    in 1954, an Israeli terrorist cell operating in Egypt planted bombs
    in several buildings, including U.S. diplomatic facilities, then
    left behind “evidence” implicating the Arabs as the culprits
    (one of the bombs detonated prematurely, allowing the Egyptians to
    identify the bombers, and several of the Israelis later confessed)
    (and see 
    this and this).

The
U.S. Army does not believe this is an isolated incident. For example,
the U.S. Army’s School of Advanced Military Studies 
said of
Mossad (Israel’s intelligence service):

Ruthless
and cunning. Has capability to target U.S. forces and make
it look like a Palestinian/Arab act
.”

And
former Israeli Prime Moshe Minister 
admitted in
his diary:

I
have been meditating on the long chain of 
false
incidents and hostilities we have invented
,
and on the many clashes we have provoked which cost us so much blood
….

  1. The
    CIA 
    admits that
    it hired Iranians in the 1950′s to pose as Communists and stage
    bombings in Iran in order to turn the country against its
    democratically-elected prime minister.

(10)
The Turkish Prime Minister 
admitted that
the Turkish government carried out the 1955 bombing on a Turkish
consulate in Greece – also damaging the nearby birthplace of the
founder of modern Turkey – and blamed it on Greece, for the purpose
of inciting and justifying anti-Greek violence.

The
Economist 
notes:

Starting
in the 1950s Turkey’s deep state sponsored killings, engineered
riots, colluded with drug traffickers, staged “false flag”
attacks and organised massacres of trade unionists. Thousands died in
the chaos it fomented.

  1. The
    British Prime Minister 
    admitted to
    his defense secretary that he and American president Dwight
    Eisenhower approved a plan in 1957 to carry out attacks in Syria and
    blame it on the Syrian government as a way to effect regime change.

  1. The
    former Italian Prime Minister, an Italian judge, and the 
    former
    head of Italian counterintelligence
     admit
    that 
    NATO,
    with the help of the Pentagon and CIA, carried out terror bombings
    in Italy and other European countries in the 1950s through the 1980s
    and blamed the communists, in order to rally people’s support for
    their governments in Europe in their fight against communism
    .

(13)
As one participant in this formerly-secret program stated: 
“You
had to attack civilians, people, women, children, innocent people,
unknown people far removed from any political game. The reason was
quite simple. They were supposed to force these people, the Italian
public, to turn to the state to ask for greater security”
 … so
that “a state of emergency could be declared, so people would
willingly trade part of their freedom for the security”
 (and
see 
this)
(Italy and other European countries subject to the terror campaign
had joined NATO before the bombings occurred). And watch 
this
BBC special
.
They also allegedly carried out terror attacks in 
France,
Belgium, Denmark, Germany, Greece, the Netherlands, Norway, Portugal,
the UK
,
and other countries.

The
CIA also stressed to the head of the Italian program that Italy
needed to use the program to 
control internal uprisings.

False
flag attacks carried out pursuant to this program include – by way
of example only:

    In
    1960, American Senator George Smathers 
    suggested that
    the U.S. launch “a false attack made on Guantanamo Bay which would
    give us the excuse of actually fomenting a fight which would then
    give us the excuse to go in and [overthrow Castro]”.

  1. Official
    State Department documents show that, in 1961, the head of the Joint
    Chiefs and other high-level officials 
    discussed blowing
    up a consulate in the Dominican Republic in order to justify an
    invasion of that country. The plans were not carried out, but they
    were all discussed as serious proposals.

(15)
As admitted by the U.S. government, recently declassified documents
show that in 1962, the American Joint Chiefs of Staff signed off on a
plan to 
blow
up AMERICAN airplanes
 (using
an elaborate plan involving the switching of airplanes), and also
to 
commit
terrorist acts on American soil
,
and then to blame it on the Cubans in order to justify an invasion of
Cuba. See the following 
ABC
news report
the
official documents
;
and watch 
this
interview 
with
the former Washington Investigative Producer for ABC’s World News
Tonight with Peter Jennings. This plan was
subsequently 
admitted again
in other declassified government documents.

Provocations
considered by the Joint Chiefs of Staff 
included:

Sink
ship near harbor entrance. Conduct funerals for mock-victims ….

***

3.
A “Remember the Maine” incident could be arranged in several
forms:

a.
We could blow up a US ship in Guantanamo Bay and blame Cuba.

b.
We could blow up a drone (unmanned) vessel anywhere in the Cuban
waters. We could arrange to cause such incident in the vicinity of
Havana or Santiago as a spectacular result of Cuban attack from the
air or sea, or both. The presence of Cuban planes or ships merely
investigating the intent of the vessel could be fairly compelling
evidence that the ship was taken under attack. The nearness to Havana
or Santiago would add credibility especially to those people that
might have heard the blast or have seen the fire. The US could follow
up with an air/sea rescue operation covered by US fighters to
“evacuate” remaining members of the non-existent crew. Casualty
lists in US newspapers would cause a helpful wave of national
indignation.

4.
We could develop a Communist Cuban terror campaign in the Miami area,
in other Florida cities and even in Washington.

The terror
campaign could be pointed at Cuban refugees seeking haven in the
United States. We could sink a boatload of Cubans enroute to Florida
(real or simulated). We could foster attempts on lives of Cuban
refugees in the United States even to the extent of wounding in
instances to be widely publicized. Exploding a few plastic bombs in
carefully chosen spots, the arrest of Cuban agents and the release of
prepared documents substantiating Cuban involvement also would be
helpful in projecting the idea of an irresponsible government.

***

6.
Use of MIG type aircraft by US pilots could provide additional
provocation. Harassment of civil air, attacks on surface shipping and
destruction of US military drone aircraft by MIG type planes would be
useful as complementary actions. An F-86 properly painted would
convince air passengers that they saw a Cuban MIG, especially if the
pilot of the transport were to announce such fact. The primary
drawback to this suggestion appears to be the security risk inherent
in obtaining or modifying an aircraft. However, reasonable copies of
the MIG could be produced from US resources in about three months.

***

8.
it is possible to create an incident which will
demonstrate
convincingly that a Cuban-aircraft has attacked and
shot down a chartered civil airliner en route from the United States
to Jamaica, Guatemala, Panama or Venezuela. The destination would be
chosen only to cause the flight plan route to cross Cuba, The
passengers could be a group of college students off on a holiday or
any grouping of persons with a common interest to support chartering
a non-scheduled flight.

a.
An aircraft at Eglin AFB would be painted and numbered as an exact
duplicate for a civil registered aircraft belonging to a CIA
proprietary organization in the Miami area. At a designated time the
duplicate would be substituted for the actual civil aircraft and
would be loaded with the selected passengers, all boarded under
carefully prepared aliases. The actual registered aircraft would be
converted to a drone.

b.
Take off times of the drone aircraft and the actual aircraft will be
scheduled to allow a rendezvous south of Florida. From the rendezvous
point the passenger-carrying aircraft will descend to minimum
altitude and go directly into an auxiliary field at Eglin AFB where
arrangements will have been made to evacuate the passengers and
return the aircraft to its original status. The drone aircraft
meanwhile will continue to fly the filed flight plan. When over Cuba
the drone will being transmitting on the inter-national distress
frequency a “MAY DAY” message stating he is under attack by Cuban
MIG aircraft. The transmission will be interrupted by destruction of
the aircraft which will be triggered by radio signal. This will allow
ICAO radio stations in the Western Hemisphere to “tell” the US
what has happened to the aircraft instead of the US trying to “sell”
the incident.

9.
It is possible to create an incident which will make it appear that
Communist Cuban MIGs have destroyed a USAF aircraft over
international waters in an unprovoked attack.

a.
Approximately 4 or 5 F-101 aircraft-will be dispatched in trail from
Homestead AFB, Florida, to the vicinity of Cuba. Their mission will
be to reverse course and simulate fakir aircraft for an air defense
exercise in southern Florida. These aircraft would conduct variations
of these flights at frequent intervals. Crews would be briefed to
remain at least 12 miles off the Cuban coast; however, they would be
required to carry live ammunition in the event that hostile actions
were taken by the Cuban MiGs.

b.
On One such flight, a pre-briefed pilot would fly tail-end Charley at
considerable interval between aircraft. While near the Cuban Island
this pilot would broadcast that he had been Jumped by MIGs and was
going down. No other calls would be made. The pilot would then fly
directly west at extremely low altitude and land at a secure base, an
Eglin auxiliary. The aircraft would be met by the proper people,
quickly stored and given a new tail number. The pilot who had
performed the mission under an alias, would resume his proper
identity and return to his normal place of business. The pilot and
aircraft would then have disappeared.

c.
At precisely the same time that the aircraft was presumably shot down
a submarine or small surface craft would disburse F-101 parts,
parachute, etc., at approximately 15 to 20 miles off the Cuban coast
and depart.

U.S.
government documents declassified in October 2017 
admitted that
a very high-level 1962 meeting of U.S. government officials –
separate from the Joint Chiefs of Staff – also discussed:

The
possibility of 
U.S.
manufacture or acquisition of 
Soviet aircraft ….
There is a possibility that such aircraft could be used in a
deception operation designed to confuse enemy planes in the air, to
launch a surprise attack against enemy installations or in
 a
provocation operation in which Soviet aircraft would appear to attack
U.S. or friendly installations in order to provide an excuse for U.S.
intervention
.

And see
this
.

  1. In
    1963, the U.S. Department of Defense wrote a paper 
    promoting attacks
    on nations within the Organization of American States – such as
    Trinidad-Tobago or Jamaica – and then falsely blaming them on
    Cuba.

  1. The
    U.S. Department of Defense also 
    suggested covertly
    paying a person in the Castro government to attack the United
    States: “The only area remaining for consideration then would be
    to bribe one of Castro’s subordinate commanders to initiate an
    attack on Guantanamo.”

  1. A
    U.S. Congressional committee 
    admitted that
    – as part of its “Cointelpro” campaign – the FBI had
    used 
    many provocateurs
    in the 1950s through 1970s to carry out violent acts and falsely
    blame them on political activists.

  1. top Turkish
    general 
    admitted that
    Turkish forces burned down a mosque on Cyprus in the 1970s and
    blamed it on their enemy. He 
    explained:
    “In Special War, certain 
    acts
    of sabotage are staged and blamed on the enemy
     to
    increase public resistance. We did this on Cyprus; we even burnt
    down a mosque.” In response to the surprised correspondent’s
    incredulous look the general said, “I am giving an example”.

(20)
declassified 1973
CIA document 
reveals a
program to train foreign police and troops on how to make booby
traps, pretending that they were training them on how
to 
investigate terrorist
acts:

The
Agency maintains liaison in varying degrees with foreign
police/security organizations through its field stations ….

[CIA
provides training sessions as follows:]

a.
Providing trainees with 
basic
knowledge in the uses of commercial and military demolitions and
incendiaries
 as
they may be applied in terrorism and industrial sabotage operations.

b.
Introducing the trainees to 
commercially
available materials and home laboratory techniques
,
likely to he used in the manufacture of explosives and incendiaries
by terrorists or saboteurs.

c.
Familiarizing the trainees with the concept of 
target
analysis and operational planning
 that
a saboteur or terrorist must employ.

d.
Introducing the trainees to booby trapping devices and techniques
giving
 practical
experience
 with
both manufactured and improvised devices 
through
actual fabrication
.

***

The
program provides the trainees with 
ample
opportunity to develop basic familiarity and use proficiently through
handling, preparing and applying the various explosive charges,
incendiary agents, terrorist devices and sabotage techniques
.

  1. The
    German government 
    admitted (and see
    this
    )
    that, in 1978, the German secret service detonated a bomb in the
    outer wall of a prison and planted “escape tools” on a prisoner
    – a member of the Red Army Faction – which the secret service
    wished to frame the bombing on.

  1. A
    Mossad agent 
    admits that,
    in 1984, Mossad planted a radio transmitter in Gaddaffi’s compound
    in Tripoli, Libya which broadcast fake terrorist transmissions
    recorded by Mossad, in order to frame Gaddaffi as a terrorist
    supporter. Ronald Reagan bombed Libya immediately thereafter.

  1. The
    South African Truth and Reconciliation Council 
    found that,
    in 1989, the Civil Cooperation Bureau (a covert branch of the South
    African Defense Force) approached an explosives expert and asked him
    “to participate in an operation aimed at discrediting the ANC [the
    African National Congress] by bombing the police vehicle of the
    investigating officer into the murder incident”, thus framing the
    ANC for the bombing.

  1. An
    Algerian diplomat and several officers in the Algerian
    army 
    admit that,
    in the 1990s, the Algerian army frequently massacred Algerian
    civilians and then blamed Islamic militants for the killings (and
    see 
    this
    video
    ;
    and see Agence France-Presse, 9/27/2002, 
    French
    Court Dismisses Algerian Defamation Suit Against Author
    ).

  1. In
    1993, a bomb in Northern Ireland killed 9 civilians. Official
    documents from the Royal Ulster Constabulary (i.e. the British
    government) 
    show that
    the mastermind of the bombing was a British agent, and that the
    bombing was designed to inflame sectarian tensions. And
    see 
    this and this.

  1. The
    United States Army’s 1994 publication 
    Special
    Forces Foreign Internal Defense Tactics Techniques and Procedures
    for Special Forces
     –
    updated in 2004 – 
    recommends employing
    terrorists and using false flag operations to destabilize leftist
    regimes in Latin America. False flag terrorist attacks were carried
    out in Latin America and other regions as part of the CIA’s “
    Dirty
    Wars
    “.
    And 
    see
    this
    .

(27)
Similarly, a CIA “psychological operations” manual prepared by a
CIA contractor for the Nicaraguan Contra rebels 
noted the
value of assassinating someone on your own side to create a “martyr”
for the cause. The manual was 
authenticated by
the U.S. government. The manual received so much publicity from
Associated Press, Washington Post and other news coverage that –
during the 1984 presidential debate – President Reagan
was 
confronted with
the following question on national television:

At
this moment, we are confronted with the extraordinary story of a CIA
guerrilla manual for the anti-Sandinista contras whom we are backing,
which advocates not only assassinations of Sandinistas but the 
hiring
of criminals to assassinate the guerrillas we are supporting in order
to create martyrs.

  1. A
    Rwandan government inquiry 
    admitted that
    the 1994 shootdown and murder of the Rwandan president, who was from
    the 
    Hutu tribe
    – a murder blamed by the Hutus on the rival 
    Tutsi tribe,
    and which led to the massacre of more than 800,000 Tutsis by Hutus –
    was committed by 
    Hutu soldiers
    and falsely blamed on the Tutis.

  1. An
    Indonesian government fact-finding team investigated violent riots
    which occurred in 1998, and determined that “
    elements
    of the military had been involved in the riots, some of which were
    deliberately provoked
    ”.

  1. Senior
    Russian Senior military and intelligence officers 
    admit that
    the KGB blew up Russian apartment buildings in 1999 and falsely
    blamed it on Chechens, in order to justify an invasion of Chechnya
    (and see 
    this
    report
     and this
    discussion
    ).

  1. As
    reported by the 
    New
    York Times
    BBC and Associated
    Press
    ,
    Macedonian officials admit that in 2001, the government murdered 7
    innocent immigrants in cold blood and pretended that they were Al
    Qaeda soldiers attempting to assassinate Macedonian police, in order
    to join the “war on terror”. They lured foreign migrants into
    the country, executed them in a staged gun battle, and then claimed
    they were a unit backed by Al Qaeda intent on attacking Western
    embassies”. Specifically, Macedonian authorities had lured the
    immigrants into the country, and then – after killing them –
    posed the victims with planted evidence – “bags of uniforms and
    semiautomatic weapons at their side” – to show Western
    diplomats.

  1. At
    the July 2001 G8 Summit in Genoa, Italy, black-clad thugs
    were 
    videotaped getting
    out of police cars, and were 
    seen by
    an Italian MP carrying “iron bars inside the police station”.
    Subsequently, senior police officials in Genoa 
    admitted that
    police planted two Molotov cocktails and faked the stabbing of a
    police officer at the G8 Summit, in order to justify a 
    violent
    crackdown
     against
    protesters.

  1. The
    U.S. 
    falsely
    blamed Iraq
     for
    playing a role in the 9/11 attacks – as shown by a 
    memo
    from the defense secretary
     –
    as one of the 
    main
    justifications
     for
    launching the Iraq war.
    Even
    after the 9/11 Commission 
    admitted that
    there was no connection, Dick Cheney 
    said that
    the evidence is “overwhelming” that al Qaeda had a relationship
    with Saddam Hussein’s regime, that Cheney “probably” had
    information unavailable to the Commission, and that the media was
    not ‘doing their homework’ in reporting such ties. Top U.S.
    government officials now 
    admit that
    the Iraq war was really launched for oil … not 9/11 or weapons of
    mass destruction.

Despite
previous “lone wolf” claims, many U.S. government officials
now 
say that
9/11 was state-sponsored terror; but Iraq was 
not the
state which backed the hijackers. (Many U.S. officials
have 
allegedthat
9/11 was a false flag operation by rogue elements of the U.S.
government; but such a claim is beyond the scope of this discussion.
The key point is that the U.S. falsely blamed it on Iraq, when
it 
knew Iraq
had nothing to do with it.). 

(Additionally,
the 
same
judge who has shielded the Saudis
 for
any liability for funding 9/11 has awarded a default judgment against
Iran for 
$10.5
billion for carrying out 9/11
 …
even though no one seriously believes that Iran had any part in
9/11.)

  1. Although
    the FBI now admits that the 2001 anthrax attacks were carried out by
    one or more U.S. government scientists, a senior FBI official says
    that the FBI was actually 
    told to
    blame the Anthrax attacks on Al Qaeda by White House
    officials
     (remember
    what the anthrax letters 
    looked
    like
    ).
    Government officials also confirm that the white House 
    tried
    to link the anthrax to Iraq
     as
    a justification for regime change in that country. And 
    see
    this
    .

  1. According
    to the 
    Washington
    Post
    ,
    Indonesian police admit that the Indonesian military killed American
    teachers in Papua in 2002 and blamed the murders on a Papuan
    separatist group in order to get that group listed as a terrorist
    organization.

  1. The
    well-respected former Indonesian president also 
    admits that
    the government probably had a role in the Bali bombings.

  1. Police
    outside of a 2003 European Union summit in Greece were
    filmed 
    planting
    Molotov cocktails on a peaceful protester
    .

(38)
In 2003, the U.S. Secretary of Defense 
admitted that
interrogators were authorized to use the following method:

False
Flag: Convincing the detainee that individuals from a country other
than the United States are interrogating him.

While
not a traditional false flag 
attack,
this deception could lead to former detainees – 
many
of whom were tortured
 –
attacking the country falsely blamed for the interrogation and
torture.

  1. Former
    Department of Justice lawyer John Yoo 
    suggested in
    2005 that the US should go on the offensive against al-Qaeda, having
    “our intelligence agencies create a 
    false
    terrorist organization
    .
    It could have its own websites, recruitment centers, training camps,
    and fundraising operations. It could 
    launch fake
    terrorist operations
     and
    claim credit for real terrorist strikes, helping to sow confusion
    within al-Qaeda’s ranks, causing operatives to doubt others’
    identities and to question the validity of communications.”

  1. Similarly,
    in 2005, Professor John Arquilla of the Naval Postgraduate School –
    a renowned US defense analyst credited with developing the concept
    of ‘netwar’ – 
    called
    for
     western
    intelligence services to
     create
    new “pseudo gang” terrorist groups
    ,
    as a way of undermining “real” terror networks. According to
    Pulitzer-Prize winning journalist Seymour Hersh, Arquilla’s
    ‘pseudo-gang’ strategy was, Hersh reported, 
    already
    being implemented
     by
    the Pentagon:

    Under
    Rumsfeld’s new approach, I was told, US military operatives would
    be permitted to pose abroad as corrupt foreign businessmen seeking
    to buy contraband items that could be used in nuclear-weapons
    systems. In some cases, according to the Pentagon advisers, 
    local
    citizens could be recruited and asked to join up with guerrillas or
    terrorists

The
new rules will enable the Special Forces community to set up what it
calls ‘action teams’ in the target countries overseas which can
be used to find and eliminate terrorist organizations. 
‘Do
you remember the right-wing execution squads in El Salvador?’ the
former high-level intelligence official asked me, referring to the
military-led gangs that committed atrocities in the early
nineteen-eighties. ‘We founded them and we financed them,’ he
said. ‘The objective now is to recruit locals in any area we want.
And we aren’t going to tell Congress about it.’ A former military
officer, who has knowledge of the Pentagon’s commando capabilities,
said, ‘We’re going to be riding with the bad boys.’”

(41)
United Press International 
reported in
June 2005:

U.S.
intelligence officers are reporting that some of the insurgents in
Iraq are using recent-model Beretta 92 pistols, but the pistols seem
to have had their serial numbers erased. The numbers do not appear to
have been physically removed; the pistols seem to have come off a
production line without any serial numbers. Analysts suggest the lack
of serial numbers indicates that the weapons were intended for
intelligence operations or terrorist cells with substantial
government backing. Analysts speculate that these guns are probably
from either Mossad or the CIA. Analysts speculate that agent
provocateurs may be using the untraceable weapons even as U.S.
authorities use insurgent attacks against civilians as evidence of
the illegitimacy of the resistance.

  1. In
    2005, 
    British
    soldiers
     dressed
    as Arabs were caught by Iraqi police after a shootout against the
    police. The British soldiers shot two Iraqi policemen, 
    killing
    one
    .
    The soldiers apparently 
    possessed
    explosives
    ,
    and were 
    accused of
    attempting to 
    set
    off bombs
    .
    While none of the soldiers admitted that they were carrying out
    attacks, British soldiers and a column of 10 British tanks stormed
    the jail they were held in, 
    broke
    down a wall of the jail, and busted them out
    .
    The extreme measures used to free the soldiers – rather than have
    them face questions and potentially stand trial – could be
    considered an admission.

  1. Undercover
    Israeli soldiers 
    admitted in
    2005 to throwing stones at other Israeli soldiers so they could
    blame it on Palestinians, as an excuse to crack down on peaceful
    protests by the Palestinians.

  1. Quebec
    police 
    admitted that,
    in 2007, thugs carrying rocks to a peaceful protest were actually
    undercover Quebec police officers (and 
    see
    this
    ).

  1. A
    2008 US Army special operations field manual 
    recommends that
    the U.S. military use surrogate non-state groups such as
    “paramilitary forces, individuals, businesses, foreign political
    organizations, resistant or insurgent organizations,
    expatriates, 
    transnational
    terrorism adversaries, disillusioned transnational terrorism
    members
    ,
    black marketers, and other social or political ‘undesirables.’”
    The manual specifically acknowledged that U.S. special operations
    can involve both counterterrorism and “Terrorism” (as well as
    “transnational criminal activities, including narco-trafficking,
    illicit arms-dealing, and illegal financial transactions.”)

(46)
The former Italian 
Prime
Minister, President, and head of Secret Services
 (Francesco
Cossiga) 
advised the
2008 minister in charge of the police, on how to deal with protests
from teachers and students:

He
should do what I did when I was Minister of the Interior … 
infiltrate
the movement with agents provocateurs
 inclined
to do anything …. And after that, with the strength of the gained
population consent, … 
beat
them for blood and beat for blood
 also
those teachers that incite them. Especially the teachers. Not the
elderly, of course, but the girl teachers yes.

  1. An
    undercover officer 
    admitted that
    he infiltrated environmental, leftwing and anti-fascist groups in 22
    countries. Germany’s federal police chief 
    admitted that
    – while the undercover officer worked for the German police – he
    acted illegally during a G8 protest in Germany in 2007 and committed
    arson by setting fire during a subsequent demonstration in Berlin.
    The undercover officer spent many years 
    living
    with
     violent
    “Black Bloc” anarchists.

  1. Denver
    police 
    admitted that
    uniformed officers deployed in 2008 to an area where alleged
    “anarchists” had planned to wreak havoc outside the Democratic
    National Convention ended up getting into a melee with two
    undercover policemen. The uniformed officers didn’t know the
    undercover officers were cops.

  1. At
    the G20 protests in London in 2009, a British member of
    parliament 
    saw plain
    clothes police officers attempting to incite the crowd to violence.

  1. The
    oversight agency for the Royal Canadian Mounted Police 
    admitted that
    – at the G20 protests in Toronto in 2010 – undercover police
    officers were arrested with a group of protesters. Videos and photos
    (see 
    this and this,
    for example) show that violent protesters wore very similar boots
    and other gear as the police, and carried police batons. The Globe
    and Mail 
    reports that
    the undercover officers planned the targets for violent attack, and
    the police failed to stop the attacks.

  1. Egyptian
    politicians 
    admitted (and see
    this
    )
    that government employees looted priceless museum artifacts 2011 to
    try to discredit the protesters.

  1. Austin
    police 
    admit that
    3 officers infiltrated the Occupy protests in that city.
    Prosecutors 
    admit that
    one of the undercover officers purchased and constructed illegal
    “lock boxes” which ended up getting many protesters arrested.

  1. In
    2011, a Colombian colonel 
    admitted that
    he and his soldiers had lured 57 innocent civilians and killed them
    – after dressing many of them in uniforms – as part of a scheme
    to claim that Columbia was eradicating left-wing terrorists. And 
    see
    this
    .

  1. Rioters
    who discredited the peaceful protests against the swearing in of the
    Mexican president in 2012 
    admitted that
    they were paid 300 pesos each to destroy everything in their path.
    According to Wikipedia, photos also 
    show the
    vandals waiting in groups behind police lines prior to the violence.

  1. On
    November 20, 2014, Mexican agent provocateurs were transported by
    army vehicles to participate in the 2014 Iguala mass kidnapping
    protests, as was 
    shown by
    videos and pictures distributed via social networks.

  1. The
    highly-respected writer for the Telegraph Ambrose Evans-Pritchard
    says that the head of Saudi intelligence – Prince Bandar –
    recently 
    admitted that
    the Saudi government controls “Chechen” terrorists.

(57) Two
members of the Turkish parliament
high-level
American sources
 and
others admitted that the Turkish government – a NATO country –
carried out the chemical weapons attacks in Syria and falsely blamed
them on the Syrian government; and high-ranking Turkish
government 
admitted on
tape plans to carry out attacks and blame it on the Syrian
government.

  1. The
    former Director of the NSA and other American government
    officials 
    admit said
    that the U.S. is a huge supporter of terrorism. Jimmy Carter’s
    National Security Adviser Zbigniew Brzezinski 
    admitted on
    CNN that the U.S. 
    organized
    and supported Bin Laden and the other originators of “Al Qaeda”
    in the 1970s
     to
    fight the Soviets. The U.S. and its allies have been 
    supporting Al
    Qaeda and other Islamic terrorist groups for many decades, and
    providing them arms, money and logistical support
    in 
    LibyaSyriaMaliBosniaChechnyaIran,
    and 
    many
    other countries
    .
    U.S. allies are also directly responsible
    for 
    creating and supplying ISIS.

It’s
gotten so ridiculous that a U.S. Senator has introduced a “
Stop
Arming Terrorists Act”
,
and U.S. Congresswoman – who introduced a similar bill in the House
– 
says:
“For years, the U.S. government has been supporting armed militant
groups working directly with and often under the command of terrorist
groups like ISIS and al-Qaeda in their fight to overthrow the Syrian
government.”

  1. Government
    officials on 
    both
    sides
     of
    the conflict, as well as the snipers who actually pulled the
    trigger, all 
    admit that
    shots were fired on 
    both sides
    – killing both government officials and anti-government protesters
    in Ukraine – to create maximum chaos and destabilization.

  1. Speaking
    of snipers, in a secret recording, Venezuelan generals 
    admit that
    they will deploy snipers to shoot protesters, but keep the marksmen
    well-hidden from demonstrator and the reporters covering the events
    so others would be blamed for the deaths.

  1. Burmese
    government officials 
    admitted that
    Burma (renamed Myanmar) used false flag attacks against Muslim and
    Buddhist groups within the country to stir up hatred between the two
    groups, to prevent democracy from spreading.

  1. Israeli
    police were again 
    filmed in
    2015 dressing up as Arabs and throwing stones, then turning over
    Palestinian protesters to Israeli soldiers.

  1. Britain’s
    spy agency has 
    admitted (and see
    this
    )
    that it carries out “digital false flag” attacks on
    targets, 
    framing
    people
     by
    writing offensive or unlawful material … and blaming it on the
    target.

  1. The
    CIA has 
    admitted that
    it uses viruses and malware from Russia and other countries to carry
    out cyberattacks and blame other countries.

  1. U.S.
    soldiers have 
    admitted that
    if they kill innocent Iraqis and Afghanis, they then “drop”
    automatic weapons near their body so they can 
    pretend they
    were militants.

  1. German
    prosecutors 
    admit that
    a German soldier disguised himself as a Syrian refugee and planned
    to shoot people so that the attack would be blamed on asylum
    seekers.

(67)
Police frame innocent people for crimes they didn’t commit. The
practice is so well-known that the New York Times 
noted in
1981:

In
police jargon, a throwdown is a weapon planted on a victim.

Newsweek reported in
1999:

Perez,
himself a former [Los Angeles Police Department] cop, was caught
stealing eight pounds of cocaine from police evidence lockers. After
pleading guilty in September, he bargained for a lighter sentence by
telling an appalling story of attempted murder and
“throwdown”–police
slang for a weapon planted by cops to make a shooting legally
justifiable
.
Perez said he and his partner, Officer Nino Durden, shot an unarmed
18th Street Gang member named Javier Ovando, then 
planted
a semiautomatic rifle on the unconscious suspect and claimed that
Ovando had tried to shoot them
during
a stakeout.

Wikipedia notes:

As
part of his plea bargain, Pérez implicated scores of officers from
the Rampart Division’s anti-gang unit, describing 
routinely beating
gang members,
 planting
evidence on suspects, falsifying reports and covering up unprovoked
shootings
.

(As
a side note – and while not technically false flag attacks –
police have been busted 
framing
innocent people in many other ways
,
as well.)

(68)
A former U.S. intelligence officer recently 
alleged:

Most
terrorists are false flag terrorists or are created by our own
security services.

He
has himself 
admitted to
carrying out a false flag attack.

  1. The
    head and special agent in charge of the FBI’s Los Angeles
    office 
    said that
    most terror attacks are committed by the CIA and FBI as false flags.

(70)
The 
Director of
Analytics at the interagency Global Engagement Center housed at the
U.S. Department of State, also an adjunct professor at George Mason
University, where he teaches the graduate course National Security
Challenges in the Department of Information Sciences and Technology,
a former branch chief in the CIA’s Counterterrorism Center, and an
intelligence advisor to the Secretary of Homeland Security (J.D.
Maddox) 
notes:

Provocation
is one of the most basic, but confounding, aspects of
warfare. 
Despite
its sometimes obvious use, it has succeeded consistently against
audiences around the world, for millennia, to compel war
.
A well-constructed provocation narrative mutes even the most vocal
opposition.

***

The
culmination of a strategic provocation operation invariably reflects
a narrative of victimhood: we
are the victims of the enemy’s unforgivable atrocities.

***

In
the case of strategic provocation 
the
deaths of an aggressor’s own personnel are a core tactic of the
provocation
.

***

The
persistent use of strategic provocation over centuries – and its
apparent importance to war planners – begs the question of its
likely use by the US and other states in the near term.

(71)
Leaders throughout history have acknowledged the “benefits” of of
false flags to justify their political agenda:

Terrorism
is the best political weapon
 for
nothing drives people harder than a fear of sudden death”.

Adolph
Hitler

Why
of course the people don’t want war … But after all it is the
leaders of the country who determine the policy, and it is always a
simple matter to drag the people along, whether it is a democracy, or
a fascist dictatorship, or a parliament, or a communist dictatorship
… Voice or no voice, the people can always be brought to the
bidding of the leaders. That is easy. All you have to do is to 
tell
them they are being attacked
,
and denounce the pacifists for lack of patriotism and exposing the
country to danger. It works the same in any country.”

Hermann
Goering, Nazi leader.

The
easiest way to gain control of a population is to 
carry
out
 acts
of terror. [The public] will clamor for such laws if their personal
security is threatened”.
– Josef Stalin

Postscript
1: It is not just “modern” nations which have launched false flag
attacks. For example, a Native American from one tribe (Pomunkey)
murdered a white Englishwoman living in Virginia in 1697 and then
falsely blamed it on 
second tribe
(Piscataway). But he later 
admitted in
court that he was not really Piscataway, and that he had been paid by
a provocateur from a 
third tribe
(Iroquois) to kill the woman as a way to start a war between the
English and the Piscataway, thus protecting the profitable Iroquois
monopoly in trade with the English.

Postscript
2: On multiple occasions, atrocities or warmongering are falsely
blamed on the enemy as a justification for war … when no
such event ever occurred
. This is more like a “fake flag”
than a “false flag”, as no actual terrorism occurred.

For
example:

  • The
    NSA 
    admits that
    it 
    lied about
    what really happened in the 
    Gulf
    of Tonkin incident
     in
    1964 … manipulating data to make it look like North Vietnamese
    boats fired on a U.S. ship so as to create a false justification for
    the Vietnam war

  • One
    of the central lies used to justify the 1991 Gulf War against Iraq
    after Iraq invaded Kuwait was the 
    false
    statement
     by
    a young Kuwaiti girl that 
    Iraqis
    murdered Kuwaiti babies
     in
    hospitals. Her statement was arranged by a Congressman who knew that
    she was actually the daughter of the Kuwaiti Ambassador to the U.S.
    – who was desperately trying to lobby the U.S. to enter the war –
    but the Congressman 
    hid
    that fact from the public and from Congress

  • nother
    central lie used to justify the Gulf War was the statement that 
    a
    quarter of a million Iraqi troops were massed on the border with
    Saudi Arabia
     (see
    also
     this
    article
    )

  • Pulitzer
    prize-winning journalist Ron Suskind 
    reported that
    the White House ordered the CIA to forge and backdate a document
    falsely linking Iraq with Muslim terrorists and 9/11 … and that
    the CIA complied with those instructions and in fact created the
    forgery, which was then used to justify war against Iraq. And
    see 
    this and this

  • Time
    magazine 
    points
    out
     that
    the claim by President Bush that Iraq was attempting to buy “yellow
    cake” Uranium from Niger:

had
been checked out — and debunked — by U.S. intelligence a year
before the President repeated it.

==========================================

* Op WashingtonBlog wordt ook verwezen naar een ander artikel op Newsweek:

MainstreamMedia Admits that False Flags Are Real

Last
month, Newsweek 
ran an
article headlined:

U.S. GOVERNMENT PLANNED FALSE FLAG ATTACKS TO START WAR WITH SOVIET UNION, JFK DOCUMENTS SHOW Zie wat deze link betreft ook: ‘Newsweek erkent ‘false flag’ operatie van de VS tegen de Sovjet Unie……

————————————

Voorts zie ‘Onderbroekbom (25 december 2009) een enorm onzin verhaal, weer zijn we voorgelogen…….

WannaCry niet door Noord-Korea ‘gelanceerd!’

FBI, de spin in het Russiagate web……..

‘Russiagate’ een complot van CIA, FBI, Hillary Clinton en het DNC………..

Syrië: nieuwe gifgasaanval als ‘false flag’ operatie tegen Syrisch bewind in voorbereiding……..

VS geeft toe dat er geen bewijs is voor het gebruik van gifgas ‘door Assad’, ofwel: alweer ‘fake news’ van de massamedia doorgeprikt!

Oost-Ghouta, wat je niet wordt verteld

Ghouta: een gifgas false flag en VS chef Guterres eist staakt het vuren van pro-Syrische strijdgroepen op Oost-Ghouta……

Assad heeft geen gifgas gebruikt tegen de Syrische bevolking!

BBC World Service en BNR met ‘fake news’ over Ghouta……..

US Aggression in Syria – an Imperialist Blueprint

Foreign Ministry: Some Western officials are complicit in the crimes of terrorists against civilians in Damascus and its countryside

SOHR, het orgaan dat door de reguliere media wordt aangehaald i.z. Syrië, is gevestigd in Coventry

Mike Flynn geeft toe te hebben gelogen tegen de FBI, waar dit liegen niet eens nodig was………..

Mike
Flynn, voormalig adviseur van Trump heeft toegegeven dat hij heeft
gelogen tegen de FBI, een dienst die zelf één van de meest leugenachtige organen is van de vele VS inlichtingendiensten (ofwel geheime diensten).

Nog
steeds wordt er ophef gemaakt over contacten met bepaalde Russen,
terwijl dat de normaalste zaak van de wereld is voor een aankomende
administratie in de VS! Zo hebben de leden van een aankomende VS regering altijd contacten met vertegenwoordigers en leden van de Israëlische regering, die haar belangen wil
veilig stellen bij de komende VS regering…….

In
de lobby voor deze belangen, worden niet zelden kapitalen
uitgegeven om gunsten te kopen……

Dat
is nu precies het vreemde aan deze zaak: waarom maakt men zich wel
druk om contacten met bijvoorbeeld de Russische ambassadeur, maar
niet als dit een Israëlische ambassadeur en leden van het
Israëlische kabinet betreft……

Nog
vreemder: Netanyahu, de Palestijnen slachter en premier van de
gestolen staat Palestina, gaat wel even wat verder met het
beïnvloeden van het VS publiek, zoals hij zelfs bij een bezoek in 2015 aan de VS durfde te
doen. Daar las hij NB in het Congres de regering Obama de les over de nucleaire deal met Iran, zonder dat daar onmiddellijk een onderzoek naar werd gestart, een onderzoek naar de ongeoorloofde beïnvloeding van het VS volk………. 

Noch wordt er ooit een onderzoek ingesteld naar de vele
achterbakse deals die met de fascistische apartheidsstaat Israël werden en worden gemaakt, laat staan dat men onderzoek doet naar ongeoorloofde
beïnvloeding van VS burgers en dat NB op de nationale
televisie zenders in de VS (waar de gebeurtenissen in het Congres werden uitgezonden tijdens het voornoemde bezoek van Netanyahu aan de VS….)……..

Overigens zijn dergelijke contacten ook heel normaal als het om de reli-fascistische dictatuur Saoedi-Arabië gaat…….

Wel
laat de bekentenis van Flynn nog eens zien, hoever lobby kan reiken (en rieken), een zaak die
echt niet alleen voor de VS is weggelegd, reken maar dat de
bedrijfslobbyisten in Den Haag overuren en enorme kosten hebben
gemaakt, tijdens de lange regeringsformatie van Rutte 3…… En
zoals we nu weten met succes: de grote bedrijven en aandeelhouders
worden door dit nieuwe kabinet nog verder in de watten gelegd en dat in hypocriet belastingparadijs Nederland………

Lees het volgende artikel van Tyler Durden over deze zaak, eerder geplaatst op Zero Hedge en door mij overgenomen van Anti-Media:

Flynn
Charged With Lying to FBI, Pleads Guilty

December
1, 2017 at 7:36 am

Written
by 
Tyler
Durden

(ZHE) — Special
Counsel Robert Mueller has charged former Trump national security
adviser Michael Flynn with “willfully and knowingly” making
“false, fictitious and fraudulent statements” to the FBI
regarding conversations with Russia’s ambassador. Flynn, in turn,
is expected to plead guilty in a DC court to making false statements
to FBI agents in January 2017, according to the court filing
presented below. The plea hearing is set for 10:30 am ET.

  • COURT
    FILING SAYS FLYNN FALSELY STATED HE DID NOT ASK RUSSIAN AMBASSADOR
    TO REFRAIN FROM ESCALATING SITUATION AFTER U.S. HAD IMPOSED
    SANCTIONS ON RUSSIA

  • COURT
    FILING SAYS FLYNN FALSELY STATED HE DID NOT RECALL THAT RUSSIAN
    AMBASSADOR TOLD HIM RUSSIA HAD CHOSEN TO MODERATE ITS RESPONSE TO
    U.S. SANCTIONS AS A RESULT OF HIS REQUEST

  • COURT
    FILING SAYS FLYNN FALSELY STATED THAT HE DID NOT ASK RUSSIAN
    AMBASSADOR TO DELAY VOTE ON PENDING UN SECURITY COUNCIL RESOLUTION
    AND THAT AMBASSADOR NEVER DESCRIBED RUSSIA’S RESPONSE TO HIS
    REQUEST

Michael
Flynn is now the second person involved with the Trump campaign to
admit wrongdoing in Mueller’s probe into allegations of collusion
between the Trump campaign and Russia; he is however the first Trump
administration official charged in relation to Mueller’s probe into
Russian interference in the 2016 presidential election.

Former
Trump campaign chairman Paul Manafort and aide Rick Gates were
charged with money laundering from alleged crimes that took place
before they worked with Trump. A campaign adviser, George
Papadopoulos, pleaded guilty to lying to the FBI earlier this year
over contacts with officials connected to the Russian government.

After
he left the administration, Flynn filed a foreign registration form
showing that he hadn’t disclosed multiple contacts and payments
from foreign entities while serving as a campaign adviser to Trump
starting in February 2016. The company received $530,000 from a Dutch
company working on behalf of Turkey’s government, to lobby the U.S.
for extradition of an exiled cleric who has opposed President Recep
Tayyip Erdogan of Turkey.

He’s
also disclosed payments from the Russian news site RT, described in
an unclassified U.S. intelligence report as “the Kremlin’s
principal international propaganda outlet.”

The
news about Flynn comes a day after CNN reported that Jared Kushner
had met earlier this month with Mueller’s team as part of the
investigation into Russia’s meddling in the election, according to
two people familiar with the meeting.

The
question is whether as part of the plea Flynn will ‘reveal’
something about Trump, because if 6 months after the Mueller probe
the best he could get out of Flynn is making a “false statement”
about meeting the Russian ambassador, then Trump has nothing to be
worried about.

         

By Tyler
Durden
 /
Republished with permission / 
Zero
Hedge
 / Report
a typo

Brekend nieuws: Jamaica-coalitie in Duitsland gestrand >> ‘schuldige’: Russische reclames op Facebook voor de Siberische Rivièra , borsjt en wodka, betaald door Putin zelf met € 1.000,–!!!

Kajsa Ollongren (D66 vicepremier): Nederland staat in het vizier van Russische inlichtingendiensten……. ha! ha! ha! ha! ha! ha! ha! ha!

D66 leeghoofd en D66 volksverlakker Kajsa Ollongren, die godbetert ministertje van Binnenlandse Zaken mag spelen, heeft vandaag laten weten, dat zij samen met Facebook, Twitter en Google de strijd aan wil  binden met Russische geheime diensten……

‘We’ staan in het vizier van Russische inlichtingendiensten aldus Ollongren……. ha! ha! ha! ha! ha! ha! ha! Ja, ‘we zijn als Nederland, één van de 6 grootmachten op de wereld’, uiteraard van een dergelijk belang dat de Russische geheime diensten Nederland bestoken met reclames voor wodka en borsjt!!

Het was Ollongren, zoals de meeste Nederlandse politici (en die uit andere westerse landen) nog niet opgevallen dat alle verhalen over Russische bemoeienis, met bijvoorbeeld de VS presidentsverkiezingen, op drijfzand zijn gebaseerd, waar zelfs geen nanometer bewijs voor is geleverd……

Wikileaks en dan vooral de Vault 7 en 8 documenten (officiële documenten van o.a. de CIA), geven juist aan dat het de VS geheime diensten als CIA en NSA zijn, die waar het hen maar uitkomt bezig zijn met manipulaties en hacken (zelfs de telefoons van bevriende staatshoofden als Merkel) en daarmee: -verkiezingen verstoren en -opstanden organiseren die moeten uitmonden in een staatsgreep, zoals in Honduras, Libië, Brazilië, Oekraïne en Syrië (met het opzetten van een opstand in dat laatst genoemde land, was de VS al bezig vanaf 2006…..) en -illegale oorlogen beginnen….. Niet Rusland, maar de VS is zonder meer schuldig aan grootschalige cyberterreur en is daarnaast de grootste (‘analoge’) terreurentiteit op aarde!!

Als je Ollongren moet geloven, zou je kunnen stellen dat bijvoorbeeld de Volkskrant, de NRC en NOS onder invloed van Rusland hun nieuws t.a.v. de voorbereiding en de uiteindelijke illegale oorlogen van de VS (en NAVO) tegen Afghanistan, Irak en Libië hebben gebracht, immers dat was allemaal ‘fake news’ of nepnieuws zo u wilt…….. Ollongren stelt wel dat ook anderen zich schuldig maken aan het brengen van ‘fake news’, maar heeft met geen woord gesteld dat de reguliere media zich bewezen keer op keer bezondigen aan het brengen van nepnieuws, laat staan dat ze daar iets tegen onderneemt, de smerige hypocriet!!

Het is duidelijk, dat de AIVD en de MIVD niet hebben stilgezeten en Ollongren in een mum van tijd hebben gehersenspoeld met hun leugens…… De sociale media moeten de mond worden gesnoerd, dat is de werkelijke opzet, die media maken het de AIVD, MIVD en de afhankelijke reguliere media maar moeilijk. doordat ze vertellen wat er echt gebeurd in de wereld, i.p.v. de leugens te volgen, waarmee de VS en de westerse geheime diensten via de reguliere (massa-) media de wereld overspoelen………

Real
fake news – How it’s made

HALF
A BILLION SPENT ON THIS ONE PROGRAM

News
media corruption
World
News

A
PENTAGON PRODUCTION

Here’s the
inside story on just one fake news operation from someone who worked
in it.

Not CNN or
Fox, the US government ran this one.

Total budget:
Half a billion dollars (with a ‘b’)

The
Independent (UK) ran this story:

A
former contractor for a UK-based public relations firm says that the
Pentagon paid more than half a billion dollars for the production and
dissemination of fake Al-Qaeda videos that portrayed the insurgent
group in a negative light.”

=============================

De opgenomen video in dit bericht is niet de originele van Brasscheck TV, die kan ik niet overnemen, hier de link naar het originele bericht met idem video.

Zie ook: ‘Ollongren (D66 minister) manipuleerde bevolking met beschuldiging Russische manipulatie door desinformatie en nepnieuws

       en: ‘Grapperhaus (CDA minister) lanceert een veelomvattende strategie tegen spionage en sabotage door ‘buitenlandse staten’

       en: ‘Job Cohen (PvdA) maakt zich hypocriet druk om Nederlanders die niet gehoord worden >> verkiezingscampagne 2021 van start

        en: ‘Rutte (VVD ‘premier’), VVD was te links: we moeten ‘het fatsoenlijke Bolkestein beleid’ volgen….. ha! ha! ha! ha! ha!

        en: ‘Kasja Ollongren (D66 minister) en de Russische manipulatie van de Provinciale Statenverkiezingen

        en: ‘Privacy: leugens, bedrog, Ollongren (D66 minister) en De Verleiders

        en: ‘Ollongren (D66 minister) schiet een levensgrote bok met fake news show

        en: ‘Ollongren gesteund door Thomas Boesgaard (AD), ‘Rusland verpakt het nepnieuws gekoppeld aan echt nieuws…..’ Oei!!!

        en: ‘New York Times ‘bewijzen’ voor Russiagate vallen door de mand……

        en: ‘Politico rapport bevestigt: Russiagate is een hoax‘ (Russiagate, de enorme leugen op basis waaraan we de huidige censuurgolf te danken hebben……)

       en: ‘Russiagate sprookje ondermijnt VS democratie en de midterm verkiezingen‘ (zie ook de links in dat bericht)

       en: ‘De Israëlische manipulatie van de VS presidentsverkiezingen, gaat veel verder dan wat men Rusland in de schoenen schuift…..

       en: ‘‘Russiagate’: Intel-raport over Russische bemoeienis met verkiezingen opgebouwd met leugens en is politiek gemotiveerd, aldus Matlock, voormalig VS ambassadeur in Moskou

        en: ‘The Attack on ‘Fake News’ Is Really an Attack on Alternative Media‘ (via blog Stan van Houcke)

       en: ‘Ollongren (D66 minister) schiet een levensgrote bok met fake news show

       en: ‘Kaspersky Lab (antivirus) aangevallen met agressief ‘Grapperhaus virus’

       en: ‘The Lie of the 21st Century: How Mainstream Media “Fake News” Led to the U.S. Invasion of Iraq

       en: ‘Mediaorgaan Sinclair dwingt ‘TV ankers’ propaganda op te lezen‘ (Sinclair bedient rond de 70% van de VS bevolking van ‘lokaal nieuws’)

       en:  ‘FBI, de spin in het Russiagate web……..

       en: ‘Mocking Trump Doesn’t Prove Russia’s Guilt‘ (via blog Stan van Houcke)

      en: ‘CIA deed zich voor als het Russische Kaspersky Lab, aldus Wikileaks Vault 8…..‘ (zie ook de andere links onder dat bericht)

       en: ‘WikiLeaks: Seth Rich Leaked Clinton Emails, Not Russia

       en: ‘Hillary Clinton en haar oorlog tegen de waarheid…….. Ofwel een potje Rusland en Assange schoppen!

       en: ‘Murray, ex-ambassadeur van GB: de Russen hebben de VS verkiezingen niet gemanipuleerd

      en: ‘‘Russische manipulaties uitgevoerd’ door later vermoord staflid Clintons campagneteam Seth Rich……… AIVD en MIVD moeten hiervan weten!!

      en: ‘Obama gaf toe dat de DNC e-mails expres door de DNC werden gelekt naar Wikileaks….!!!!

      en: VS ‘democratie’ aan het werk, een onthutsende en uitermate humoristische video!

      en: ‘Democraten VS kochten informatie over Trump >> Forgetting the ‘Dirty Dossier’ on Trump

      en: ‘Hillary Clinton moet op de hoogte zijn geweest van aankoop Steele dossier over Trump……..

      en: ‘Flashback: Clinton Allies Met With Ukrainian Govt Officials to Dig up Dirt on Trump During 2016 Election

      en: ‘FBI Director Comey Leaked Trump Memos Containing Classified Information

      en: ‘Publicly Available Evidence Doesn’t Support Russian Gov Hacking of 2016 Election

      en: ‘Russia Is Trolling the Shit out of Hillary Clinton and the Mainstream Media

      en: ‘CIA chef Pompeo waarschuwt voor complot van WikiLeaks om de VS op alle mogelijke manieren neer te halen……. ha! ha! ha! ha! ha! ha! ha! ha!

      en: ‘Russische ‘hacks’ door deskundigen nogmaals als fake news doorgeprikt >> Intel Vets Challenge ‘Russia Hack’ Evidence

      en: ‘Rusland krijgt alweer de schuld van hacken, nu van oplichters Symantec en Facebook……. ha! ha! ha! ha! ha! ha! ha!

       en: ‘Russiagate, of: hoe de media u belazeren met verhalen over Russische bemoeienis met de VS presidentsverkiezingen……..

       en: ‘‘Russiagate’ een complot van CIA, FBI, Hillary Clinton en het DNC………..

       en: ‘‘Russiagate’ een verhaal van a t/m z westers ‘fake news…..’

       en: ‘Campagne Clinton, smeriger dan gedacht…………‘ (met daarin daarin opgenomen de volgende artikelen: ‘Donna Brazile Bombshell: ‘Proof’ Hillary ‘Rigged’ Primary Against Bernie‘ en ‘Democrats in Denial After Donna Brazile Says Primary Was Rigged for Hillary‘)

       en: ‘Clinton te kakken gezet: Brazile (Democratische Partij VS) draagt haar boek op aan Seth Rich, het vermoorde lid van DNC die belastende documenten lekte

       en: ‘RT America één van de eerste slachtoffers in een heksenjacht op westerse alternatieve media en nadenkend links……

       en: ‘Rusland zou onafhankelijkheid Californië willen uitlokken met reclame voor borsjt…….

       en: ‘Alarm Code Geel: Lara Rense (NOS) voedt Rusland-haat

CIA deed zich voor als het Russische Kaspersky Lab, aldus Wikileaks Vault 8…..

Hoeveel bewijs hebben zogenaamde deskundigen, ‘onafhankelijke journalisten’ en politici nog nodig voor ze eindelijk beseffen dat niet Rusland, maar de geheime diensten van de VS en dan m.n de CIA en de NSA zo ongeveer de hele wereld hacken en manipuleren?? Bij deze VS-cyberterreur doet men zich naar hartenlust voor als Russen (Chinezen, Iraniërs of Syriërs), om zo ‘fake news’ en valse manipulatieve berichten de wereld in te sturen…… Berichten waarmee men bij de westerse bevolkingen haat en angst zaait tegen resp. voor dat land (die landen)……….

Uit het bericht dat ik gisteren van Anti-Media ontving, blijkt dat de CIA het Kaspersky Lab heeft gehackt, een antivirus firma. Daarmee kon en kan de CIA informatie verzamelen van gebruikers die een antivirus programma van Kaspersky Lab gebruiken. Ook kan de CIA (en andere VS geheime diensten) deze computers gebruiken, om deze na manipulatie als oorsprong van bijvoorbeeld hacks in de VS aan te wijzen (zoals computers in Rusland, waar men dan meteen het Kremlin aanwijst als dader…)…..

Ook het Kaspersky Lab is gevestigd in Moskou…….. Moskou, dus Rusland, u weet wel het land dat door o.a. de CIA, de NSA en de FBI verantwoordelijk wordt gehouden voor het hacken van de Democratische voorverkiezingen en het manipuleren van de uiteindelijke VS presidentsverkiezingen……. (zie de links onder het artikel van Hack Read >> HR)

Overigens speelt ook Israël weer ‘een mooie rol’ in het geheel, maar daar kijkt werkelijk niemand nog van op en kritiek op de smerige handelingen van dit gestolen land zijn zo ongeveer verboden en wordt afgedaan als antisemitisme…… Het fascistische apartheidsregime in Israël, kan zonder enige kritiek doen wat het wil, zoals het aanrichten van enorme bloedbaden onder de weerloze Palestijnse bevolking……

Hier een bericht over deze CIA-zaak van HR, dat ik via Anti-Media ontving:

WikiLeaks’
Vault 8 Leaks Show CIA Impersonated Kaspersky Lab

WikiLeaks’ Vault 8 Leaks Show CIA Impersonated Kaspersky Lab

By Waqas on November
10, 2017
 LEAKS SECURITY

Wikileaks
released the source code for Hive on Thursday, a CIA (Central
Intelligence Agency) implants used in transferring exfiltrated
information from target Windows machines. The technical details for
Hive were released back on April 14th, 2017 in 
Vault
7 series of documents
.

Vault
7 series was aimed at detailing activities and hacking capabilities
of the CIA to perform electronic surveillance and cyber warfare.
During the series, WikiLeaks released technical details on 23
tools that were allegedly used by the agency to hack 
Smart
TVs, cars
web
browsers
,
operating systems (including 
WindowsMac,
and 
Linux),
smartphone operating system (including 
Androidand iOS), VLC
player
webcams,
and microphones
.

However,
the latest release has been carried out under the code name of Vault
8. The Vault 8 series will only expose source codes for
previously leaked implants.

This
publication will enable investigative journalists, forensic experts,
and the general public to better identify and understand covert CIA
infrastructure components,” WikiLeaks said. “Hive solves a
critical problem for the malware operators at the CIA. Even the most
sophisticated malware implant on a target computer is useless if
there is no way for it to communicate with its operators in a secure
manner that does not draw attention,” said the 
official
press release
.

Hive
works as a communication tool between malware and “cover
domains.” These domains seem harmless
and “perfectly-boring-looking” to visitors however traffic
from implants communicating with these domains is sent to an
implant operator management gateway called Honeycomb. The collected
data is then sent back to the CIA.


According
to WikiLeaks, CIA used these fake certificates to impersonate
existing entities including Kaspersky Lab.

The
three examples included in the source code build a fake
certificate for the anti-virus company Kaspersky Laboratory,
Moscow pretending to be signed by Thawte Premium Server CA,
Cape Town. In this way, if the target organization looks at the
network traffic coming out of its network, it is likely
to misattribute the CIA exfiltration of data to uninvolved
entities whose identities have been impersonated,” noted WikiLeaks.

WikiLeaks 

@wikileaks

New WikiLeaks publication reveals CIA wrote code to impersonate Kaspersky Labs anti-virus company https://wikileaks.org/vault8/ 

Remember,
the 
US
government has banned Kaspersky Lab
 for
its alleged links with Russia. However, after the release of
Hive’s source code, it’s unclear if the CIA only
impersonated Kaspersky Labs or also hacked their system to
frame the cybersecurity giant and bring Russia under fire.

Also,
Israel played a vital role in hacking Kaspersky Labs. In October
this year, it was reported that in 2015 Israeli spies managed
to 
access
Kaspersky’s backend systems
 and
identified that Russian hackers were discreetly using the software
both as a universal search engine and a spying tool.

===============================================

Zie ook: ‘Grapperhaus (CDA minister) lanceert een veelomvattende strategie tegen spionage en sabotage door ‘buitenlandse staten’

        en: ‘Russiagate? Britaingate zal je bedoelen!

        en: ‘Kaspersky Lab (antivirus) aangevallen met agressief ‘Grapperhaus virus’

        en: ‘WikiLeaks: Seth Rich Leaked Clinton Emails, Not Russia

        en: ‘Hillary Clinton en haar oorlog tegen de waarheid…….. Ofwel een potje Rusland en Assange schoppen!

        en: ‘Murray, ex-ambassadeur van GB: de Russen hebben de VS verkiezingen niet gemanipuleerd

        en: ‘‘Russische manipulaties uitgevoerd’ door later vermoord staflid Clintons campagneteam Seth Rich……… AIVD en MIVD moeten hiervan weten!!

        en: ‘Obama gaf toe dat de DNC e-mails expres door de DNC werden gelekt naar Wikileaks….!!!!

        en: VS ‘democratie’ aan het werk, een onthutsende en uitermate humoristische video!

        en: ‘Democraten VS kochten informatie over Trump >> Forgetting the ‘Dirty Dossier’ on Trump

        en: ‘Hillary Clinton moet op de hoogte zijn geweest van aankoop Steele dossier over Trump……..

       en: ‘Flashback: Clinton Allies Met With Ukrainian Govt Officials to Dig up Dirt on Trump During 2016 Election

       en: ‘FBI Director Comey Leaked Trump Memos Containing Classified Information

       en: ‘Publicly Available Evidence Doesn’t Support Russian Gov Hacking of 2016 Election

       en: ‘Russia Is Trolling the Shit out of Hillary Clinton and the Mainstream Media

       en: ‘CIA chef Pompeo waarschuwt voor complot van WikiLeaks om de VS op alle mogelijke manieren neer te halen……. ha! ha! ha! ha! ha! ha! ha! ha!

       en: ‘Russische ‘hacks’ door deskundigen nogmaals als fake news doorgeprikt >> Intel Vets Challenge ‘Russia Hack’ Evidence

       en: ‘Rusland krijgt alweer de schuld van hacken, nu van oplichters Symantec en Facebook……. ha! ha! ha! ha! ha! ha! ha!

        en: ‘Russiagate, of: hoe de media u belazeren met verhalen over Russische bemoeienis met de VS presidentsverkiezingen……..

        en: ‘Campagne Clinton, smeriger dan gedacht…………‘ (met daarin daarin opgenomen de volgende artikelen: ‘Donna Brazile Bombshell: ‘Proof’ Hillary ‘Rigged’ Primary Against Bernie‘ en ‘Democrats in Denial After Donna Brazile Says Primary Was Rigged for Hillary‘)

        en: ‘Clinton te kakken gezet: Brazile (Democratische Partij VS) draagt haar boek op aan Seth Rich, het vermoorde lid van DNC die belastende documenten lekte

        en: ‘Kajsa Ollongren (D66 vicepremier): Nederland staat in het vizier van Russische inlichtingendiensten……. ha! ha! ha! ha! ha! ha! ha! ha!

        en: ‘Ollongren gesteund door Thomas Boesgaard (AD), ‘Rusland verpakt het nepnieuws gekoppeld aan echt nieuws…..’ Oei!!

        en: ‘RT America één van de eerste slachtoffers in een heksenjacht op westerse alternatieve media en nadenkend links……

        en: ‘WannaCry niet door Noord-Korea ‘gelanceerd!’

        en:  ‘False flag terror’ bestaat wel degelijk: bekentenissen en feiten over heel smerige zaken……….

        en:  ‘FBI, de spin in het Russiagate web……..

        en:  ‘CIA 70 jaar: 70 jaar moorden, martelen, coups plegen, nazi’s beschermen, media manipulatie enz. enz………

        en: ‘CIA en 70 jaar desinformatie in Europese opiniebladen…………

        en: ‘Rusland zou onafhankelijkheid Californië willen uitlokken met reclame voor borsjt…….

       en: ‘‘Russiagate’ een complot van CIA, FBI, Hillary Clinton en het DNC………..

Rutte: het is een ramp als ‘we’ de sleepwet intrekken…….. ha! ha! ha! ha! ha! ha! ha! ha!

Rutte heeft laten weten dat het intrekken van de wet op de veiligheidsdiensten (de sleepwet) een ramp zou zijn……. ha! ha! ha! ha! Waar haalt hij het vandaan??? Alsof de veiligheidsdiensten ook maar één aanslag hebben weten te voorkomen, dat geldt trouwens ook voor de veiligheidsdiensten in het buitenland…..

Als er een aanslag wordt gepleegd blijkt keer op keer dat de veiligheidsdiensten en soms zelfs de politie, de daders al lang in het vizier hadden…..* Hoe kan een verruiming van de bevoegdheden daar in godsnaam verandering in brengen?? Bovendien gaan sommige veiligheidsdiensten zover, dat ze potentiële aanslaglegers van explosieven of zelfs granaten voorzien, zoals in de Antheunisstraat in het Haagse Laakkwartier……….

Maar nee de over een miezerige keeshondendrol getilde zakkenwasser Rutte vindt de sleepwet van ‘cruciaal belang……’ ha! ha! ha! ha! ha! ha!

De sleepwet verzamelt geen hooibergen aan informatie aldus Rutte, maar zoekt juist de spelden in de hooiberg…. ha! ha! ha! ha! Rutte was even vergeten dat die spreekwoordelijke speld nooit gevonden zal worden, dat is namelijk de strekking van het gezegde: een naald in een hooiberg zoeken….

De sleepwet is cruciaal voor ‘onze’** veiligheid, aldus Rutte…… Mensen ik kan wel blijven lachen, met de sleepwet mogen de geheime diensten al onze persoonlijke informatie uit onze computers halen, mocht er  in de nabije toekomst onverhoopt een rechtse staatsgreep plaatsvinden in Nederland, kan men eenvoudig iedereen die maar een beetje lastig kan zijn van zijn/haar bed slepen……. Tot die tijd kunnen geheime diensten ook dissidente stemmen smoren, door de computers van deze critici te besmetten met virussen, de NSA heeft daar hele handleidingen voor, zo bleek uit de Vault 7 documenten op Wikileaks……

Overigens bestaat de kans dat de EU zich zal omvormen tot een dictatuur, daarvoor is een EU regering, EU politie en een EU leger nodig, iets waar men sinds de Brexit om schreeuwt en waarvoor Juncker, de hufter die voorzitter van de Europese Commissie mag spelen, onlangs nog eens een pleidooi hield….. Je zal begrijpen dat zo’n dictatuur de lippen zal aflikken bij de mogelijkheden die de moderne internettechnologie biedt om mensen onder controle te houden, mogelijkheden die ons nu onder valse voorwendselen van ‘veiligheid’ door de strot worden geduwd………

Niet voor niets ook dat de EU geen kritiek leverde op de dictatoriale strapatsen van Rajoy tegen de autonome regering Puigdemont van Catalonië……. Let wel: Rajoy is de premier van een EU-lidstaat, die zich uiterst gewelddadig verzet tegen wat een democratisch recht zou moeten zijn: een referendum organiseren en uitvoeren………

Met de sleepwet is het definitief gedaan met de laatste rest van onze privacy, NB een mensenrecht!!

Als Rutte echt iets voor onze veiligheid zou willen doen, moet hij als eerste stoppen met het steunen van de grootste terreurentiteit op aarde, de VS (tevens de grootste motor voor het creëren van terreur, zoals we die in Europa ervaren…..). Zolang wij de grootschalige barbaarse terreur van de VS steunen, zullen we een doelwit zijn van mensen die wraak willen nemen voor de terreur die we zelf elders aanrichten…….

Zoals je wellicht bekend is, hebben we met Rutte een enorme bedrieger die desnoods met een grijns op z’n domme kop, de grootste leugens serveert als zijnde de enig bestaande waarheid……. Eén ding is zeker: Rutte zal zich als bij het Oekraïne-referendum weer niet neerleggen bij de uitkomst van het referendum……

*  Zie: ‘“Anti-Terror” Presence Preceded NYC Attack by Hours‘ (een verhaal waarin men spreekt over illuminatie en vrijmetselaars, alsof de Bilderberg kliek niet al lang bepaalt hoe een groot deel van de wereld wordt bestuurd. Echter wel met opmerkelijke feiten, die ook andere media hebben gemeld)

** ‘Onze’, dus de gewone hardwerkende Nederlander, niet het plebs dat door de schuld van Rutte 1 en 2 de baan verloor en nu niet meer aan de bak komt……..

Zie ook: ‘Kabinet ‘wil kunnen hacken’, zonder daar melding van te maken………. Hoe bedoelt u, ‘politiestaat??’

       en: ‘1984 bijna voltooid in Groot-Brittannië…… Ofwel de Snooper’s Charter privacy wurgwet dreigt aangenomen te worden…..

       en: ‘1984 BIJNA VOLTOOID IN GROOT-BRITTANNIË (2)- Nazi-Duitsland zou het niet kunnen verbeteren……….

        en: ‘George Orwell standbeeld voor het BBC hoofdgebouw………. ha! ha! ha! ha! ha! ha! 

        en: ‘Groot-Brittannië: de hongercijfers weggepoetst met de VS presidentsverkiezingen……..

        en: ‘Obama maakt ministerie van Waarheid mogelijk en geeft ministerie van Oorlog $ 611 miljard……..‘ Ook in de VS is men bijna klaar voor een totalitaire staat, als beschreven door George Orwell in zijn boek 1984. De VS is wel verder, echte deskundigen duiden de VS, terecht al een aantal jaren aan als politiestaat. Met de nieuwe maatregelen kan je Groot-Brittannië ‘gerust’ politiestaat noemen………..’

        en: ‘Sleepwet: van Haersma Buma, de nieuwe onderkoning van Nederland zal een referendum over de sleepwet naast zich neerleggen….. ha! ha! ha! ha! ha! ha! ha! ha!‘ (intussen is er een ‘paleisrevolutie’ gaande in het CDA, men is het gezever van van Aersma Buma meer dan zat en verzet zich nu ook tegen de sleepwet…….. Waar het CDA heeft laten weten de uitkomst van het referendum wel te eerbiedigen i.t.t. wat van Aersma Buma eerder zo stellig beweerde….. Voor wat het waard is natuurlijk, als het CDA echt ballen had, had het zich al lang teruggetrokken uit de EVP, de EU fractie waar o.a. ook de fascistische Hongaarse Fidesz en de de Poolse fascisten van de PiS deel van uitmaken, partijen die ook inzetten op het totaal wegwerken van het recht op privacy, zoals het echte fascisten betaamt….)

        en: ‘Rutte: het is een ramp als ‘we’ de sleepwet intrekken…….. ha! ha! ha! ha! ha! ha! ha! ha!

Hillary Clinton moet op de hoogte zijn geweest van ‘aankoop’ Steele dossier over Trump……..

Hare kwaadaardigheid Hillary Clinton is nogmaals fiks door de mand gevallen, naar nu nogmaals blijkt heeft haar campagneteam Christopher Steele*, een voormalig MI6 agent, betaald om Trump onderuit te halen….. Eerder schreef Parry al over deze zaak, die door de reguliere media echter voor een fiks deel werd genegeerd, of weggestopt.**

In een andere zaak betreffende het zogenaamde ‘Russia-gate’ verhaal, werd eerder al bekend gemaakt dat de mails die uitlekten uit Clintons campagneteam, niet door de Russen zijn gelekt, maar door minstens één lid van haar campagneteam, die ontevreden was over de uiterst smerige manier waarop Clinton de andere democratische kandidaat, Bernie Sanders, zijn kans op nominatie voor het presidentschap heeft ontnomen.

Deze man Seth Rich*** werd later vermoord gevonden, hij zou zijn vermoord bij een roofoverval op straat, vreemd genoeg werd er niets van hem gestolen, zelfs niet door hem gedragen opzichtige sieraden………. Uiteraard wordt dit afgedaan als een samenzweringstheorie, terwijl er bewijzen genoeg liggen, waaruit opgemaakt kan worden dat dit op z’n zachtst gezegd wel een erg vreemde roofmoord was…….. Al gaf Obama later toe, dat het campagneteam (DNC) van Clinton de bewuste documenten zelf expres heeft gelekt naar Wikileaks…… Natuurlijk moet je niet vergeten, dat de Democratische Partij alle belang bij heeft, dat de moord op Rich niet terug te leiden moet zijn naar het democratische campagneteam, dit zou de partij een ongelofelijk aantal leden en potentiële kiezers kosten…..

Lees het volgende prima artikel van Robert Parry, waaruit je maar één conclusie kan trekken, Hillary Clinton moet op de hoogte zijn geweest van de aankoop van het valse Steele dossier over Trump, waarvoor naar schatting 1 miljoen dollar werd betaald…….. Daaruit kan je ten overvloede de volgende conclusie nog eens trekken: het hele ‘Russiagate’ verhaal is één grote leugen!!

What
Did Hillary Clinton Know and When Did She Know It?

October
26, 2017 at 6:24 am

Written
by 
Robert
Parry

With
the disclosure that Hillary Clinton’s campaign helped pay for the
original Russia-gate allegations against Donald Trump, a new question
arises: what did Clinton know and when did she know it?

(CN) — The
revelation that Hillary Clinton’s campaign and the Democratic
National Committee helped pay for the notorious “Steele Dossier”
of hearsay claims about Donald Trump’s relations with Russia is not
surprising but is noteworthy given how long the mystery about the
funding was allowed to linger

Another
mild surprise is that the Clinton campaign would have had a direct
hand in the financing rather than maintaining an arm’s length
relationship to the dossier by having some “friend of the campaign”
make the payments and giving Clinton more deniability.

Instead,
the campaign appears to have relied on its lawyer, Marc E. Elias of
Perkins Coie, and a confidentiality agreement to provide some
insulation between Clinton and the dossier’s startling claims which
presumably helped inform Clinton’s charge in the final presidential
debate that Trump was Russian President Vladimir Putin’s “puppet.”
Indeed, how much Clinton personally knew about the dossier and its
financing remains an intriguing question for investigators.

Ultimately,
the facts about who commissioned the dossier were forced out by a
congressional Republican subpoena seeking the bank records of Fusion
GPS, the opposition research firm that hired former British
intelligence operative Christopher Steele to compile the opposition
research, known as “oppo,” against Trump.

As
part of the legal wrangling over that subpoena, the Clinton/DNC law
firm, Perkins Coie, wrote a letter releasing Fusion GPS from its
confidentiality agreement.

After
that letter, The Washington Post 
reported on
Tuesday night that the Clinton campaign and the DNC had helped fund
the Steele effort with attorney Elias retaining Fusion GPS in April
2016 and with Fusion GPS then hiring Steele.

The
Post reported that “people familiar with the matter” disclosed
that outline of the arrangement but still would not divulge how much
the Clinton campaign and the DNC paid to Fusion GPS. One source told
me that the total amount came to about $1 million.

Trash
for Cash’

An
irony about Hillary Clinton’s role in funding allegations about
Trump’s connection to the Russians, including claims that he
cavorted with prostitutes in a five-star Moscow hotel while Russian
intelligence operatives secretly filmed him, is that the Clinton camp
bristled when Bill Clinton was the subject of Republican “oppo”
that surfaced salacious charges against him. The Clintons dismissed
such accusations as “cash for trash.”

Nevertheless,
just as conspiratorial accusations about the Clintons gave rise to
the Whitewater investigation and a rash of other alleged “scandals,”
which bedeviled Bill Clinton’s presidency, the Steele Dossier —
also known as the “Dirty Dossier” — provided a map that
investigators have followed for the ongoing Russia-gate investigation
into President Trump.

Much
like those Clinton allegations, Steele’s accusations have had a
dubious track record for accuracy, with U.S. government investigators
unable to corroborate some key claims but, I’m told, believing that
some are true nonetheless.

In
the 1990s, even though the core allegations of wrongdoing about the
Clintons and their Whitewater land deal collapsed, the drawn-out
investigation eventually unearthed Bill Clinton’s sexual
relationship with White House intern Monica Lewinsky and led to his
impeachment in the House although he was acquitted in a Senate trial.

Some
Democrats have openly hoped for the impeachment of President Trump,
too, and they have hitched many of those hopes to the Russia-gate
bandwagon.

There
is also no doubt about the significance of the Steele Dossier in
spurring the Russia-gate scandal forward.

When
Rep. Adam Schiff, the ranking Democratic member of the House
Intelligence Committee, offered what amounted to a
prosecutor’s 
opening
statement
 in
March, his seamless 15-minute narrative of the Trump campaign’s
alleged collaboration with Russia followed the trail blazed by
Steele, who had worked for Britain’s MI-6 in Russia and tapped into
ex-colleagues and unnamed sources inside Russia, including supposedly
leadership figures in the Kremlin.

Steele’s
Methods

Since
Steele could not reenter Russia himself, he based his reports on
multiple hearsay from these anonymous Russians who claim to have
heard some information from their government contacts before passing
it on to Steele’s associates who then gave it to Steele who
compiled this mix of rumors and alleged inside dope into “raw”
intelligence
 reports.

Besides
the anonymous sourcing and the sources’ financial incentives to dig
up dirt, Steele’s reports had other problems, including the
inability of FBI investigators to confirm key elements, such as the
claim that several years ago Russian intelligence operatives secretly
videotaped Trump having prostitutes urinate on him while he lay in
the same bed at Moscow’s Ritz-Carlton used by President Obama and
First Lady Michelle Obama.

That
tantalizing tidbit was included in Steele’s opening report to his
new clients, dated June 20, 2016. Apparently, it proved irresistible
in whetting the appetite of Clinton insiders. Also in that first
report were the basic outlines of Russia-gate.

But
Steele’s June report also reflected the telephone-tag aspects of
these allegations: “Speaking to a trusted compatriot in June 2016
sources A and B, a senior Russian Foreign Ministry figure and a
former top level Russian intelligence officer still active inside the
Kremlin respectively, the Russian authorities had been cultivating
and supporting US Republican presidential candidate, Donald TRUMP for
a least 5 years.

Source
B asserted that the TRUMP operation was both supported and directed
by Russian President Vladimir PUTIN. Its aim was to sow discord and
disunity both within the US itself, but more especially within the
Transatlantic alliance which was viewed as inimical to Russia’s
interests. … In terms of specifics, Source A confided that the
Kremlin had been feeding TRUMP and his team valuable intelligence on
his opponents, including Democratic presidential candidate Hillary
CLINTON, for several years.

The
Kremlin’s cultivation operation on TRUMP also had comprised
offering him various lucrative real estate development business deals
in Russia, especially in relation to the ongoing 2018 World Cup
soccer tournament. However, so far, for reasons unknown, TRUMP had
not taken up any of these.”

Besides
the anonymous and hearsay quality of the allegations, there are
obvious logical problems, especially the point that five years before
the 2016 campaign, virtually no one would have thought that Trump had
any chance of becoming President of the United States.

There
also may have been a more mundane reason why Trump’s hotel deal
fell through. A source familiar with those negotiations told me that
Trump had hoped to get a half interest in the $2 billion project but
that Russian-Israeli investor Mikhail Fridman, a founder of Russia’s
Alfa Bank, balked because Trump was unwilling to commit a significant
investment beyond the branding value of the Trump name.

Yet,
one would assume that if the supposedly all-powerful Putin wanted to
give a $1 billion or so payoff to his golden boy, Donald Trump, whom
Putin anticipated would become President in five years, the deal
would have happened, but it didn’t.

Despite
the dubious quality of Steele’s second- and third-hand information,
the June 2016 report appears to have impressed Team Clinton. And once
the bait was taken, Steele continued to produce his conspiracy-laden
reports, totaling at least 17 through Dec. 13, 2016.

Framing
the Investigation

The
reports not only captivated the Clinton political operatives but
influenced the assessments of President Obama’s appointees in the
U.S. intelligence community regarding alleged Russian “meddling”
in the presidential election.

Still,
a careful analysis of Steele’s reports would have discovered not
only apparent factual inaccuracies, such as putting Trump lawyer
Michael Cohen at a meeting with a Russian official in Prague (
when
Cohen says he’s never been to Prague
),
but also the sort of broad conspiracy-mongering that the mainstream
U.S. news media usually loves to ridicule.

For
instance, Steele’s reports pin a range of U.S. political attitudes
on Russian manipulation rather than the notion that Americans can
reach reasonable conclusions on their own. In one report dated Sept.
14, 2016, Steele claimed that an unnamed senior official in Putin’s
Presidential Administration (or PA) explained how Putin used the
alleged Russian influence operation to generate opposition to Obama’s
Pacific trade deals.

Steele
wrote that Putin’s intention was “pushing candidate CLINTON away
from President OBAMA’s policies. The best example of this was that
both candidates [Clinton and Trump] now openly opposed the draft
trade agreements, TPP and TTIP, which were assessed by Moscow as
detrimental to Russian interests.”

In
other words, the Russians supposedly intervened in the U.S.
presidential campaign to turn the leading candidates against Obama’s
trade deals. But how credible is that? Are we to believe that
American politicians – running the gamut from Senators Bernie
Sanders and Elizabeth Warren through former Secretary of State
Hillary Clinton to President Donald Trump – have all been tricked
by the Kremlin to oppose those controversial trade deals, which are
also broadly unpopular with the American people who are sick and
tired of trade agreements that cost them jobs?

Of
course, the disclosure that the Clinton campaign and the DNC helped
pay for Steele’s opposition research doesn’t necessarily
discredit the information, but it does suggest a possible financial
incentive for Steele and his collaborators to sex-up the reports to
keep Clinton’s camp coming back for more.

Investigative
reporter Robert Parry broke many of the Iran-Contra stories for The
Associated Press and Newsweek in the 1980s. You can buy his latest
book, 
America’s
Stolen Narrative,
 either
in 
print
here
 or
as an e-book (from 
Amazon and barnesandnoble.com).

By Robert
Parry
 /
Republished with permission / 
Consortium
News
 / Report
a typo

=================================================


*   Zie: ‘Rusland zou verkiezingen in de VS hebben gemanipuleerd, terwijl dat nu juist ‘het handelsmerk’ is van de VS…..

**  Zie: ‘Democraten VS kochten informatie over Trump >> Forgetting the ‘Dirty Dossier’ on Trump


*** Zie: ‘WikiLeaks: Seth Rich Leaked Clinton Emails, Not Russia

Zie
ook: ‘
VS
‘democratie’ aan het werk, een onthutsende en uitermate humoristische
video!

 
     
en:
Obama
gaf toe dat de DNC e-mails expres door de DNC werden gelekt naar
Wikileaks….!!!!

        en: ‘Murray,
ex-ambassadeur van GB: de Russen hebben de VS verkiezingen niet
gemanipuleerd


       en: ‘Russian Roulette: The Inside Story of Putin’s War on America and the Election of Donald Trump‘ (artikel in Nederlands)

        en:
FBI
Director Comey Leaked Trump Memos Containing Classified
Information

        en:
Russia
Is Trolling the Shit out of Hillary Clinton and the Mainstream
Media

 
     en:
CIA
chef Pompeo waarschuwt voor complot van WikiLeaks om de VS op alle
mogelijke manieren neer te halen……. ha! ha! ha! ha! ha! ha! ha!
ha!

 
     en:
Russische
‘hacks’ door deskundigen nogmaals als fake news doorgeprikt >>
Intel Vets Challenge ‘Russia Hack’ Evidence

 
     en:
Rusland
krijgt alweer de schuld van hacken, nu van oplichters Symantec en
Facebook……. ha! ha! ha! ha! ha! ha! ha!

 
     en:
Russiagate,
of: hoe de media u belazeren met verhalen over Russische bemoeienis
met de VS presidentsverkiezingen……..

       en: ‘Publicly
Available Evidence Doesn’t Support Russian Gov Hacking of 2016
Election


       en: ‘Alarm Code Geel: Lara Rense (NOS) voedt Rusland-haat