10 Reasons The Dutch-Russia Hacking Story Is Fake News
It never ceases to amaze me how intelligence agency narratives never fail to trip over their own shoelaces.
As my readers know, I tend to write monolithic pieces (understatement) and I am presently three months into researching a major piece of writing that is still a ways off yet. The last thing I intended to do was divert my attention to debunking a hot topic in the current news cycle instead.
But seeing this THE-DUTCH-FILMED-THE-RUSSIANS-HACKING-OUR-ELECTION nonsense all over Twitter, I couldn't help but stop what I was doing and throw a post together to show you guys just how transparently ridiculous the "huge story" is to anyone with the slightest technical know-how, before more innocent people are fooled by the fake news.
So here we go - my first ever time writing an article just for Steemit. I hope you enjoy it, and please pass it on :)
10 Reasons The Dutch-Russia Hacking Story Is Fake News
It was breathlessly announced today by that pillar of independent news sources, US intelligence contractor Eric Garland, that the Dutch possess incontrovertible proof that Russia indeed hacked the US election.
Citing an article in a Dutch publication, Garland let fly with a series of narrative tweets with screenshots of a translation of the article, to make his case.
His original tweet had already clocked over 1800 retweets by the time I happened across it.
A quick Twitter search on "Dutch Russia election" returned hundreds of results, showing that indeed the story was being seeded across social media and replicated thousands of times by both sock puppets and well-meaning believers alike.
By the time I started writing this response, none other than MotherJones had published a craft-less regurgitation that barely scratched a few hundred words, citing only the Dutch article as the basis for the claims.
I am still nostalgic for the pre-Clara Jeffery days when MotherJones could be relied on for cutting edge investigative journalism that didn't simply push intelligence community talking points and false flags, however they appear to be long gone.
But back to the specifics of this particular con-job, let's dissect the story itself, and see why it is completely ludicrous for anyone to take what is being claimed at face value.
1. The Russian Hackers were hacking from a university building when they were identified by the Dutch.
The Dutch article states:
"*It is the summer of 2014. A hacker from the Dutch intelligence agency AIVD has penetrated the computer network of a university building next to the Red Square in Moscow, oblivious to the implications. But one year later, from the AIVD headquarters in Zoetermeer, he and his colleagues are witness to Russian hackers launching an attack on the Democratic Party in the United States. The AIVD hackers had not infiltrated just any building; they were in the computer network of the infamous Russian hacker group Cozy Bear. And unbeknownst to the Russians, they could see everything*."
It never ceases to amaze me how intelligence agency narratives never fail to trip over their own shoelaces. How soon they forget, that one of their biggest attempts to discredit NSA whistleblower Edward Snowden, was over revelations he made about the USA hacking a major Chinese university, that were published by the South China Morning Post in June, 2013.
Yes, that's right, one of the first major scoops of the Snowden files was that the NSA was targeting the computer networks of major universities in enemy nations.
The US was so up in arms about the revelation that they tried to claim it was proof that Snowden was aiding and abetting China by releasing that information. I addressed this in my 2015 article titled "Debunking The Dinosaurs; Dismantling Snowden's Detractors".
Another US deep state apologist, Michael Cohen, had demanded to know why Snowden "leaked operational info to [a] Chinese newspaper" and suggested that Snowden may have directly leaked them docs that might have ended up in the hands of the Chinese government (an abject falsehood).
Quoting my article:
As with much of Cohen’s commentary, he fails to back up his accusations with references so this point has been particularly difficult to research. Many hours of reading South China Morning Post’s Snowden archive later, and the only ‘operational info’ I’ve been able to establish that Snowden discussed with them, was wholesale spying on Chinese university students and on the SMS messages of the general population. Unless he is referring to the mention of mass surveillance being undertaken at-cable, which is a worldwide phenomenon that has been reported consistently around the globe, in many regions..
Indeed, the SCMP revelations fit perfectly with the ongoing theme of Snowden’s leaks; where the public of various countries (most of the countries in the world in fact) are spied on by the U.S. in a wholesale fashion, without warrants or individual suspicion to justify the targeting.
Snowden’s releases have not been about military versus military – but military versus civilians: mass surveillance. To expect him to exclude Chinese civilians, or Russian civilians, or any other, just because the names of those countries are incendiary to the U.S. political mainstream, would be to expect him to discriminate on the basis of nationality, the way his government does. Yet Snowden has very much proved to be a global citizen, and clearly does not adhere to the inherently unjust principle of ‘American exceptionalism’. This does not detract from, but enhances his efficacy in the eyes of the global public.
So to put any credence in this Dutch-Russia-hacking story, you would have to believe that a year after the above Snowden revelations, the Russian government decided to run an elite hacking operation to compromise a foreign election out of a major university in the centre of Moscow, when it was already an established fact that the NSA targeted university networks.
2. The Dutch repeatedly notified the US about it.
The Dutch article continues:
"*That's how the AIVD becomes witness to the Russian hackers harassing and penetrating the leaders of the Democratic Party, transferring thousands of emails and documents. It won't be the last time they alert their American counterparts. And yet, it will be months before the United States realise what this warning means: that with this hacking the Russians have interfered with the American elections. And the AIVD hackers see it all happen*."
The idea that the US wasn't already monitoring the network traffic of a major Russian university smack in the middle of the capital Moscow, is unlikely enough but the idea that they didn't work out that Russia stealing emails and files from political leaders could amount to tampering in the US political process is even more far-fetched.
Them ignoring repeated warnings by an ally in and of itself would be entirely in character with their general ineptitude however Russia has been at the top tier of their target list in particular since Snowden was given asylum if not already prior. Such messages would not have been neglected given their level of interest in any activity of Russian origin post 2013.
This notion of the Dutch repeatedly alerting the Americans and the Americans doing nothing appears to be an attempt to explain the timeline of the leaks without overtly addressing it. The DNC emails span January 2015 until May 25th 2016. Therefore, to sell this nonsense story, they have to pretend the US ignored Dutch warnings, in order to explain how data could be allowed to be exfiltrated over such a long period of time.
3. Mueller's prime objective isn't Trump collusion, it's Russian hacking
Eric Garland's Twitter diatribe jumps from the above suppositions straight into the Mueller probe. His second screenshot of the article's translation begins: "After Trump's election in May 2017, this investigation was taken over by special prosecutor Robert Mueller. It also aims to uncover contacts between Trump's presidential campaign and the Russian government, but the prime objective is bringing to light the Russian interference with the elections."
Just as the news cycle has finally gotten to grips with the fact that even FBI agents working on the Mueller probe who hated Trump thought that there probably wasn't any evidence of Trump colluding with Russia, we are now to believe that the notion of Trump collusion, which was promised would bring down the President, was actually only ever secondary to establishing that Russian hacking occurred at all.
We are supposed to conveniently forget that the very first stipulation in the official terms for Mueller's probe was to establish if there were "any links and/or coordination between the Russian government and individuals associated with the campaign of President Donald Trump".
It's a classic bait and switch. Having failed at the 'collusion' narrative, they now wish us to believe it was always about Russian hacking, mmkay? Except that if it were, the FBI would have examined the DNC's servers immediately, which it famously did not.
Depending on who you believe, either the FBI didn't ask to examine the DNC servers, or the DNC didn't let the FBI examine the servers, or the DNC hired Crowdstrike to do it or the FBI hired Crowdstrike to do it:
The utter confusion in the headlines of the mainstream media is indicative of the giant clusterfuck this Russian hacking story has been all along. No wonder people are bewildered by it all and so easily misled.
4. Anonymous sources, amnesiac author.
Glenn Greenwald has brilliantly demonstrated on more occasions than I can count, why claims such as those made in the Dutch story should never be taken at face value, especially when they come from anonymous sources at pivotal moments in time and just happen to serve the interests of the intelligence agencies.
As if the total lack of sourcing doesn't make this example dubious enough, the author of the article appears to be an amnesiac. Having claimed that repeated messages from the Dutch had been ignored by the Americans, the article soon does an about face:
"*Three American intelligence services state with 'high confidence' that the Kremlin was behind the attack on the Democratic Party. That certainty, sources say, is derived from the AIVD hackers having had access to the office-like space in the centre of Moscow for years. This is so exceptional that the directors of the foremost US intelligence services are all too happy to receive the Dutchmen, because not only do they provide technical evidence for the attack on the Democratic Party, it becomes apparent that they know a lot more*."
Perhaps this is a slip; one of the most notable architectural flaws of the article is its inability to articulate and stick to a cohesive timeline. But the further we get into it, the more and more inaccurate, disjointed and farfetched it becomes. Eventually it devolves into outright, easily disprovable disinformation.
It's always a sure sign of B.S. when an article fails to competently describe the basics of the technologies and tactics they are claiming have been utilised.
The article states:
"*It's somewhat of a 'fluke' that the AIVD hackers were able to acquire such useful information in 2014. The team uses CNA, which stands for Computer Network Attack. These hackers are permitted to perform offensive operations: to penetrate and attack hostile networks*."
As SchnierBlog aptly describes, a Computer Network Attack is a debilitating act of sabotage undertaken to damage or destroy an adversary's network or hardware. A famous example of this would be the Stuxnet virus used to cripple Iran's centrifuges. Computer Network Exploitation, however, such as that which Edward Snowden undertook on behalf of the NSA, is where a network or machine is exploited for the purpose of spying on.
In order for the Dutch to have lurked "for years" as earlier claimed, they would have had to employ the latter, rather than the former approach. The article has misrepresented what they actually did, either because the source for their article is somewhat clueless, or the author is.
But that's not all.
The article says:
"*[The Dutch] team is part of the Joint SIGINT Cyber Unit, a collaborative unit of the AIVD and the Dutch Military Intelligence and Security Service MIVD, of about 300 people. It is unknown exactly what information the hackers acquire about the Russians, but it is clear that it contains a clue as to the whereabouts of one of the most well-known hacker groups in the world: Cozy Bear, also referred to as APT29*."
For those who don't know me, after spending years writing about Snowden, WikiLeaks, Greenwald and associated topics, I finally decided to study all of the Snowden documents myself, eventually teaming up with Elizabeth Lea Vos from Disobedient Media and launching the #DecipherYou series to see what the files contain that no one had previously reported on. The answer was, a lot.
(Studying the files has completely changed my view of the leaks, the intelligence agencies, the United Nations, and in fact the entire world around us and how it really works behind the facade of politics and media. But it has also made me quite adept at being able to "read between the lies" as one of my friends would say.)
So when I see a new term I don't recognise, such as "Joint SIGINT Cyber Unit" my reflex action is to go to EdwardSnowden.com and do a document search on the term. I didn't find anything. So I typed in "Netherlands" instead and read all the returned results. Bingo.
a) A full year prior to supposedly penetrating the Russian network, the Dutch were creating a "Single Point of Contact" for all their domestic and military cyber agencies
b) They were already engaged in Cyberanalytic exchanges with the NSA
c) They had site visits at NSA headquarters
d) They were not yet mass surveilling their own population through cable-taps (where the entire net traffic of the country is bulk collected, a practice that has been pioneered in the West and turned against their own populations and the data funnelled back to NSA through 'partnership' agreements) but had plans to do so, which would have been of extreme interest to NSA, whose goal is to literally collect the entire world's internet traffic wholesale (known as the "collect it all" strategy)
e) The document lists no less than six direct NSA contacts at AIVD as of 2013, probably more (due to the redactions it is unclear which names are duplicated or not later in the document)
f) The document indicates several reasons to believe that the capabilities of the NSA significantly outstrip that of the Dutch
The above points indicate a level of closeness and accessibility that is in stark contrast to that described by the Dutch-Russia-hacking article, which attempts to depict the Dutch hacking team as independent and at arm's length from NSA, rather than the reality: AIVD is a full-fledged NSA second-tier Third Party partner, who divulges every detail of its organisational structure, capabilities, networks, systems and personnel to the NSA in return for advanced analytical capabilities, enhancements and technological support.
6. It is all based on alleged evidence that we will never get to see
Just as with the infamous, debunked Steele dossier, we are once again sold lies on the promise of the existence of video footage that we will never see.
But we have to believe it exists. Just like we have to take an anonymous source's word for it, even though they won't provide any of the evidence they claim to have seen.
Contrary to the erroneous claim in the above tweet of the hackers being filmed where they were sitting, caught in the act, which had led me in turn to respond with this, the article doesn't actually state that the hackers were filmed where they were sitting, but instead that they were filmed passing in and out of a "curved hallway".
While Garland boisterously expounds "They know exactly who did what.." and the article states that the supposed images from the camera were "analyzed and compared to known Russian spies", in a country of 145 million people, they simply do not. Which is why the article tries to clean this discrepancy up with a promise of future value: "Again, they've acquired information that will later prove to be vital."
7. The Dog Whistle
This is the screenshot from Garland's tweet:
The strange reference to MH17 sticks out like a sore thumb. Nowhere else is there any mention of the incident whatsoever, or any qualifier for the out-of-the-blue assertion that the hack must have occurred before MH17 was downed.
This singular, bizarre reference screams dog whistle.
By invoking this previous bone of Dutch-Russia contention, they are surreptitiously transmitting to both their allies and their competitors, the rationale for the Dutch involvement in this media psy-op. It is a calling card.
8. Star Wars and Further Timeline Violations
After a grand, epic battle between the foes, the good guys were victorious. Or so goes the fairy tale being painted for us by the Dutch.
Despite having tried to explain away the years of US inaction by them having missed messages from the Dutch, somehow the NSA are back in the picture in 2014 fighting a real-time cyberwar alongside the Dutch against these nefarious Russian hackers.
There are so many lies in this one screenshot it is almost worth an article in and of itself:
Let's take the four feel-good paragraphs one by one. Firstly, they claim that the Russian hackers only ever got into "the non-classified part of the network." In other words, nothing to fear, dear public, our secrets were safe all along.
Except meanwhile back in reality, the USA is so lax with its data handling practices that even communications between Hillary Clinton when Secretary of State and the DIRECTOR OF THE CIA were caught up in forwarded and re-fowarded email chains on unclassified servers. How do I know this? Hilariously, from the DNC Leaks!
The second paragraph assures us of the timely relaying of messages from the Dutch to the Americans, and the Americans leaping to action stations to notify their counterparts and neutralise the foreign threat.
The third paragraph oddly cites "American media" as the source for the information about this "rare battle" between the agencies, despite the fact that this is supposed to be a giddy exclusive of new information provided by the all-knowing Dutch source.
The fourth paragraph is difficult not to splutter one's coffee over. The Russians are oblivious to the counteraction - the FBI, NSA and the "crucial" Dutch move with "enormous speed". The Dutch and the Americans established a "direct line... to get the information to the United States as soon as possible", according to the article, even though in actuality the NSA has a multitude of direct real-time communications mechanisms with all of its partners, 24/7. So yup, they made a conference call. Gripping stuff.
Could it get any more overblown and dramatic? It's as good as reality TV, folks. Starring Louise Mensch.
But they aren't done yet. First we must literally extoll the historical alliances of global warfare, in order to drum up sufficient levels of emotion to render the cognitive abilities of the reader moot.
Funnily enough, you'd think the "worst cyberattack in history" would have been when the Russians attacked the US energy grid. Except, whoops, it turns out that never happened.
Or maybe it was that time they hacked the German elections. Except, whoops, that never happened either.
How many Russian hacks have to turn out to have not happened before we stop listening to the idiots who keep telling us they did?
9. They lie about the methods of both attack and defence
The situation was so dire, the article claims, that "the Department had to cut off access to the e-mail system for a whole weekend in order to upgrade the security."
OK, let's get something straight. We know from the Snowden documents that the War on Terror was literally fought on Dell workstations with Oracle Databases and Microsoft Exchange Server. The Snowden document discussed earlier, about the Netherlands Cryptanalytic Partnership with the NSA? Read the small print and you see this:
"*80 percent of NSA tools used to find malware are commercial, while 100 percent of Dutch tools are*."
The idea that upgrading the State Department mail server would keep out a team of supposed elite Russian hackers acting on the order of or with the resources of a President is laughable.
But we knew this in June 2017, when the last ridiculous NSA report came out. Elite hackers simply don't behave the way that these foolish media psy-ops keep trying to portray them as.
But then, the NSA doesn't want us to know how elite hackers really behave. The only people giving us information about that have been Edward Snowden (TAO, JTRIG) and WikiLeaks (Vault 7, Vault 8). Both of whom, the NSA subsequently despise with a passion.
10. They avoid the obvious credible narrative like the plague
The only credible narrative in this whole shit-show is that every intelligence agency tries to undermine every other intelligence agency, whenever or however they can, during elections and not during them. The U.S., for example, deployed teams of spies from partner countries to infiltrate all the political parties in the French election. They literally wielded teams of human intelligence assets, on the ground in France, to their own ends. This is established fact, with ACTUAL EVIDENCE: the dispatch orders from the CIA.
That is what evidence of election meddling looks like, and it wasn't even against a supposed adversary - it was against an ally, and they used other allies to do it. But in this backwards, Orwellian world, we aren't allowed to tell the true story.
Instead we are spoon-fed nonsense like this Dutch tripe by comfortable pseudo-journalists and wealthy spin doctors dressed up as "security experts", while the few remaining truth tellers are screaming warnings to their dying breaths.
Then of course, there's these small (sarcasm) factors, supplied to me by a conscientious reader:
Changes the picture just a little, huh?
The saddest part of all is that I could change the title of this piece to "20 Reasons The Dutch-Russia Hacking Story Is Fake News" and continue with ease. There is another three screens in Garland's original diatribe, all chock full of Christopher Steele/GCHQ-grade nonsense and each one is even more fanciful than the last.
His story would have been as credible if his first tweet started with "Once upon a time" and his last tweet finished with "and they all lived happily ever after."
So instead, I'm going to do something different. I'm going to finish by telling you some truths about these agencies, and about the world and how it really works. Truths from the Snowden documents, that you haven't heard about yet, because the mainstream media would probably be fired if they reported on findings from #DecipherYou.
So here's my top 10 findings from that series, in no particular order:
- Internal NSA resistance to 9/11 Commission and Senate Intelligence Committees oversight
- All Osama bin Laden had to do to be undetectable by the NSA was use .PDF
- "It takes a village to spy on the UN" - State Department, NSA and CIA to name a few
- The US considers the UN to be an arm of US foreign policy
- NSA literally planning a system of global control - want their spying network to cover the entire globe
- Proof that NSA started handing over entire databases of data to their "customers" - not just reports
- Internally, NSA claimed credit for both Bush and Powell's bullshit Iraq War speeches at the UN
- NSA wants to take its battlefield targeting alert system used to kill people in Iraq and in war zones, and implement it globally
- NSA has access to and control over the satellites/hardware of partner nations
- It is a total myth that the CIA and NSA are in competition with each other, or that Snowden didn't leak info about the CIA/DIA etc. The documents paint the true picture.
Now, given all the above. The weight of which sits on my shoulders daily.
Tell me again how the biggest story in the world is whether Russia hacked the Democrats.
By Suzie Dawson
Official Website: Suzi3d.com
Journalists who write truth pay a high price to do so. If you respect and value this work, please consider supporting Suzie’s efforts via credit card or Bitcoin donation at this link. Thank you!
Read, Upvote and Share Suzie's Other Steemit Posts!
- Suzie's Introduction On Steemit
- Glenn Greenwald and the Irrelevance of Electoral Politics
- FVEY vs Kim Dotcom
- Understanding World War III
- Just As Intended: The U.S. Election Is Tearing Us To Shreds
- Someone Is Lying To Seth Rich's Family About Kim Dotcom
- Diary of a Person of Interest - Full Documentary on dTube by NSA/FBI target Suzie Dawson
- The Agenda To Destabilize Europe
- Finding hidden gems in the Snowden files: DecipherYou Episode 1
- Finding hidden gems in the Snowden files: DecipherYou Episode 2
- Finding hidden gems in the Snowden files: DecipherYou Episode 3
- Finding hidden gems in the Snowden files: Decipher You Episode 4
- Finding hidden gems in the Snowden files: Decipher You Episode 5
- In Plain Sight: Why WikiLeaks Is Clearly Not In Bed With Russia
The elite need a distraction very very badly and the ultimate distraction is WW3 or civil riots. When you understand that the Clinton Foundation leads to child trafficking through Jeffrey Epstein who claimed to help found the organization, drug smuggling like Mena 2.0 and weapon smuggling. Things become much clearer. Speaking of which a new movie called American Made with Tom Cruise completely decimates the Clintons. (coincidental timing or a concerted effort to bring them down?)
Although, people think its crazy the Clinton Foundation is a bipartisan issue because money has been donated to it by many people.
According to a former undercover FBI agent Marc Ruskin who whistleblew drug smuggling and several of my own sources there are 9,000+ sealed indictments in the U.S.
This is not just an information war this has been an ongoing civil war in the U.S. to take down the bad guys since former LA FBI head Ted L. Gunderson, former 10th CIA director William Colby, and many others rebelled against the Clinton and Bush crime families. I am not 100% sure but Marc Ruskin and Ted L. Gunderson likely knew each other given his age and involvement with the same heroin smuggling operations.
More information on Marc Ruskin confirming he is a whistleblower..
These corrupt parties of Republicans and Democrats have robbed the people blind although this email by Wikileaks which I just was given the other day shows the Dems pilfered union funds and worried about the consequence. The specific email shows them claiming "it could bring down the entire Democrat party." One billion in racketeering.. https://wikileaks.org/podesta-emails/emailid/55711
The Wikileaks email leaks which I am 75% sure Podesta's emails came from a rogue in the NSA (due to talks in my circles), show murder, corruption, use of child sex trafficking or drug smuggling code words (leaning more towards child trafficking.) Although, Pizzagate was greatly exagerated by some the use of child sex symbols is bluntly obvious. Then there is the mysterious video I can't find anymore of a triangle ring and someone clapping in the audience.. However, what many miss is they think the children were kept at the pizza place. This is likely not true instead if it went on it was likely through the mueseum. Wikileaks revealed spirit cooking (the bizzare occult element.) Everyone pretends like everything is okay tell me how normal it is to drink blood, urine and semen mixed together? The elite have enough to hide so blame Russia as a scapegoat and cause WW3 at the expense of normal civilians to stop the dirty stuff coming out.
The corporate media just want war with Russia: plain and simple.
This would mean vast cash handouts across the Military-Industrial Complex, in which corporate media play a huge part.
'Russiagate' is an attempt to stoke the flames of war, similar to how the invasion of Iraq was built on the WMD lie.
Also, when all of the 'Russiagate' Twitter accounts shared the article claiming that 'the Dutch finally have proof that Russia hacked the DNC', they are tacitly admitting that until then there was no proof of it at all. Their witchhunt was merely based on hearsay.
As you say, even the Dutch report is completely inaccurate.
Objectively speaking, a lot of claims have been made. And very little supporting evidence provided.
The author is currently struggling with Steemit's low available bandwidth, and will respond as soon as they are able.
Thank you for your post. :) I have voted for you: 🎁! To call me just write @contentvoter in a comment.
Please Check out my blog also
oooh how lovely! Wish I knew that before! There's tons of content on my blog. Your support is very welcome
Better wait a week, I am not fully functional yet :) +Only content younger than 3 days is allowed to be upvoted by steem.
Hi Suzie -- just wanted to alert you to the fact that when I clicked on the link you made to #10 "It is a total myth that the CIA and NSA are in competition with each other, or that Snowden didn't leak info about the CIA/DIA etc. The documents paint the true picture." -- The Tweet you linked to IN the Tweet has now been removed.... (down the Twitter Technocrat Memory Hole) -- I would really like to read the document in question and I think others would too. This is why I think the BlockChain is a vital ABSOLUTELY VITAL part of getting the word out.. and why Snowden, BB and Assange should stop relying upon Facebook Twitter and NON Blockchain social media to establish what is happening. Once it is on the blockchain -- it's THERE forever... That's what makes this platform different.. THAT and the non throttling, shadowbanning, censoring etc... I am not sure if twitter erased the tweet in question for just me, or for everybody... but when I click on the link within the tweet you link to, to read the document it refers to, it says "That no longer exists". Thanks for this article, by the way. Well done on the work involved in it. I just wrote a brief post about my own experience with coming to terms with the horror of the Surveillance state... if you feel like checking it out. I don't make a lot on my posts so I don't spend a lot of effort on making them... but it does related to what you've described here. Cheers for now!
Thanks for telling me that. It's a topic we have covered a lot in #DecipherYou because it comes up time and time again as so many documents reference and support it.
Here's a short clip from one of the episodes about it:
Here's some of the reporting I did on the same topic back in my analysis of Batch 2: https://decipheryou.com/2016/12/02/analysing-snowdens-sidtoday-files-part-two/ (ctrl-F CIA to find it)
Which references this document just as one example: https://theintercept.com/snowden-sidtoday/3008272-a-graduate-s-view-of-the-icslp-class/
Hope that helps. If you have a look through the DecipherYou episodes I've posted on my Steemit blog, there are timestamped sections for each and that will show more examples too.
Thanks for your time and interest!
People like to belive and accept and worse of all, republish news, which proves useless conspiracies...
Thanks for rich content
I am really impressed by how many people have seen, shared and were moved by this work. It is hugely satisfying to see that people genuinely care about these issues and are not complacent. I am very proud of humanity at the moment :)
I've blogged on news sites for the last couple years, I am very impressed with your work.
The sadest thing about this entire story:
The USA's military arpanet is rolled out over the entire planet
It seems The US wanted this net world wide to be able to spy on everyone, and to some extend that worked. But the net is so damn unsecure. And now the USA is moaning about Russian hackers.
Is the USA whould have made the net more secure instead of leaky as a toilet bowl, then there would not be any hacker not even an imaginary russian hacker... No not even Dutch Hackers hacking imaginary russian hackers.
It just makes me wonder how much the USA has meddled into the Dutch elections with facebook and twitter robots.
And brexit, German election, Catalan Referendum, French election, etc.
The government system is broken beyond repair. The internet itself is broken by design, and now it's biting the US in the ass. It would have been awesome if someone had said OK it's broken, lets fix it. But the governments of the world say ... Lets break it even more. We need need more flaws to be able to catch non existing terrorists.
Not realising that real terrorists also know that the net is insecure, and what do they do? They try not to use the net. So the gov is only spying on innocent people. Since the real bad guys, JUST DO NOT USE THE NET.
Thanks for your article @suzi3d. It's a worth to read. I resteem and hope everyone does.
Thank you so much, I really appreciate that!
amazing post .........................
thank you to share in here
you are so welcome! thank you so much for reading it!
Wow, impressive job. Thanks for being here with your well researched work.
You are so welcome! I'm happy to be here. It is a wonderful community and I am advising everyone I know to join!
thank you so much :)
That's a lot of views
and still climbing apparently. I'm lucky to have a pretty good network of independent media and activists outside of Steemit and decided to post this on Steemit to give the platform some visibility as I'd like all my friends and viewers to join it :)
Congratulations, thanks for sharing, following you and tip!
LOVE your tag line - "Real journalists whistleblow every time they write."
Robert Mueller does know who hacked the DNC but is unlikely to be forthcoming.
Hi @suzi3d I am glad that the publish to Steemit first strategy is working so well. The community will like this especially if the trend continues.
The next suggestion I would have for you is to only list your most recent 10 articles in the links at the end with the most recent one first. That way the first link is the one that possibly is still collecting votes. Also that list is going to get fairly long soon and I don't think that it is reasonable to put all your article links at the end.
I recently wrote a blog on how to try and get upvotes for articles already cashed in. you likely may want to adopt a similar strategy. https://steemit.com/spam/@healthbasics/my-solution-to-fight-spam-and-increase-quality-content-on-steemit-just-one-cultural-change-to-residual-steemit-income
Hey, thank you for the tips!! I'll do that
I was born in Holland, prince Bernard founded Bilderberg, it's a hotel near where I lived...
Interesting! I know too little about the history of the Netherlands
Me too but they did had the first issue of stocks with the VOC going to discover 'India' and they had New Amsterdam... fools ;)
I live in Prague now for quite a long time...
And when you look at the Clinton Foundation, then you can't help but notice the similarities with the WWF that was founded by prince Bernhard. A foundation to protect wildlife is great. But Bernhard still travelled to Africa for recreational hunting on the very animals his WWF was trying to protect. I don't remember all the details, but there was also a part of using money from the foundation to pay for travelling etc.
Clinton just seemed to have remixed this foundation trick and ramped it up to even exceed watergate levels by some magnitude.
Makes me wonder if the 'Cosy Bear' Article was intender to discredit the stuff that HA Goodman reported
'Cosy Bear' went viral but the news that the Dutch spies exposed FISA abused went under the radar as a result? How should i see this?
It's still not clear to me where the newspaper that published the Cosy Bear article got it's info.
Where they mislead by the AIVD, or did they re-chew rumors form that came from 'somewhere' (fake news channels, CIA misinformants?)
Now there was also some 'tabloid news' this week that tried to shed some light on the wealth of the Dutch Royal's, I have not seen the article yet. as i don't know anyone who has that article, and I don't want to waste money on any of todays big media.
Geez, looeez: to think I was lulled into half-believing the MSM spin. Thanks a lot for debunking it. I'm now following you.
The entire “Russia” narrative has the feel of a Monty Python sketch, a skit that grew out of control before being weaponized by the interested parties. It probably started on the night of November 8th as a little fib, the political equivalent of “the dog ate my homework”, the dog of course, being Russian.
As the now monolithic narrative is clearly built on foundations of sand, it feels that those interested parties are scrambling to create evidence to help support its growing weight.
I have a feeling, Edward Bernays would be rather proud of the outcome, but for me, well, it almost makes me yearn for the days-of-old when one could start a war by simply sinking the odd ship and pointing an accusing finger at the enemy-of-the-day.
Thanks for the work that went into creating this article Suzi, it is greatly appreciated.
correct me if i'm wrong here, but isn't this still missing the point? it doesn't actually matter WHO hacked the dnc, the emails that were shared with the world were incredibly damning, showing reprehensible people in charge committing crimes against both children and the american people in general.
how they have managed to shift the focus from what was revealed to who revealed it is quite stunning, and should be alarming.
kind of like how the current fisa abuse scandal may be covered up under 'national security' and that it's all a conspiracy 'theory.'
i truly hope the ultimate loser in all this is the mainstream media, who judging by many comments where they actually allow them are hardly trusted by many as it is.
i really want to live to see the day most people in the west realise they have been under the influence of 1984-style propaganda for generations, and almost nothing we have been told (including by our education systems) is actually true.
but i am happy to have missed the point too.
I'm literally just writing about the bait-and-switch tactics now in point 3. Please periodically press refresh to see the rest of the article. Thanks for your comment, I totally agree :))
When is this ridiculously obvious fakery going to end.....
They're pretty desperate to drag this out as long as possible, huh?
They keep doubling down on top of a double down, even though everyone knows it's complete BS......I feel sorry for the children in schools who are forced by their teachers to swallow this fear mongering hogwash.
The Wallstreet bull has been eating for years so it now can keep shitting all over the planet.
@palikari123 i hope you have a copy of Pink Floyd - The Wall
O really this is fake news..Thanks for sharing...
Total fake news. I'm still writing, hope you're pressing refresh and keeping up with it :)))
Hi @suzi3d! You have received 0.1 SBD tip + 0.05 SBD @tipU from @fishyculture :)
@fishyculture wrote lately about: Sky Becomes Sea Becomes Sky. Feel free to follow @fishyculture if you like it :)
Tipuvote! - upvote any post with with 2.5 x profit :)