Texas Republican Ted Poe Quits Freedom Caucus Over Their #NeverTrump Intransigence…


Source: Texas Republican Ted Poe Quits Freedom Caucus Over Their #NeverTrump Intransigence…

Sunday Talks – OMB Director Mick Mulvaney -vs- NBC Chuck Todd…


Source: Sunday Talks – OMB Director Mick Mulvaney -vs- NBC Chuck Todd…

‘Wiretapping’ Likely True


Tyler Durden's picture

The “political appointees” in the intelligence community knew exactly what they were surveilling for, former CIA officer Col. Tony Shaffer told Fox News, adding that the case is “much worse than Watergate by an order of magnitude.”

 

While Trump was not physically wiretapped, with a wire into his phone, Shaffer said the “basic fundamental idea and claim is true.”

“Clearly they were after gossip because it was political,” Shaffer said, maintaining that the alleged wiretap had nothing to do with Russia.

Due to the simplicity required to “mask” an American’s name during an incidental wiretap, Shaffer said that the leak of Gen. Michael Flynn’s name was “accidental on purpose.”

Even if the surveillance was done legally, Shaffer exclaimed that whoever is responsible for the “unmasking” of Americans’ names and the leaking of the information are felons.

With Comey and Rogers facing “closed sessions”, and Trump looking for a win, we can’t help but think something substantial looms for the leakers just ahead. Of course, the biggest dilemma for exposing the leakers is the confirmation of what we already know to an even wider audience of deniers – that Snowden, Binney, et al. are 100% correct and the surveillance state’s all-seeing eye is everywhere and far beyond government control. (just remember it’s for your own good).

The Evidence That Russia Hacked The DNC Is Collapsing


Tyler Durden's picture

Authored by Justin Raimondo via TheAntiMedia.org,

The allegation – now accepted as incontrovertible fact by the “mainstream” media – that the Russian intelligence services hacked the Democratic National Committee (and John Podesta’s emails) in an effort to help Donald Trump get elected recently suffered a blow from which it may not recover.

Crowdstrike is the cybersecurity company hired by the DNC to determine who hacked their accounts: it took them a single day to determine the identity of the culprits – it was, they said, two groups of hackers which they named “Fancy Bear” and “Cozy Bear,” affiliated respectively with the GRU, which is Russian military intelligence, and the FSB, the Russian security service.

How did they know this?

These alleged “hacker groups” are not associated with any known individuals in any way connected to Russian intelligence: instead, they are identified by the tools they use, the times they do their dirty work, the nature of the targets, and other characteristics based on the history of past intrusions.

Yet as Jeffrey Carr and other cyberwarfare experts have pointed out, this methodology is fatally flawed. “It’s important to know that the process of attributing an attack by a cybersecurity company has nothing to do with the scientific method,” writes Carr:

“Claims of attribution aren’t testable or repeatable because the hypothesis is never proven right or wrong. Neither are claims of attribution admissible in any criminal case, so those who make the claim don’t have to abide by any rules of evidence (i.e., hearsay, relevance, admissibility).”

Likening attribution claims of hacking incidents by cybersecurity companies to intelligence assessments, Carr notes that, unlike government agencies such the CIA, these companies are never held to account for their misses:

“When it comes to cybersecurity estimates of attribution, no one holds the company that makes the claim accountable because there’s no way to prove whether the assignment of attribution is true or false unless (1) there is a criminal conviction, (2) the hacker is caught in the act, or (3) a government employee leaked the evidence.”

This lack of accountability may be changing, however, because Crowdstrike’s case for attributing the hacking of the DNC to the Russians is falling apart at the seams like a cheap sweater.

To begin with, Crowdstrike initially gauged its certainty as to the identity of the hackers with medium confidence.” However, a later development, announced in late December and touted by the Washington Post, boosted this to “high confidence.” The reason for this newfound near-certainty was their discovery that “Fancy Bear” had also infected an application used by the Ukrainian military to target separatist artillery in the Ukrainian civil war. As the Post reported:

“While CrowdStrike, which was hired by the DNC to investigate the intrusions and whose findings are described in a new report, had always suspected that one of the two hacker groups that struck the DNC was the GRU, Russia’s military intelligence agency, it had only medium confidence.

“Now, said CrowdStrike co-founder Dmitri Alperovitch, ‘we have high confidence’ it was a unit of the GRU. CrowdStrike had dubbed that unit ‘Fancy Bear.’”

Crowdstrike published an analysis that claimed a malware program supposedly unique to Fancy Bear, X-Agent, had infected a Ukrainian targeting application and, using GPS to geo-locate Ukrainian positions, had turned the application against the Ukrainians, resulting in huge losses:

“Between July and August 2014, Russian-backed forces launched some of the most-decisive attacks against Ukrainian forces, resulting in significant loss of life, weaponry and territory.

“Ukrainian artillery forces have lost over 50% of their weapons in the two years of conflict and over 80% of D-30 howitzers, the highest percentage of loss of any other artillery pieces in Ukraine’s arsenal.”

Alperovitch told the PBS News Hour that “Ukraine’s artillery men were targeted by the same hackers, that we call Fancy Bear, that targeted DNC, but this time they were targeting cell phones to try to understand their location so that the Russian artillery forces can actually target them in the open battle. It was the same variant of the same malicious code that we had seen at the DNC.”

He told NBC News that this proved the DNC hacker “wasn’t a 400-pound guy in his bed,” as Trump had opined during the first presidential debate – it was the Russians.

The only problem with this analysis is that is isn’t true. It turns out that Crowdstrike’s estimate of Ukrainian losses was based on a blog post by a pro-Russian blogger eager to tout Ukrainian losses: the Ukrainians denied it. Furthermore, the hacking attribution was based on the hackers’ use of a malware program called X-Agent, supposedly unique to Fancy Bear. Since the target was the Ukrainian military, Crowdstrike extrapolated from this that the hackers were working for the Russians.

All somewhat plausible, except for two things: To begin with, as Jeffrey Carr pointed out in December, and now others are beginning to realize, X-Agent isn’t unique to Fancy Bear. Citing the findings of ESET, another cybersecurity company, he wrote:

“Unlike Crowdstrike, ESET doesn’t assign APT28/Fancy Bear/Sednit to a Russian Intelligence Service or anyone else for a very simple reason. Once malware is deployed, it is no longer under the control of the hacker who deployed it or the developer who created it. It can be reverse-engineered, copied, modified, shared and redeployed again and again by anyone. In other words? – ?malware deployed is malware enjoyed!

“In fact, the source code for X-Agent, which was used in the DNC, Bundestag, and TV5Monde attacks, was obtained by ESET as part of their investigation!

“During our investigations, we were able to retrieve the complete Xagent source code for the Linux operating system….”

“If ESET could do it, so can others. It is both foolish and baseless to claim, as Crowdstrike does, that X-Agent is used solely by the Russian government when the source code is there for anyone to find and use at will.”

Secondly, the estimate Crowdstrike used to verify the Ukrainian losses was supposedly based on data from the respected International Institute for Strategic Studies (IISS). But now IISS is disavowing and debunking their claims:

“[T]he International Institute for Strategic Studies (IISS) told [Voice of America] that CrowdStrike erroneously used IISS data as proof of the intrusion. IISS disavowed any connection to the CrowdStrike report. Ukraine’s Ministry of Defense also has claimed combat losses and hacking never happened….

“’The CrowdStrike report uses our data, but the inferences and analysis drawn from that data belong solely to the report’s authors,” the IISS said. “The inference they make that reductions in Ukrainian D-30 artillery holdings between 2013 and 2016 were primarily the result of combat losses is not a conclusion that we have ever suggested ourselves, nor one we believe to be accurate.’

“One of the IISS researchers who produced the data said that while the think tank had dramatically lowered its estimates of Ukrainian artillery assets and howitzers in 2013, it did so as part of a ‘reassessment” and reallocation of units to airborne forces.’

“’No, we have never attributed this reduction to combat losses,” the IISS researcher said, explaining that most of the reallocation occurred prior to the two-year period that CrowdStrike cites in its report.

“’The vast majority of the reduction actually occurs … before Crimea/Donbass,’ he added, referring to the 2014 Russian invasion of Ukraine.”

The definitive “evidence” cited by Alperovitch is now effectively debunked: indeed, it was debunked by Carr late last year, but that was ignored in the media’s rush to “prove” the Russians hacked the DNC in order to further Trump’s presidential ambitions. The exposure by the Voice of America of Crowdstrike’s falsification of Ukrainian battlefield losses – the supposedly solid “proof” of attributing the hack to the GRU – is the final nail in Crowdstrike’s coffin. They didn’t bother to verify their analysis of IISS’s data with IISS – they simply took as gospel the allegations of a pro-Russian blogger. They didn’t contact the Ukrainian military, either: instead, their confirmation bias dictated that they shaped the “facts” to fit their predetermined conclusion.

Now why do you suppose that is? Why were they married so early – after a single day – to the conclusion that it was the Russians who were behind the hacking of the DNC?

Crowdstrike founder Alperovitch is a Nonresident Senior Fellow of the Atlantic Council, and head honcho of its “Cyber Statecraft Initiative” – of which his role in promoting the “Putin did it” scenario is a Exhibit A. James Carden, writing in The Nation, makes the trenchant point that “The connection between Alperovitch and the Atlantic Council has gone largely unremarked upon, but it is relevant given that the Atlantic Council – which is funded in part by the US State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk – has been among the loudest voices calling for a new Cold War with Russia.” Adam Johnson, writing on the FAIR blog, adds to our knowledge by noting that the Council’s budget is also supplemented by “a consortium of Western corporations (Qualcomm, Coca-Cola, The Blackstone Group), including weapons manufacturers (Lockheed Martin, Raytheon, Northrop Grumman) and oil companies (ExxonMobil, Shell, Chevron, BP).”

Johnson also notes that CrowdStrike currently has a $150,000 / year, no-bid contract with the FBI for “systems analysis.”

Nice work if you can get it.

This last little tidbit gives us some insight into what is perhaps the most curious aspect of the Russian-hackers-campaign-for-Trump story: the FBI’s complete dependence on Crowdstrike’s analysis. Amazingly, the FBI did no independent forensic work on the DNC servers before Crowdstrike got its hot little hands on them: indeed, the DNC denied the FBI access to the servers, and, as far as anyone knows, the FBI never examined them. BuzzFeed quotes an anonymous “intelligence official” as saying “Crowdstrike is pretty good. There’s no reason to believe that anything they have concluded is not accurate.”

There is now.

Alperovitch is scheduled to testify before the House Intelligence Committee, and one wonders if our clueless – and technically challenged – Republican members of Congress will question him about the debunking of Crowdstrike’s rush to judgment. I tend to doubt it, since the Russia-did-it meme is now the Accepted Narrative and no dissent is permitted – to challenge it would make them “Putin apologists”! (Although maybe Trey Gowdy, the only GOPer on that panel who seems to have any brains, may surprise me.)

As I’ve been saying for months, there is no evidence that the Russians hacked the DNC: none, zilch, nada. Yet this false narrative is the entire basis of a campaign launched by the Democrats, hailed by the Trump-hating media, and fully endorsed by the FBI and the CIA, the purpose of which is to “prove” that Trump is “Putin’s puppet,” as Hillary Clinton put it. Now the investigative powers of the federal government are being deployed to confirm that the Trump campaign “colluded” with the Kremlin in an act the evidence for which is collapsing.

This whole affair is a vicious fraud. If there is any justice in this world – and there may not be – the perpetrators should be charged, tried, and jailed.

“If They Want To Blow It Up, They Can” – How Republicans Can Hobble Healthcare Without Repeal


Tyler Durden's picture

Following President Trump’s clarifying tweet yesterday that “Obamacare will explode” on its own…

It is becoming increasingly clear that, even without the ‘repeal’, the Trump administration has already begun using its regulatory authority to water down less prominent aspects of Obamacare.

The Republicans’ failure to repeal Obamacare, at least for now, means it remains federal law. But as Reuters reports, newly confirmed Health and Human Services Secretary Tom Price’s power resides in how to interpret that law, and which programs to emphasize and fund. Earlier this week, Price stalled the rollout of mandatory Medicare payment reform programs for heart attack treatment, bypass surgery and joint replacements finalized by the Obama administration in December.

Hospitals and physician groups have been counting on support from Medicare – the federal insurance program for the elderly and disabled – to continue driving payment reform policies built into Obamacare that reward doctors and hospitals for providing high quality care at a lower cost. The Obama Administration had committed to shifting half of all Medicare payments to these alternative payment models by 2018. Although he has voiced general support for innovative payment programs, Price has been a loud critic of mandatory federal programs that dictate how doctors should deliver healthcare.

Without the backing of Medicare, the biggest payer in the U.S. healthcare system which Price now oversees, the nascent payment reform movement could lose momentum, sidelining a transformation many experts believe is vital to reining in runaway U.S. healthcare spending. Price “can’t change the legislation, but of course he’s supposed to implement it. He could impact it,” said John Rother, chief executive of the National Coalition on Health Care, a broad alliance of healthcare stakeholders that has been lobbying the new administration for support of value-based care.

The move Friday to pull the Republican bill only reinforces the risk to the existing law.

“It seems that the Trump Administration now faces a choice whether to actively undermine the ACA or reshape it administratively,” Larry Levitt, senior vice president at Kaiser Family Foundation, wrote on Twitter.

As a painful reminder, the United States spends $3 trillion a year on healthcare – more by far than 10 other wealthy countries – yet has the lowest life expectancy and the highest infant mortality rate, according to a 2013 Commonwealth Fund report.

Health costs have soared thanks in part to the traditional way doctors and hospitals get paid, namely by receiving a fee for each service they provide. So the more advanced imaging tests a doctor orders or pricey procedures they perform, the more money he or she makes, regardless of whether the patient’s health improves.

“We have a completely broken economy in healthcare,” said Blair Childs, senior vice president at hospital purchasing group Premier Inc. “Literally, all of the incentives in fee-for-service are for higher cost.”

As Reuters concludes, President Trump has already signed an executive order directing the HHS to begin unraveling Obamacare. In the early hours of his presidency, Trump directed government agencies to freeze regulations and take steps to weaken the healthcare law. The order directed departments to “waive, defer, grant exemptions from, or delay the implementation” of provisions that imposed fiscal burdens on states, companies or individuals. These moves were meant to minimize the costs and regulatory burdens imposed on states, private entities and individuals.

David Cutler, the Harvard health economist who helped the Obama Administration shape the ACA, said Price could do all sorts of things to undermine the law.

KOMMONSENTSJANE – CHAFFETZ LEADS OVERSIGHT HEARING INTO DEFENSE DEPT WASTE UNDER OBAMA


Too many Generals and Admirals and not enough grunts and sailors; plus the needed equipment.

kommonsentsjane's avatarkommonsentsjane

Chaffetz Leads Oversight Hearing Into Defense Dept. Waste Under Obama

March 25, 2017 134
(Quin Hillyer, Liberty Headlines) Almost lost in all the hoopla over health-care bills and wiretapping allegations, the House Oversight Committee this week analyzed a topic of what could be major budgetary impact – namely, a reported $125 billion in possible, but unachieved, savings from the Department of Defense.

The DoD’s fumbling first was reported more than three months ago by the Washington Post, which said the Pentagon had “buried” the evidence (or at least tried to) of its own inefficiencies. The Pentagon’s own report had been completed way back in January of 2015, but, according to the Post’s Bob Woodward and Craig Whitlock, “after the project documented far more wasteful spending than expected, senior defense officials moved swiftly to kill it by discrediting and suppressing the results.”
The Post story went on to say that the plan…

View original post 496 more words

KOMMONSENTSJANE – INVESTIGATIONS WITHOUT ANY RESULTS.


The answer is simple “1984” is almost here!

kommonsentsjane's avatarkommonsentsjane

john

GOOGLE WILL LET TERRORISTS PUT VIDEOS ON THEIR SITE BUT WILL HARASS  AMERICAN CITIZENS..

In fact Johnson and Johnson and AT&T pulled all of their ads from Google sites.

GOOGLE IS INTERFERING WITH MY BLOG AND HARASSING ME – A WOMAN

THIS IS FOR DOCUMENTATION.

AND NOW FOR MY BLOG:  THIS IS WHAT WE HAVE TO GO THRU:

We continue to read about all of the investigations that are being held  by Congress; but, it seems there are never any indictments and never any results.

There are 17 different investigating  groups –  this has to stop.It is time to have only the FBI AND CIA.

Look back at the Obama time in office and all of the scandals – Benghazi and the gun-running  operation – no one was put in jail or held accountable- why not?

kommonsentsjane

.

View original post

“They’re Like The Praetorian Guard” – Whistleblower Confirms NSA Targeted Congress, The Supreme Court, & Trump


Tyler Durden's picture

Authored by Chris Menahan via InformationLiberation.com,

NSA whistleblower William Binney told Tucker Carlson on Friday that the NSA is spying on “all the members of the Supreme Court, the Joint Chiefs of Staff, Congress, both House and Senate, as well as the White House.”

Binney, who served the NSA for 30 years before blowing the whistle on domestic spying in 2001, told Tucker he firmly believes that Trump was spied on.

“They’re taking in fundamentally the entire fiber network inside the United States and collecting all that data and storing it, in a program they call Stellar Wind,” Binney said.

“That’s the domestic collection of data on US citizens, US citizens to other US citizens,” he said. “Everything we’re doing, phone calls, emails and then financial transactions, credit cards, things like that, all of it.”

“Inside NSA there are a set of people who are — and we got this from another NSA whistleblower who witnessed some of this — they’re inside there, they are targeting and looking at all the members of the Supreme Court, the Joint Chiefs of Staff, Congress, both House and Senate, as well as the White House,” Binney said.

“And all this data is inside the NSA in a small group where they’re looking at it. The idea is to see what people in power over you are going to — what they think, what they think you should be doing or planning to do to you, your budget, or whatever so you can try to counteract before it actually happens,” he said.

“I mean, that’s just East German,” Tucker responded.

Rather than help prevent terrorist attacks, Binney said collecting so much information actually makes stopping attacks more difficult.

“This bulk acquisition is inhibiting their ability to detect terrorist threats in advance so they can’t stop them so people get killed as a result,” he said.

“Which means, you know, they pick up the pieces and blood after the attack. That’s what’s been going on. I mean they’ve consistently failed. When Alexander said they’d stop 54 attacks and he was challenged to produce the evidence to prove that he failed on every count.”

Binney concludes ominously indicating the origin of the deep state…

“They are like the praetorian guard, they determine what the emperor does and who the emperor is…”

Who’s going to stop them?

*(SEND IN THE CLOWN) -Schumer Enjoying Laugh At President Trump, Doesn’t Know He Just Got Played


Trumpis setting him and the Demorats up, and it seems that they don’t even know it. That’s what happens when you are arrogant.

MY LAST EVER VIDEO?


Those in power have only one objective and that is to maintain the power; which sets in motion the forces that will take them down. So their very nature is what always eventually destroys them.