Leo Goldstein.
I repeat old truths & do original research.
Nov 1 • 5 tweets • 3 min read
1/ #BigTech has been suppressing criticism of #RussiaHoax since January 2017.
On January 7 of 2017, the next day after the unclassified version of the so-called Intelligence Community Assessment ("ICA") to the public, former House Intelligence Committee Chairman Pete Hoekstra exposed it as fraud in an interview with Megyn Kelly:
He noted that the declassified report represents the views of only three intelligence agencies, not seventeen. Hoekstra also questioned DHS and DIA did not co-author or clear the report … The declassified Russian report also lacks standard boilerplate language that it was coordinated within the U.S. Intelligence Community.
The new intelligence report on Russian interference in the 2016 presidential election broke so radically with the way objective and authoritative intelligence community assessments are supposed to be produced that it appears to have been rigged …
The video of the interview vanished from YouTube by January 28, 2017. YouTube has also terminated the account that posted it. This happened more than once.
2/ The quote above is from Fox News article foxnews.com/opinion/was-fr…
The video of the interview was inserted by by @TheLastRefuge2 into an article on his site on the same day. Now this video cannot be found on the Internet. web.archive.org/web/2017012816…
Oct 17 • 10 tweets • 3 min read
1/ Before the Biden-Harris administration torches the globe because of a cyberincident set off by its deranged supporters, as many people as possible should learn some facts about the Internet:
You can easily connect to a computer anywhere in the world from anywhere else and use that computer as if it were your own.
A Democrat operative in the DC can connect to a computer in or around Moscow and email, browse, search, use Bitcoin, and hack from that computer with its Moscow IP address.
Likewise, a "GRU" officer or another covert agent would almost always act through a computer outside of Russia.
Someone attempting to pose as an American would use an IP address located in the US. There are millions of compromised computers in the US alone, and the hackers rent them out.
It's possible to connect with multiple hops and avoid the most advanced surveillance.
2/ It is estimated that only 5% of cybersecurity threat actors are state-affiliated. This is a large exaggeration caused by misattributions and excessive attention given to allegedly state-affiliated actors. cyberarrow.io/blog/malware-s…
Sep 30 • 11 tweets • 4 min read
1/ The Sep-4 indictment of “Russians” Kostiantyn & Elena for allegedly funding Tenet Media is part of another Dem election hoax, conducted jointly with the DOJ.
a) It is based on a mistranslation of the phrase “партизанские проекты” by RT editor-in-chief M. Simonyan. Translation “covert projects”, repeated many times in the indictment, DOJ PR, PBS etc., is incorrect. The correct translation is “guerrilla projects”, where ‘guerrilla’ means irregular or ad hoc.
b) The main "Russian" perpetrator has the Ukrainian name Kostiantyn, rather than Russian Konstantin.
c) It charges Russian citizens who live in Russia. This ensures that the indictment will not be challenged in court, allowing its authors to write anything. This tactic is from Mueller’s playbook.
d) The indictment contains unusually few details and mixes up events from various times in a smear sandwich style.
e) Damian Williams, a former Democratic operative & Biden appointed DA, filed it in SDNY, one of the most corrupt and Trump-hating federal districts.
f) “Kostyantin” has a collaborator who goes by multiple fake names; the indictment mentions only “Grigoriann” (the hoax makers are not familiar with Armenian names, too).
This fake Grigoriann is another covert operativein Russia. For some reason, he uses Google, whereas even most ordinary people in Russia use Yandex.
Fake Grigoriann lives in Moscow and pretends that he lives in Paris, but is not aware of the time difference between Moscow and Paris.
Conclusion: indicted "Kostiantyn" & Elena, & non-indicted fake Grigoriann are Democrat operatives, probably living in the US.
2/ The indictment mentions Commentator-1, Commentator-2, and Commentator-3, who allegedly worked with the US company allegedly funded by "Russians," and leaves it to the media to name conservatives to fill these placeholders.
Dec 21, 2023 • 7 tweets • 3 min read
It says: "faced with an alternative of allowing Trump to win an illegitimate victory, Democrats should ensure that the Electoral College count cannot be completed by January 20 so that Nancy Pelosi becomes president." #Demsurrection drive.google.com/file/d/1d-vw03…
@Muskadoptme @Millie__Weaver @julie_kelly2 @CBS_Herridge Can this explain why the Pelosi police opened the Capitol gates and shut down the Joint Session of Congress on #Jan6?
Jun 28, 2023 • 11 tweets • 3 min read
1/9 The leak of the false version of 2019 Trump–Zelensky call & the following impeachment prevented Trump & Zelensky from talking. That weakened Zelensky vs. the Nazi fringe.
Dems could impeach Trump for anything & any other pretext would be better for them than that phone call. twitter.com/i/web/status/1…2/9 Poroshenko came to power in Ukraine in 2014. His governing coalition included ultranationalist parties & turned toward apartheid by 2018. This turn was marked by Ukraine Language Law.
In 2019, the people of Ukraine rejected this horror, voting for Zelensky by landslide 73%.
Jun 16, 2023 • 6 tweets • 4 min read
Nazi war criminal Kurt Waldheim served as the United Nations Secretary-General, 1972-1981.
W.H.O Director Tedros is a war criminal, too.
Say no to the UN #PandemicAccord & other agendas.
defyccc.com/nazi-war-crimi…twitter.com/i/web/status/1…
Kurt Waldheim & Josef Mengele were among only six names in the top tier of CIA name files of Nazi criminals, declassified under The Nazi War Crimes Disclosure Act of 1998.
1/8 The Stop the Steal movement was itself stolen. On 2020-11-04, @KylieJaneKremer of @america1stwomen (WFAF) started a Facebook group Stop the Steal. It became a movement. Within 22 hours, the group gained >300,000 members. 2.1 Million more joined its waiting list. twitter.com/i/web/status/1…2/8 A week later, the Stop the Steal (& #StopTheSteal) was controlled by twice-convicted felon Ali Alexander. He turned it into an evil parody of #MAGA & his personal cash cow. Ali’s speeches had violent & racist undertones. His events invited troublemakers & White nationalists,
Mar 22, 2023 • 5 tweets • 6 min read
@HouseAdmin 1/ The USCP had no intelligence about the Jan6 "insurrection"/#Fedsurrection/#Demsurrection because it watched only Trump supporters, who neither planned nor committed the violence. This is why the intel was negative @HouseAdmin 2/ The email from Sean Gallagher to Schumer aide Kelly Fado was not legit intel. It was an attempt to falsely link Trump to the #Jan6th Capitol attack. It contained information which had already been investigated by @FBI and found negative for threats. defyccc.com/wp-content/upl…
Feb 26, 2023 • 7 tweets • 5 min read
The wife of the special counsel #JackSmith donated to Joe Biden’s campaign & was one of the producers of Michelle Obama’s documentary for #Netflix.
ijr.com/top-investigat…#JackSmith, recruited by Merrick Garkand from the ICC to prosecute President Trump, was complicit in IRS targeting conservative non-profits, together with notorious Lois Lerner.
Old telecom regulations were directed at phone companies and ended outside or in the walls of our homes where phone jacks are. #Obamanet reached deep into our homes, where Internet modem routers are, in violation of the IV, "to be… twitter.com/i/web/status/1…
Feb 10, 2023 • 9 tweets • 4 min read
1/7 #NordstreamSabotage pipelines was an amateurish operation. There are four pipelines, two in each of Nord Stream 1 & #NordStream2. The saboteurs breached the pipelines in four places, likely intending to damage all four lines.
2/7 Instead, they breached the same NS-2 pipeline twice, leaving one NS-2 pipeline intact.
The explosions at less than 100 m depth caused small earthquakes. The estimate is that hundreds kilograms of explosives haves been used in each of them (CNBC). cnbc.com/2022/10/06/nor…
Feb 4, 2023 • 5 tweets • 7 min read
@PlaysTrumpCard@usairforce can take down the chinese balloon by flying over it F-15 dispersing infrared chaff (most types of it). It will melt and burn holes in the thin plastic envelope.
The payload will land slowly, because the envelope will act as a parachute. No risk. cc @JMichaelWaller@PlaysTrumpCard@usairforce@JMichaelWaller Or drop on the balloon bottle corks, tennis balls, empty bear cans; disperse small ice pellets from the supermarket.
They will make holes in the envelope, but will not be dangerous on the ground. cc @JasonMillerinDC