Happy #Guccifer2_Day everyone! To celebrate (if that's the right word), I'm making the kindle version of my book "Loaded for Guccifer2.0" FREE for the next few days. It exposes the real story of how, and why, the Russiagate hacking hoax began in earnest six years ago today. (1/?)
On the 15th June 2016, a character calling himself Guccifer2.0 burst onto the internets claiming he was the guy who'd hacked the DNC. He produced documents that had been *purposefully* altered to include "Russian fingerprints." It allowed grateful intelligence agencies to (2/?)
link him to Russia with "High Confidence." Yet, Guccifer2.0 wasn't a cyber-spetznatz. He was a moron. The deeper you went into the story, and files, the more superficial the Russian "fingerprints" became. At a bits and bytes level the prints came from pro-Ukrainian hands. (3/?)
The same was true for other hacking groups like Fancy Bear & Cozy Bear -- also "assessed" to be Russian, and for many of the *trolls* (supposedly) employed by the Russia-based `Internet Research Agency.' All Ukraine. It was all so bizarre that it became my obsession. (4/?)
The story didn't start in 2016. It was a continuation of the Ukrainian Euromaidan revolution of 2014, and based on tried and tested `Cyber-Statecraft' by the same actors going back even further. Iran, North Korea, and China all received the same treatment before Russia did. (5/?)
Cyber-Statecraft became a new gunboat diplomacy. Bullets replaced by bytes. They knew `state-level' hackers don't leave solid evidence. But, if a `private' `independent' firm attributed the `hacks' to troublesome foreign policy foes, then the nation itself could be blamed. (6/?)
A simple `private assessment,' provided a predicate for diplomatic leverage and ultimately sanctions. It didn't matter that there was little or no evidence. It didn't matter that everything on the internet can be faked, how hand-wavy, or how tangential the indicators were. (7/?)
Ultimately, the "hackings" of 2016, and the Russiagate hoax all link back to the root of what is happening in Ukraine today. The same actors are behind both. The U.S. and the rest of NATO had to claim the central squares of the geo-political chess-board. (8/?)
Claiming `Trump was Putin's puppet,' also "proved" that `Yanukovych was Putin's puppet.' `Putin hacking the DNC' in 2016, "proved" that Putin was behind the hackers in Ukraine in 2014. The proof is in Guccifer2.0's first five documents. (9/?)
Their "Russian" fingerprints were copied from a file by Ukrainian hacktivists Cyber-Berkut. They were on the pro-Russian side of the debate, and exposed some of the evidence pointing to Euromaidan being a U.S. led coup d'Etat and annoyed NATO websites. (10/?)
Most in the West ignored their Russian writings. But certain stars of `cy-business' knew all about them. In 2017 one, of CrowdStrike and NATO's Atlantic Council, wore a GUCCI-fer jacket to write it all out for us. He had to. Dmitri Alperovitch knows how stupid we are. (11/?)
Anyway. Happy #Guccifer2.0_Day! The kindle version of `Loaded for Guccifer2.0' is available for Free for the next few days. Here's the link: amazon.com/Loaded-Guccife… Should you wish to buy the paperback, I'd love you long time. (12/?)
Look out for the second book in the series, "Double Cross Hurricane." The players inserted into Trump's 2016 campaign are exposed. It finds their backstories that the media (conveniently) missed, and how - once again - it all links back to the West's struggle to control Ukraine.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Cyber-statecraft has certain traditions. One is; Ellen Nakashima from WaPo reports the story first. On 9th Dec, "according to people familiar with the matter," she broke that cyber-security giant #FireEye had been hacked to bits by #CozyBear. "Imagine my surprise."
The CEO of FireEye (& Mandiant) is cy-biz super-star Kevin Mandia -- a pioneer in awarding 'Advanced Persistent Threat' status to 'nation-state' gangs. As my book shows he was key in making cyber-statecraft the greatest tool of diplomacy since the gunboat. amazon.com/dp/B08MSZHMGP
In cyber-statecraft, the normal nuanced judgments of an attribution are guided (& funded) by the USG to foreign policy approved conclusions. The USG turned to Mandia to make Pandas into #APT1, Kim Jong-un into Sony's Hacker, #Fancy into APT28 & #Cozy into APT29.
In response to the Ukraine crisis, at the Sept 2014 conference, NATO declared that cyber-space was now a `war-zone.' An attack against Critical Infrastructure could, in theory, invoke article V -- collective defense -- Hot War. A #FalseFlag is in place. #BuyCandles
In July 2020 the NSA, and CISA primed the pump with a warning that systems typically used in Critical Infrastructure were about to be hacked. They didn't name who by but noted it would be just like (the False Flag) in Ukraine. They seemed to know something us-cert.cisa.gov/ncas/alerts/aa…
In Aug 2020 the FBI and NSA said they'd found a new (/cough/) "Fancy Bear" malware called 'Drovorub’ -- before Fancy had had a chance to use it. What luck. It was only effective against devices running 8+ yr old Linux like Infrastructure devices that were too Critical to update.
#Phalse-Phlag phishings are in preparation. They'll be blamed on Russia. Inevitably that will drag Trump into it and the end-game will have begun. #Wakeupsheeple. #Russiagate is back.
Yesterday I noticed a story doing the rounds about some websites set up by (note the quotes) "Trump Supporters." Their names tell the story: enemiesofthepeople[.org]/[.us] & enemiesofthenation[.org]/[.com]. Election officials & Dominion employees were marked for death.
@jfslowick first spotted that some of the infrastructure was based in #Russia. His article was spotted by the "calm and rational" @thedailybeast who reported that the FBI were "investigating." Yes. The irony. pylos.co/2020/12/10/ter…
Finally! My book on my search for Guccifer2.0 is finished.
The initial aim was to find the `Lone Hacker,' and I'm as sure as anyone can be that I did. However, in passing, I also uncovered lots of information that's extremely relevant to what's going on right now.
The events of November 2016 & 2020 were geopolitical events hidden behind domestic US politics. The most important thing to understand is that it's an *international* operation. Blame the `dirty Dems' all you like. It won't change a thing.
In March 2014 Obama declared a State of Emergency to "protect the Foreign Policy of the United States" due to the Ukraine crisis. Note that it wasn't for a physical threat against the USA, but in effect, it was to provide a "non-Military solution to the Ukraine Crisis."
2/ I've been busy so forgive me if these points have been made better elsewhere. This is crazy.
The Police have provided us with some CCTV images and claimed timings for the #doorknobdesperados, just as they previously did with Sergei Skripal's movements.
There's a problem.
3/ The problem is fairly fundamental:
It doesn't appear that Sergei, or Julia, even had an opportunity to touch their own doorknob!
From the original Police timeline here: news.met.police.uk/news/renewed-a… we see that Skripal was headed out of town in his BMW at 09:15
1/ Mueller has gone on a Phishing trip, and like most anglers likes to boast about the size of the big one. But there's no evidence of the catch, not even how he reeled them in. We are expected to take his word that "It was *this* big".
2/ I have a *long* standing project in the works looking at Guccifer2.0's documents which is proving to be more than interesting. It should settle it once and for all.
But in the meantime I'd like to look at a few aspects of the new indictment that do not compute.
3/ What Mueller appears to have done is to pick some names that he claims are hackers from "Unit 26165" and "Unit 74455" and claim they hacked the DNC & DCCC. We have no way of knowing if they did, he presents no evidence of *how* they claim to *know* it was these people.