Binney told me: “Once we proved G–2.0 is a fabrication and a manipulator, the timing and location questions couldn’t be answered but really didn’t matter. I don’t right now see a way of absolutely proving either time or location. But this doesn’t change anything. We know what we know: The intrusion into the Democratic National Committee mail was a local download—wherever ‘local’ is.” That doesn’t change. As to Rosenstein, he’ll have a lot to prove.”READ ON
G H ELIASON—Forget about the DNC. The hackers may have spent months surfing the US secret servers downloading and delivering top secret diplomatic files to their own government. The people entrusted with this weren’t just sloppy with security, this is beyond treason.
It doesn’t matter if it was Seth Rich, though I hope it was ( for identification’s sake), who downloaded data from the DNC servers. The reasons supporting a leak are described by the Veteran Intelligence Professionals for Sanity (VIPS). This shows clearly why the leak to Wikileaks is much more plausible than a hack for the files taken in what is commonly called the DNC hack. This leak was one “hack” of many that was going on.READ ON
FINIAN CUNNINGHAM—It seems all the more significant that this week also saw US internet services launching a major clampdown on anti-war websites, suggesting that the powers-that-be want to shut down any criticism or public awareness of their reckless warmongering. What’s more, the latest round of US sanctions – there have been several previous rounds since the contrived Ukrainian conflict in 2014 – is based on nothing but wild, ridiculous speculation. That only adds insult upon injury.READ ON
This is a detailed summary of military and political developments in Syria since the start of the Russian military operation until now. (2015-2018). It was prepared by Suthfront, a Russian group of independent journalists.READ ON