Threat Alert – West Virginia Police Shut Down I-68, Capture Armed Suspect With Explosives Threatening POTUS and Pentagon…


This is a breaking story, so stay tuned.  Details are sketchy. Here’s what we know so far.  West Virginia State Police and U.S. Secret Service agents shut down part of interstate 68 in West Virginia following an alert of a 42-year-old male heading to Washington DC to carry out a threat against President Trump and the Pentagon.

State police, ATF and FBI officers responded. A 42-year old male has been apprehended.  I-68 is now re-opened. A vehicle search revealed a firearm and explosive powder.

W-VA – […] State Police Captain Shallon Oglesby said the shutdown came after a routine traffic stop at about 10:30 a.m. Wednesday for speeding along the eastbound lanes.

The trooper determined that the stop would require an “in-depth investigation” leading to the shutdown, Oglesby said.

State Police and Preston officials would not confirm reports that the incident involves explosives.

The FBI arrived on scene to assist, an FBI spokeswoman confirmed Wednesday afternoon. (read more)

More from WCHSTV:

West Virginia State Police said Interstate 68 was shut down temporarily Wednesday near the border with Maryland after threats were made to kill President Donald Trump and to blow up the Pentagon.  (read more)

Cory Groshek@CoryGroshek

Continued: “Oglesby said a search of the vehicle revealed a firearm and an explosive powder. A 42-year-old man has been detained for questionin. WV State Police, in conjunction with the FBI and Secret Service, is continuing to investigate this incident, according to Oglesby.”

Jussie Smollett Cleared: MAGA Hate Crime Hoax Expunged from Record


Published on Mar 27, 2019

SUBSCRIBED 122K

The prosecutor dropped all charges and expunged the record of Jussie Smollett, whose hate crime allegation against white “MAGA Country” assailants was deemed a hoax by police. Empire star Smollet is cleared, but what about the real criminals? Right Angle is a production of the Members at https://BillWhittle.com

Corrupt As Hell – Chicago Prosecutor Joseph Magats Drops All Charges Against Jussie Smollett….


In a stunning development Cook County Asst. State Attorney Joseph Magats decided to drop all charges against Jussie Smollett for perpetrating a hate hoax crime.

All of the investigative evidence is solid; all of the evidence that proves Jussie Smollett did perpetrate the hoax is solid; and the police are angry with State Attorney Magats.

It appears the Asst. State Attorney felt the crime was not really that big a deal. As TMZ noted: “You’ll recall State’s Attorney Kim Foxx recused herself from the case. She reportedly had asked cops to stand down at the behest of Tina Tchen – Michelle Obama’s former Chief of Staff and a friend of Jussie’s family. The conflict forced Foxx to bow out. The Cook County State’s Attorney’s Office tells us the decision to drop all charges against Jussie was made by Asst. State Attorney Joseph Magats”.

Joseph Magats, the Asst. State’s Attorney, said he saw no problems with the police investigation or the evidence against Smollett. The charges against Smollett were simply dropped in return for his agreement to do community service, and for forfeiting his bond to the city of Chicago.

Upon making the decision to drop the charges, asst. state attorney Joseph Magats also  said: “Here’s the thing – we work to prioritize violent crime and the drivers of violent crime. Public safety is our number one priority. I don’t see Jussie Smollett as a threat to public safety.

Magats went on to say, “We stand behind the investigation, we stand behind the decision to charge him and we stand behind the charges in the case. The mere fact that it was disposed of in an alternative manner does not mean that there were any problems or infirmities in the case or the evidence.”

Embedded video

CBS Chicago

@cbschicago

“Do you believe that he is innocent?” CBS reporter @adrianasdiaz asks First Assistant Cook County State’s Attorney Joseph Magats about dropping charges against Jussie Smollett. “I do not believe he is innocent,” Magats responds.

3,530 people are talking about this

The decision to drop charges is fully, and specifically, upon the Cook County Asst. State Attorney Joseph Magats. The reasoning is transparently political. Smollett is connected to important Democrats and people within the party apparatus.

Magats’ position is predictable; the Asst. State Attorney for Cook county will claim if he took the Smollett case to it’s conclusion the sentence would likely be community service as punishment. Well, Jussie Smollett will still do the community service, but will not have the conviction… that’s the deal. Two-tiered justice.

This decision is so corrupt and so obviously politically connected, that even Chicago Mayor Rahm Emanuel cannot stand behind it. WATCH:

.

Matt Finn

@MattFinnFNC

12.4K people are talking about this

 

PS, In my humble opinion, the Smollett hate crime was planned as part of the Kamala Harris presidential candidacy rollout.  Jussie Smollett just did a terrible job at pulling it off and the entire operation went sideways.

Kim Foxx@KimFoxxforSA

I’m so excited that @KamalaHarris has decided to run for president. I would not be where I am today without her guidance during my first run for political office, and she has continued to mentor me as I work to reform the criminal justice system in Cook County.  —KF

6,055 people are talking about this

Obama and Pelosi Rally the Troops…


Nothing that happens with professional leftists is organic; everything is always planned, organized, astroturffed, constructed and schemed.  Club officials control everything; plan everything; organize everything; and then enlist specific groups of designed foot-soldiers. This is what they do. This is all they do.  This is all they know how to do….

It might seem subtle, but Team Trump has them off-balance. How far off-balance? Well, remember, they were planning for a sequence. The current objective, an increasingly difficult challenge, is to solidify the launch platform for the chosen one.

(link)

The Club is having a tough time controlling the newbies.  The newest energetic leftists have demands… demands that are against the interests of the club.  The club calls in Teh Lightbringer in an effort to regain control.

The issue is serious.  Can you imagine how desperate they are if they already need to go full Obama?   Quite telling.

(Tweet Link)

Pelosi is trying to control the wildlings they created.  The moonbat activists are non-compliant.  The wildlings want rage; they are like an emotional caucus who will not take direction; they refuse to calm down….

Their intellectual handlers opened a Pandora’s box and told them they only have 12-years to live before the planet is entirely destroyed.   They believe it.  Panic Emoji. They will not have iPhones in twelve years.  Desperate Emoji.  They have already stopped breeding.  It is taking more and more energy to try and control them….

Pelosi and Obama see serious trouble ahead.

How are they going to launch Biden, or the Chosen One?

Eyewitness to a Massacre


Published on Mar 21, 2019

SUBSCRIBED 122K

Watching the New Zealand massacre through the eyes of the shooter gave Firewall host Bill Whittle a look into the abyss that exists between offhanded tweets and the actual insanity of mass murder.

Creepy Porn Lawyer Arrested for Extortion and Fraud – Full Criminal Complaint(s)…


The Southern District of New York (SDNY) has announced criminal charges against attorney Michael Avenatti (full complaint pdf below) for attempting to extract more than $20 million in payments from Nike Corp, a publicly traded company, by threatening to use his ability to garner publicity to inflict substantial financial and reputational harm on the company if his demands were not met.

The SDNY counts against Avenatti include conspiracy to transmit interstate communications with intent to extort, conspiracy to commit extortion and more.  In the SDNY case, attorney Mark Geragos is a co-conspirator.

Additionally and simultaneously, the U.S. attorney’s office in Los Angeles alleged in a separate criminal complaint that Mr. Avenatti embezzled a client’s money to pay his own expenses and cover debts—including for his law firm and coffee business—and defrauded a bank using phony tax returns.

Here’s the SDNY criminal complaint:

https://www.scribd.com/embeds/403095480/content?start_page=1&view_mode=&access_key=key-GNU4PerAKv5uYG2WXk3j

UPDATE: Below is a video of the SDNY Press Conference:

.

(Via Wall Street Journal) […] According to the complaint filed in New York, Mr. Avenatti and Mr. Geragos, the alleged co-conspirator, met with lawyers for Nike in New York on March 19 and threatened to release damaging information unless the company agreed to pay the two lawyers millions of dollars and another $1.5 million to the client Avenatti claimed to represent.

Boies Schiller agreed to federal prosecutors’ request to record another conversation with Mr. Avenatti and did so, this person said.

On a March 20 phone call, Mr. Avenatti said he expected to get $1.5 million for his client and wanted a multi-million-dollar retainer from Nike to conduct an “internal investigation,” according to the complaint. During the call—which was on the eve of the company’s quarterly earnings call—Mr. Avenatti said that if his demands weren’t met, “I’ll go take ten billion dollars off your client’s market cap. … I’m not fucking around.” (link)

Here’s the criminal complaint from California:

https://www.scribd.com/embeds/403107937/content?start_page=1&view_mode=&access_key=key-ghFQ5lajMpNH5Y5MLqwt

Advertisements

The Cultural Trends of Women in Politics during the Roman Empire


 

QUESTION: Mr. Armstrong; I assume you would know the answer. Is it true that the women in ancient times were more like Hillary seeking power compared to modern times?

JF

ANSWER: Yes, I have heard this assertion before. It is only partially true. Unquestionably, the first woman of Eastern culture to act politically was none other than Cleopatra VII. She loved Julius Caesar and bore his son in hopes of taking over Rome. When Caesar was assassinated, she fled Rome back to Egypt. She then seduced Marc Antony. That did not end well and Octavian defeated them as it was portraryed as one of the epic love stories which was probably more for political advantages as is the case with Hillary and Bill who now live separately.

However, it was not appropriate for Octavian to boast a victory over a Roman such as Marc Antony, and yet it was also inappropriate to drag a woman through the streets as being conquered. It was not out of the question that that Octavian had Cleopatra killed for this difficulty. The coinage he issued avoided proclaiming victory over Antony and Cleopatra personally and simply claimed he defeated Egypt.

There appears to be a cultural difference in history between the Eastern area of the Roman Empire and that of the West. The women in the East historically appear to be much more dominant in politics than in the West, where perhaps the saying originated, “Behind every great man stands a great woman supporting him.” I recommend an old BBC series to watch called “I Claudius.” It was a fantastic series that revolved around the Julio-Claudian family that was really driven by the intrigue of Augustus‘ wife- Liva. The series shows how she killed off the heir of her husband, Augustus, so her son, Tiberius, would become emperor. She was said to have more bodies than Hillary is alleged to have orchestrated. The difference was that Liva did not seek to be emperor, where Hillary stuck with Bill to make a run for president.

There was also Agrippina, Jr., who most likely orchestrated the assassination of Britannicus, the son of Emperor Claudius, so her son would become Emperor Nero. Where Livia’s portrait appears on coinage, it is always in the form of a goddess rather than in her own name. In the case of Agrippina, Jr, she is the first woman to be pictured on Roman coinage in her own name. Here she is pictured with her son Nero facing him as she ruled the empire. Eventually, she was so manipulative that Nero was blamed by the people for the murder of Britannicus. Nero eventually turned against her and had her killed.

Women seem to have remained behind the throne following Agrippina Jr. certainly in advising but also acting more like a first lady would. The next woman in the middle of a scandal was the wife of Emperor Trajan – Plotina. A letter Trajan was said to have composed on his deathbed appeared in Rome with Plotina’s signature on it, in which he adopted Hadrian naming him successor to the Empire. This raised suspicion that it was crafted by Plotina who was fond of Hadrian.

We do not really encounter the outright politically dominant women until the late 2nd century and they are from the East. It is not just one woman, but a number of them that began to manipulate politics and take more of an open role. The first is Julia Domna who was the wife of Septimus Severus and the mother of Caracalla.

It was the women of Julia Domna’s family that really dominated politics under 235 AD. Julia Maesawas the sister of Julia Domna and sister-in-law of the Emperor Septimus Severus. Julia Maesa bore two daughters, Julia Soaemias and Julia Mamaea, the mothers of the Emperors Elagabalus and Severus Alexander respectively. Julia lived in Rome with her sister during the reign of Caracalla. Following Caracalla’s assassination and Macrinus’ rise to the throne, Julia was permitted to retire to her home at Emesa in 217 AD. This act of mercy on the part of Macrinus would later prove to be a fatal mistake. Once back in Syria, Julia Maesa masterminded the conspiracy in the provinces that led to the fall of Macrinus and the elevation of her grandson Elagabalus to the throne of the Roman Empire in 218 AD. When Elagabalus was murdered, his mother went with him and they dragged their bodies through the streets of Rome in celebration. Julia Mamaea was the mother of Severus Alexander. She was murdered when her son was assassinated. She was the last of this line of Eastern women to rule.

There was Zenobia, also of the East located in Syria. She led a rebellion and split off the Eastern provinces from Rome. She raised her son to the rank of emperor, but she was the dominant political figure and issued coins proclaiming she was effectively the Empress. Because she was a woman, when she was conquered by Aurelian she was allowed to retire. There was a cultural issue that it did not appear to be appropriate for a man to conquer a woman and execute her.

 

In 479 AD, the emperor Zeno’s mother-in-law, the meddlesome dowager empress Verina, the wife of Leo I, managed to convince her other son-in-law Marcian, son of the late western emperor Anthemius, to a raise a revolt. It collapsed due to the quick reaction of Zeno’s Isaurian general Illus, and Verina’s complicity in both it and in an attempted assassination of Illus was quite plain. She was then given to Illus to be imprisoned in Dalisandus in Isauria. By 484 AD, however, the situation had changed: Illus was reported to be intriguing against the emperor, and not only refused the empress Ariadne’s request that her mother be released, but had the audacity (in Ariadne’s opinion) to avoid being assassinated by her agents (who seem to have been as incompetent as her mother’s had been five years earlier).

Illus withdrew to his native Isauria, and Zenothen sent the patrician Leontius with orders to obtain Verina’s release. The unexpected result of this was that Leontius made peace between Verina and Illus, and after Illusbrought her in full regalia to Tarsus, she crowned Leontius emperor on July 19th, 484 AD. She attempted to convince the provincial forces to go over to him by stressing her legitimate right as empress to crown an emperor, but after a very short occupation of Antioch the rebels were tossed out again, and in September were heavily defeated by Zeno’s army under John the Scythian. The survivors fled to the virtually impregnable fortress of Cherris in Isauria where they remained bottled up until their capture and execution in 488 AD (Verina herself had already died in late 484 AD).

Whenever possible, rebels like Leontius and Illus would have wanted their own coinage, both to underscore their legitimacy as rulers, as well as to pay the troops they so desperately needed. The capture of Antioch provided them with a mint, though one which was not accustomed to gold coinage, and they must have immediately begun turning all available gold into coins bearing the name and titles of Leontius as emperor. The fact that the obverse legend is in the dative case, rather than the expected nominative, shows that it was meant to be seen as an acclimation issue.

The dies for Leontius’ solidi were cut with great rapidity by relatively unskilled craftsmen (the legends can be slightly garbled, Greek U’s are used rather than Latin, etc.). Traditionally, Leontius is thought to have only held Antioch for 12 days but it has been suggested by others that the coronation of Leontius took place in March and that his occupation of Antioch lasted two months.

In any event, thanks to Verina, Leontius’ gold coinage is among the rarest of Roman issues. Few coins have survived simply due to the collapse of the rebellion and the demonetization of any usurper’s coinage. It was tradition to recall all the coinage of a usurper and melt them down. There are in fact only four known examples with each struck from a different pair of dies makes the original abundance of the coinage fairly clear. With this number of dies, it implies that the coinage issue could have easily produced 400 lbs of gold coins to pay the troops. The discovery of these coins confirms both the location and the fact that they were culled out of circulation. The coin illustrated here is from a 19th century Levantine hoard of several hundred solidi of Zeno and Leo I, suggesting that the hoarder did not notice the image of the usurper.

 

USA Happiness Falls in Latest Report: Finland and Nordics Lead the World


Published on Mar 22, 2019

SUBSCRIBED 122K

The latest World Happiness Report shows Finland and four other Nordics lead the world in happiness, while the USA falls from 14th to 19th. Is this just a byproduct of capitalism and vigorous immigration, or a curable condition caused by too much government and politics? Bill Whittle Now is production of the Members at http://BillWhittle.com

3-in-5 Millennials Can’t Sleep, Stressed Over Smartphone Anxiety


Published on Mar 22, 2019

SUBSCRIBED 122K

Roughly 3-in-5 millennials can’t sleep because they’re stressed out over their smartphones. Student loans, paying bills and job security ranked much lower on the list. Stephen Green, Scott Ott and Bill Whittle take the measure of Millennial stress from smartphones and helicopter parents. Right Angle is a production of the Members at http://BillWhittle.com

Mueller’s Report Confirms there was No Russian Hack to Begin With


Mueller’s Report is what was expected. The report does conclude that the Trump campaign did not conspire with Russia during the 2016 election, according to the letter from Barr to Congress. It notes that Mueller’s investigation found the campaign was given “multiple offers from Russian-affiliated individuals to assist the Trump campaign” but no one within the campaign or “anyone associated with it” conspired with Russia.

Essentially, Mueller’s report marked the end of an investigation that was launched in secret months before Trump was even elected by the Democrats. The FBI began gathering clues that made them suspicious of aides to Trump’s campaign under the direction of the Obama Administration which even calls into question Comey’s entire integrity given his white-wash of Hillary’s emails and selling influence via the now-defunct Clinton Foundation.

The FBI probe fueled by Hillary’s dossier she paid to go after Trump mushroomed to include allegations that began with Hillary whether the campaign coordinated with Russian efforts to interfere in the 2016 election. She furthered the idea that Trump himself attempted to obstruct her victory. There was bad blood between Hillary and Putin, to begin with. Putin accused Hillary of inciting a political protest in Russia back in 2011.

Interestingly enough, how do we know the server was hacked since the Democrats refused to turn it over to the FBI? Where is it now? The Democrats seem to have refused to cooperate with the FBI on Russia’s Supposed hacking, and intentionally destroyed the physical evidence of Russian Hacking if it ever existed. Where are the servers, and shouldn’t some Democrats be charged with Obstruction of Justice and aiding espionage for not cooperating in the investigation and destroying evidence? The Democrats (DNC) claimed to have been hacked by Russians ahead of the 2016 presidential election.

However, the timeline rarely is ever looked at in detail and the fact that there was no professional hacking of anyone’s computers. The entire access was simply gained by a fake email saying reset your password known as a phishing email. John Podesta simply did what the fake email said. We all get these and they are not something unique to high-level Russian intelligence, CIA, NSA or any government agency. Teenage kids in their basement try this sort of thing.

The New York Times reported in detail, the FBI discovered that a hacking group linked to the Russian government had gained access to at least one computer at the DNC. However, when the FBI contacted the DNC in September 2015 to let them know, the organization’s tech-support contractor didn’t do much with the information beyond performing “a cursory search of the DNC computer system logs to look for hints of such a cyberintrusion.”

If we assume that there was a professional hack underway, the DNC was notified and did nothing. Indeed, it actually took nine months before DNC officials even held a formal meeting with the FBI about the alleged hack. By that time, it was too little, too late if there was a professional hack, to begin with. The hackers, whoever they were, ultimately had access to the DNC’s network for seven months before top DNC officials ever knew about the attack or hired anyone to combat it. During that time, the hackers stole countless emails and documents, later releasing them to the public.

TIMELINE:

  1. September 2015 – The FBI contacts the DNC’s IT department warning that at least one computer has been compromised by Russian hackers. A technician scans the system and does not find anything suspicious.
  2. November 2015 – The FBI reaches out again to the DNC this time warning them that one of their computers is transmitting information back to Russia. DNC later admitted that IT technicians failed to pass along the message that the system had been breached in typical government worker fashion.
  3. March 19, 2016 – Clinton campaign chairman John Podesta received a phishing email masked as an alert from Google that another user had tried to access his account. This is not a high-level hack but a very common way to get into anyone’s computer. It contains a link to a page where Podesta can change his password and he shared the email with a staffer from the campaign’s help desk. The staffer replies with a typo – instead of typing “This is an illegitimate email,” the staffer types “This is a legitimate email.” Podesta follows the instructions and types a new password, allowing hackers to access all his emails. This was clearly NOT a major sophisticated hack that one would associate with Russia, CIA, or NSA tactic with unlimited resources.
  4. June 12, 2016 – In an interview on British television, WikiLeaks founder Julian Assange says that the website has obtained and will publish a batch of Clinton emails.
  5. June 14, 2016 – The Washington Post reports hackers working for the Russian government accessed the DNC’s computer system. They stated that oppositional research on Donald Trump was taken along with staffers’ emails and chat exchanges. The Kremlin came out and denied that the Russian government was linked to the hack. A US official then told CNN that investigators did not yet conclude that there was a cyberattack directed by the Russian government. This was clearly just a phishing email and not even a high-level cyberattack, which we all get from time to time by people trying to into our accounts.
  6. June 15, 2016 – A cybersecurity firm hired by the DNC posts a public notice on its website describing an attack on the political committee’s computer network by two groups associated with Russian intelligence. According to the post, two Russian-backed groups called “Cozy Bear” and “Fancy Bear” tunneled into the committee’s computer system. In response, a blogger called Guccifer 2.0 claims that he alone conducted the hack, not the Russians. As proof, he posts internal DNC memos and opposition research on Trump. Furthermore, Guccifer 2.0 claims to have passed along thousands of files to WikiLeaks. This was by no means a real hack to even begin with just a low-level phishing email that even a teenager often does and got lucky. Guccifer 2.0 claims were certainly far more credible than the pretend claims by the DNC that this linked back to Russia to start with.
  7. July 22, 2016 – A few days before the DNC convention, WikiLeaks published nearly 20,000 emails hacked from the DNC server. The documents include notes in which DNC chair Debbie Wasserman Schultz insults staffers from the Bernie Sanders campaign and messages that infer the DNC wants Hillary and not Bernie. Wasserman Schultz resigns in the aftermath of that leak.
  8. July 25, 2016 – The FBI announced it was launching an investigation into the DNC “hack” when it was clearly just a phishing email, to begin with, and not a cyberattack at all. Although the statement doesn’t indicate that the agency had a particular suspect in mind, the FBI was pointing the finger at Russia.
  9. July 27, 2016 – During a press conference, Trump talks about Clinton’s use of a private email server while she was secretary of state and calls on hackers to find the 30,000 deleted emails as a joke.
  10. August 12, 2016 – Hackers publish cell phone numbers and personal email addresses for Nancy Pelosi and other members of the Democratic Congressional Campaign Committee.
  11. September 1, 2016 – Putin in an interview with Bloomberg News, said that he and the Russian government have no ties to the hackers. He said that the identity of the culprit or culprits is not as important as the content of the leaks, and ultimately the hackers revealed important information for voters. That much I would have to agree since nothing was fake or altered.
  12. September 22, 2016 – Then Dianne Feinstein and Adam Schiff, the ranking Democratic members of the Senate and House Intelligence Committees, issued a joint statement declaring that based on information they received during congressional briefings, they believe that Russian intelligence agencies carried out a plan to interfere with the election without any hard evidence whatsoever.
  13. September 26, 2016 – During a presidential debate with Clinton, Trump questions whether the DNC cyberattack was carried out by a state-sponsored group or a lone hacker. “It could be Russia, but it could also be China. It could also be lots of other people. It also could be somebody sitting on their bed that weighs 400 pounds.” Indeed, there simply was NO sophisticated cyberattack – just a childish phishing email.
  14. October-November 2016 – Over the course of a month, WikiLeaks published more than 58,000 messages simply taken from the account of John Podesta, Clinton’s campaign chairman because he gave them the password.
  15. October 6, 2016 – DCLeaks, a self-described collective of “hacktivists” seeking to expose the influence of special interests on elected officials, published a batch of documents stolen from Clinton ally Capricia Marshall. DCLeaks is later also claimed to have links to the Russian military intelligence.
  16. October 7, 2016 – The Department of Homeland Security and the Office of National Intelligence on Election Security issued a joint statement declaring that the intelligence community is “confident that the Russian Government directed the recent compromises of emails from US persons and institutions.” According to their statement which is not genuine, they claimed that the document releases on websites WikiLeaks and DCLeaks mirror the methods and motivations of past Russian-directed cyberattacks. But this was not even a cyberattack. It was a low-level phishing email that would not identify a high-level national-level intelligence hacking operation.
  17. November 29, 2016 – Then, after the election, a group of Democratic senators sent a letter to President Obama demanding he declassifies information about “the Russian Government and the US election” intelligence hacking. The Obama Administration then said publicly that they shared with lawmakers that intelligence claiming Russia’s purpose for meddling in the election was to sway voters towards Trump, rather than broadly undermining confidence in the system.

Phishing Email (Fake Email to Get you to Put in Your Password)

What’s less clear is that there was no sophisticated hacking of the DNC servers. This was simply a low-level phishing email that we all get. This is NOT the hallmark of Russian Intelligence, CIA, NSA or any other major government with all their sophistication. It is truly amazing how people have called this “hacking” which means in the computer world someone breaks into your system – not that you give them your password.

Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”

The official definition of Hacking – Cyber-Laws.COM

This simple phishing email has produced a cascade of other criminal investigations targeting people around Trump. The investigation led to the indictment of 34 people and three companies on scores of charges that were never related to the subject matter, to begin with. Dozens of Russian nationals were charged with hacking Democratic computers and spreading disinformation during the campaign. Several Trump aides were convicted of lying to Congress or investigators, or for campaign-finance violations or for tax and bank fraud. All of this for something that was NEVER an actual hack of anyone’s computers.