{"id":317654,"date":"2017-07-17T00:31:48","date_gmt":"2017-07-16T23:31:48","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/?p=317654"},"modified":"2017-07-17T14:18:14","modified_gmt":"2017-07-17T13:18:14","slug":"russiagate-exposed-fraud","status":"publish","type":"post","link":"https:\/\/rinf.com\/alt-news\/newswire\/russiagate-exposed-fraud\/","title":{"rendered":"Russiagate Exposed: It&#8217;s a Fraud"},"content":{"rendered":"<p class=\"p1\"><b>The Truth that&#8217;s Being Hidden from the Public<\/b><\/p>\n<p class=\"p1\"><span class=\"s1\">Eric Zuesse<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">It has now been incontrovertibly proven that the time-stamps and other data in the Democratic National Committee (DNC) files that were leaked to Wikileaks are consistent with those files having been leaked by a person who was inside the DNC and not by an external hacker as has been presumed by all of the \u2018news\u2019-reports that this was a \u2018hack\u2019 of any sort \u2014 not from Russia nor from anywhere else outside the building, much less from outside the east coast time zone. There\u2019s a very real scandal involved in this matter, but it is extremely different from the Russia-hack narrative, and it will be revealed here (for the first time anywhere) at the very end. But, first things first \u2014 and that\u2019s what the previous investigators have now proven:<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">On July 9th, was published at Disobedient Media <a href=\"http:\/\/disobedientmedia.com\/2017\/07\/new-research-shows-guccifer-2-0-files-were-copied-locally-not-hacked\/\"><span class=\"s2\">a report<\/span><\/a> that not only discredits the \u2018news\u2019 reports that the Russian government (or anyone else in Russia) \u2018hacked the election\u2019 \u2014 discredits the very core of the <a href=\"http:\/\/archive.is\/RIbVh\"><span class=\"s2\">Russiagate story<\/span><\/a> \u2014 but that shows the \u2018hacks\u2019 were instead likelier <i>leaks<\/i>, to Wikileaks, by someone who had <i>physical access to the computers<\/i> at the Democratic National Committee, and who, in any case, was clearly and incontrovertibly operating only within the time-zone of America\u2019s east coast \u2014 not at all in Russia, nor anywhere else <i>outside<\/i> that time zone. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In other words: it shows that the data itself provide indications that this was a leak instead of any hack at all: that the former UK Ambassador to Uzbekistan, Craig Murray (who claimed to have picked up the data-recording device from the leaker in DC and brought it to his friend Julian Assange at the Ecuadorean Embassy in London) was correct when he <a href=\"http:\/\/www.globalresearch.ca\/the-russian-hacking-how-the-leaks-from-clinton-and-the-dnc-happened\/5566625?print=1\"><span class=\"s2\">had said<\/span><\/a> that he picked the file up from an insider who gave it to him in Washington DC \u2014 that the data themselves are more consistent with that than with the \u2018hack\u2019 interpretation of the narrative of how Wikileaks obtained these data.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">So, now we have not only Murray\u2019s testimony about it, and we have not only <a href=\"http:\/\/rinf.com\/alt-news\/editorials\/truth-clinton-dnc-leaks\/\"><span class=\"s2\">my own investigation<\/span><\/a> showing that Murray had, in fact, <i>been<\/i> in Washington DC at the very time he says he had picked up the information physically in DC from the leaker there, but we also now have \u2014 as of July 9th \u2014 <b>the technical proof of its having likely been transferred to Wikileaks by means of a leak instead of a hack.<\/b> Even the data that were transferred are entirely consistent with this having been a voluntary release of this information.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Consequently, any \u2018news\u2019medium, after July 9th, which <i>still<\/i> \u2018reports\u2019 about Russiagate, which so much as even just suggests that people in Russia \u2018hacked\u2019 these data from the DNC, are now the lowest order of fake \u2018journalism\u2019, not an authentic journalistic operation at all, but pure propaganda. How long will it take for that lie (the Russiagate-myth) to stop being published as being established truth by the U.S. (and its allied) \u2018news\u2019 media? But it continues to be embellished, as if that basic storyline is likely or even definitely true. It is much likelier false than true.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Here then will be presented, first of all, a generally good summary dated July 15th, of this important new information, a summary of what was published on July 9th by Disobedient Media; and I am here publishing a transcript that I have made of this video, which was uploaded to youtube on July 15th, in which, by means of questions and answers, the gist of the findings in the July 9th report and of how the findings had been obtained, is set forth, in that July 15th video, which is titled, <a href=\"https:\/\/www.youtube.com\/watch?v=3t20e_dXws8\"><span class=\"s2\">&#8220;TV Exclusive: Forensic investigator says DNC computer hacked locally\u201d<\/span><\/a>:<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>A forensics expert has determined that the DNC computers were hacked locally by someone with physical access to the DNC network and not by someone far away like the Russians. This story was broken online by the hot new investigative website called Disobedient Media. The forensic expert handed over the information to the reporter Elizabeth Vos. Joining me this time out of Iowa City Iowa is the managing editor of Disobedient Media.com, Ethan Lyle; Ethan, welcome to the show.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Thank you.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Ethan, no one has been sitting on this story you guys are. Tell us how you got this information and what we know.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Elizabeth Vos, Disobedient Media\u2019s associate editor \u2014 a man named Adam Carter reached out to her. And he had an analysis from somebody online named The Forensicator.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Let me ask you: Who was Adam Carter? Adam Carter got this and gave it to you guys; who is he?<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>He\u2019s an independent journalist<\/i> [who had, in fact, long been working on this case]<i>. And, so,<\/i> [as Carter called to Vos\u2019s attention]<i> an anonymous blog of a forensic analyst looked at the data, and he had noticed that because of the transfer-speed and the timing of those transfers<\/i> [it was actually only one transfer]<i>, that they were <\/i>[the person was on the] <i>east coast, and they<\/i> [the files]<i> had to have been accessed in the east coast. They were initially copied in the east coast, he guaranteed <\/i>[the person actually demonstrated, not \u2018guaranteed\u2019] <i>that \u2026 the likelihood of it <\/i>[the file] <i>being accessed initially from anywhere but the east coast, is impossible<\/i> [proven so, by that analyst, \u201cthe forensicator\u201d]<i>.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>So, what that means in layman\u2019s terms is again that the DNC computer network which the media tells us and the DNC tells us was hacked by the Russians, \u2026 that it was physically accessed by someone within close proximity of the DNC?<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Correct. Given metadata and \u2026 the transfer and the stop times in between them, the only likely<\/i> <i>scenario is that it was accessed from inside of the Local Area Network of the DNC or with a USB drive into a computer<\/i> [in]<i> which you would have to be inside the building.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Now, I don\u2019t want to sound like a conspiracy theorist because there\u2019s a lot more work to be done here, but &#8230; those computers were hacked five days prior to Seth Rich\u2019s untimely demise if I\u2019m not mistake, is that not correct?<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>That\u2019s correct and it\u2019s important to state that this does not indicate that Seth Rich was the person that accessed the files, because they <\/i>[the DNC] <i>won\u2019t turn over their logs to the FBI. There\u2019s no way to tell which credentials were used to get into the system. <\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Since you have broken this story online, has anyone in law enforcement reached out to you?<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>No, they have not.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Anyone from CNN, Fox News, MSNBC, the New York Times?<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Absolutely not. <\/i>(3:51)<i> <\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">At this stage, this cover-up by the government and press is even bigger than the crime by the pro-Clinton DNC insiders (which had used, as I\u2019ll indicate, the chief PR agency for NATO, to do this \u2014 to generate and spread this lie) who are trying to provoke even more fear and hatred of Russia than they already have cooked-up and generated. Adam Carter on July 16th, said that <a href=\"http:\/\/g-2.space\/\"><span class=\"s2\">\u201cThe MSM have kept this hidden from viewers for almost 150 days\u201d<\/span><\/a>, but certainly it has been hidden now, after it was conclusively <i>proven<\/i>, on July 9th.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Here, then, are the openings of those more detailed sources reporting on this, first being the news-report by Elizabeth Vos, and then the original analysis by The Forensicator (which report Vos was restating well in non-technical terms):<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>\u2014\u2014<\/i><\/span><\/p>\n<p class=\"p3\"><span class=\"s3\"><a href=\"http:\/\/disobedientmedia.com\/2017\/07\/new-research-shows-guccifer-2-0-files-were-copied-locally-not-hacked\/\"><i>http:\/\/disobedientmedia.com\/2017\/07\/new-research-shows-guccifer-2-0-files-were-copied-locally-not-hacked\/<\/i><\/a><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>New Research Shows Guccifer 2.0 Files Were Copied Locally, Not Hacked<\/i><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>9 July 2017, Elizabeth Vos<\/i><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>New meta-analysis has emerged from a <\/i><a href=\"https:\/\/theforensicator.wordpress.com\/\"><span class=\"s4\"><i>document<\/i><\/span><\/a><i> published today by an independent researcher known as The Forensicator, which suggests that files eventually published by the Guccifer 2.0 persona were likely initially downloaded by a person with physical access to a computer possibly connected to the internal DNC network. The individual most likely used a USB drive to copy the information. The groundbreaking new analysis irrevocably destroys the Russian hacking narrative, and calls the actions of Crowdstrike and the DNC into question.<\/i><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>The <\/i><a href=\"https:\/\/theforensicator.wordpress.com\/\"><span class=\"s4\"><i>document<\/i><\/span><\/a><i> supplied to Disobedient Media via Adam Carter was authored by an individual known as The Forensicator. The full document referenced here has been published on their <\/i><a href=\"https:\/\/theforensicator.wordpress.com\/\"><span class=\"s4\"><i>blog<\/i><\/span><\/a><i>. Their analysis indicates the data was almost certainly not accessed initially by a remote hacker, much less one in Russia. If true, this analysis obliterates the Russian hacking narrative completely.<\/i><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>The Forensicator specifically discusses the data that was eventually published by Guccifer 2.0 under the title \u201cNGP-VAN.\u201d<span class=\"Apple-converted-space\">\u00a0 <\/span>This should not be confused with the separate publication of the DNC emails by Wikileaks. This article focuses solely on evidence stemming from the files published by Guccifer 2.0. &#8230;<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u2014<\/span><\/p>\n<p class=\"p5\"><span class=\"s3\"><a href=\"https:\/\/theforensicator.wordpress.com\/guccifer-2-ngp-van-metadata-analysis\/\"><i>https:\/\/theforensicator.wordpress.com\/guccifer-2-ngp-van-metadata-analysis\/<\/i><i><\/i><\/a><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b><i>Guccifer 2.0 NGP\/VAN Metadata Analysis<\/i><\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b><i>Acknowledgements<\/i><\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>8 July 2017: Thanks go out to <\/i><a href=\"http:\/\/disobedientmedia.com\/author\/elizabethvos\/\"><span class=\"s2\"><i>Elizabeth Vos<\/i><\/span><\/a><i> at <\/i><a href=\"http:\/\/disobedientmedia.com\/\"><span class=\"s2\"><i>Disobedient Media<\/i><\/span><\/a><i> who was the first to report on this analysis; her article can be read <\/i><a href=\"http:\/\/disobedientmedia.com\/2017\/07\/new-research-shows-guccifer-2-0-files-were-copied-locally-not-hacked\/\"><span class=\"s2\"><i>here<\/i><\/span><\/a><i>. Thanks also to Adam Carter who maintains the <\/i><a href=\"http:\/\/g-2.space\/\"><span class=\"s2\"><i>g-2.space<\/i><\/span><\/a><i> web site \u2014 the one stop shop for information that relates to Guccifer 2.0. You can reach <\/i><a href=\"https:\/\/twitter.com\/ElizabethleaVos\"><span class=\"s2\"><i>Elizabeth<\/i><\/span><\/a><i> and <\/i><a href=\"https:\/\/twitter.com\/with_integrity\"><span class=\"s2\"><i>Adam<\/i><\/span><\/a><i> on Twitter.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b><i>Overview<\/i><\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>This study analyzes the file metadata found in a 7zip archive file, 7dc58-ngp-van.7z, attributed to the <\/i><a href=\"https:\/\/guccifer2.wordpress.com\/\"><span class=\"s2\"><i>Guccifer 2.0<\/i><\/span><\/a><i> persona. For an in depth analysis of various aspects of the controversy surrounding Guccifer 2.0, refer to Adam Carter\u2019s blog, <\/i><a href=\"http:\/\/g-2.space\/\"><span class=\"s2\"><i>Guccifer 2.0: Game Over.<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Based on the analysis that is detailed below, the following key findings are presented:<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 On 7\/5\/2016 at approximately 6:45 PM Eastern time, someone copied the data that eventually appears on the \u201cNGP VAN\u201d 7zip file (the subject of this analysis). This 7zip file was published by a persona named Guccifer 2, two months later on September 13, 2016.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 Due to the estimated speed of transfer (23 MB\/s) calculated in this study, it is unlikely that this initial data transfer could have been done remotely over the Internet.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 The initial copying activity was likely done from a computer system that had direct access to the data. By \u201cdirect access\u201d we mean that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high speed network (LAN).<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 They may have copied a much larger collection of data than the data present in the NGP VAN 7zip. This larger collection of data may have been as large as 19 GB.<span class=\"Apple-converted-space\">\u00a0 <\/span>In that scenario the NGP VAN 7zip file represents only 1\/10th of the total amount of material taken.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 This initial copying activity was done on a system where Eastern Daylight Time (EDT) settings were in force. Most likely, the computer used to initially copy the data was located somewhere on the East Coast.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 The data was likely initially copied to a computer running Linux, because the file last modified times all reflect the apparent time of the copy and this is a characteristic of the the Linux \u2018cp\u2019 command (using default options).<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 A Linux OS may have been booted from a USB flash drive and the data may have been copied back to the same flash drive, which will likely have been formatted with the Linux (ext4) file system.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 On September 1, 2016, two months after copying the initial large collection of (alleged) DNC related content (the so-called NGP\/VAN data), a subset was transferred to working directories on a system running Windows. The .rar files included in the final 7zip file were built from those working directories.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 The computer system where the working directories were built had Eastern Daylight Time (EDT) settings in force. Most likely, this system was located somewhere on the East Coast.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i> \u2022 The .rar files and plain files that eventually end up in the \u201cNGP VAN\u201d 7zip file disclosed by Guccifer 2.0 on 9\/13\/2016 were likely first copied to a USB flash drive, which served as the source data for the final 7zip file. There is no information to determine when or where the final 7zip file was built.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b><i>Analysis<\/i><\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>The Guccifer 2 \u201cNGP VAN\u201d files are found in a password protected <\/i><a href=\"http:\/\/www.7-zip.org\/\"><span class=\"s2\"><i>7zip<\/i><\/span><\/a><i> file; instructions for downloading this 7zip file can be found at <\/i><a href=\"https:\/\/pastebin.com\/fN9uvUE0\"><span class=\"s2\"><i>https:\/\/pastebin.com\/fN9uvUE0<\/i><\/span><\/a><i>.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Technical note: the size of the 7zip file is 711,396,436 bytes and the MD5 sum is: a6ca56d03073ce6377922171fc8b232d.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>This .7z file contains several .rar files \u2013 one for each top-level directory, as shown below.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>The times shown above are in Pacific Daylight Savings Time (PDT). The embedded .rar files are highlighted in yellow. The \u201c*\u201d after each file indicates that the file is password encrypted.<span class=\"Apple-converted-space\">\u00a0 <\/span>This display of the file entries is shown when the .7z file is opened. A password is required to extract the constituent files. This aspect of the .7z file likely motivated zipping the sub-directories (e.g. CNBC and DNC) into .rar files; this effectively hides the structure of the sub-directories, unless the password is provided and the sub-directories are then extracted. &#8230;<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u2014<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Finally, here, is the issue of NATO\u2019s role in this. Elizabeth Vos\u2019s article goes on to say:<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>This article focuses solely on evidence stemming from the files published by Guccifer 2.0, which were previously discussed in depth by <\/i><a href=\"http:\/\/g-2.space\/\"><span class=\"s6\"><i>Adam Carter<\/i><\/span><\/a><i>.<\/i><\/span><\/p>\n<p class=\"p4\"><span class=\"s6\"><a href=\"https:\/\/disobedientmedia.com\/2017\/04\/cyber-firm-behind-russian-hacking-claims-has-ties-to-soros-supported-think-tank\/\"><i>Disobedient Media<\/i><\/a><\/span><span class=\"s1\"><i> previously reported that Crowdstrike is the only group that has directly analyzed the DNC servers. Other groups including <\/i><a href=\"https:\/\/archive.fo\/a5utJ\"><span class=\"s6\"><i>Threat Connect<\/i><\/span><\/a><i> have used the information provided by Crowdstrike to claim that Russians hacked the DNC. However, their evaluation was based solely on information ultimately provided by Crowdstrike; this places the company in the unique position of being the only direct source of evidence that a hack occurred.<\/i><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>The group\u2019s President <\/i><a href=\"https:\/\/archive.fo\/9OkpD\"><span class=\"s6\"><i>Shawn Henry<\/i><\/span><\/a><i> is a retired executive assistant director of the FBI while their <\/i><a href=\"https:\/\/archive.fo\/Q3K3w\"><span class=\"s6\"><i>co-founder<\/i><\/span><\/a><i> and CTO, Dmitri Alperovitch, is a senior fellow at the Atlantic Council, which as we have <\/i><a href=\"http:\/\/disobedientmedia.com\/2017\/04\/cyber-firm-behind-russian-hacking-claims-has-ties-to-soros-supported-think-tank\/\"><span class=\"s6\"><i>reported<\/i><\/span><\/a><i>, is linked to George Soros. Carter has stated on his <\/i><a href=\"http:\/\/g-2.space\/#9\"><span class=\"s6\"><i>website<\/i><\/span><\/a><i> that \u201cAt present, it looks a LOT like Shawn Henry &amp; Dmitri Alperovitch (CrowdStrike executives), working for either the HRC campaign or DNC leadership were very likely to have been behind the Guccifer 2.0 operation.\u201d Carter\u2019s <\/i><a href=\"http:\/\/g-2.space\/\"><span class=\"s6\"><i>website<\/i><\/span><\/a><i> was described by <\/i><a href=\"https:\/\/archive.fo\/shlsM\"><span class=\"s6\"><i>Wikileaks<\/i><\/span><\/a><i> as a useful source of primary information specifically regarding Guccifer 2.0.<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">She had gotten that information from the founder of Disobedient Media, William Craddick. However, Craddick\u2019s assumption that Soros was involved in this particular operation is not supported by any evidence he links to or otherwise cites. Craddick\u2019s article, which was published back on 5 April 2017, <a href=\"https:\/\/disobedientmedia.com\/2017\/04\/cyber-firm-behind-russian-hacking-claims-has-ties-to-soros-supported-think-tank\/\"><span class=\"s7\">\u201cCyber Firm Behind \u201cRussian Hacking\u201d Claims Has Ties To Soros-Supported Think Tank\u201d<\/span><\/a>, simply <i>assumed<\/i> that the Atlantic Council was a <i>Soros<\/i> operation. The actual fact is that the Atlantic Council is <i>far bigger<\/i> than Soros or any other <i>single<\/i> billionaire who backs it. And, all that Craddick actually shows is that the cyber firm behind the \u2018Russian hacking\u2019 claims has ties to the Atlantic Council. That\u2019s a very big difference: this was, in fact, <i>a NATO-connected operation<\/i>, not merely an operation by one billionaire who is behind NATO. <a href=\"http:\/\/www.washingtonsblog.com\/2016\/02\/americas-aristocracy-facing-resistance-american-public-regarding-russia.html\"><span class=\"s7\">The Atlantic Council is the main PR agency for NATO; it actually was set up in 1961 by founders and associates of NATO for that very purpose.<\/span><\/a> So, to mention Soros\u2019s name as the alleged source for this particular smear-Russia operation is a big mistake, and is importantly misleading. If Soros has had anything to do with this operation (\u2018Russiagate\u2019), then neither Craddick nor his Disobedient Media has, as of yet, presented any evidence of it. For them to not only state such a connection in their \u2018news\u2019 story, but to <i>headline<\/i> that \u2018news\u2019 report with \u201cSoros\u201d instead of with \u201cNATO,\u201d is irresponsible, a major error on their part, especially because their \u2018news\u2019 report provided no evidence for that allegation, and also because Craddick and his website appear to be tragically ignorant of the most fundamental fact about the Atlantic Council \u2014 its being NATO\u2019s chief propaganda-arm. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Russiagate isn\u2019t merely a fraud and a smear by the Democratic Party; it is a fraud and a smear by NATO. NATO represents the entire U.S. aristocracy \u2014 not merely that aristocracy\u2019s Democratic Party contingent, but <i>both<\/i> contingents (and certainly not just one billionaire, such as Soros).<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In order to understand the <i>historical origin<\/i> of this operation, I have explained that <a href=\"http:\/\/www.washingtonsblog.com\/2015\/09\/how-america-double-crossed-russia-and-shamed-the-west.html\"><span class=\"s7\">here<\/span><\/a>. In order to understand the <i>economic interests<\/i> that are behind it, I\u2019ve explained that <a href=\"http:\/\/www.washingtonsblog.com\/2017\/07\/destructiveness-americas-alliances.html\"><span class=\"s7\">here<\/span><\/a>.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">CORRECTION (&amp; SUMMARY): The initial version of this news-report was too certain that there is no way that a possibility exists that this was a hack instead of a leak. I have revised the opening here in order to rectify that false assumption that it couldn\u2019t even possibly have been a hack. What remains of this article is that not only Craig Murray\u2019s testimony, but also the data themselves, are consistent with the leak-interpretation of the information-transfer\u2019s source, and \u2014 the most important thing in this news-report \u2014 that the \u2018news\u2019-articles that have been published which allege this to have been a hack from Russia are sourced from operatives of NATO\u2019s main PR agency, the Atlantic Council.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u2014\u2014\u2014\u2014\u2014<\/span><\/p>\n<p class=\"p6\"><span class=\"s8\">Investigative historian Eric Zuesse is the author, most recently, of\u00a0 <a href=\"http:\/\/www.amazon.com\/Theyre-Not-Even-Close-Democratic\/dp\/1880026090\/ref=sr_1_9?ie=UTF8&amp;qid=1339027537&amp;sr=8-9\"><span class=\"s9\"><i>They\u2019re Not Even Close: The Democratic vs. Republican Economic Records, 1910-2010<\/i><\/span><\/a><i>,<\/i> and of<\/span><span class=\"s10\"> <i>\u00a0<\/i><a href=\"http:\/\/www.amazon.com\/dp\/B007Q1H4EG\"><span class=\"s9\"><i>CHRIST\u2019S VENTRILOQUISTS: The Event that Created Christianity<\/i><\/span><\/a><\/span><span class=\"s8\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Truth that&#8217;s Being Hidden from the Public Eric Zuesse It has now been incontrovertibly proven that the time-stamps and other data in the Democratic National Committee (DNC) files that were leaked to Wikileaks are consistent with those files having been leaked by a person who was inside the DNC and not by an external [&hellip;]<\/p>\n","protected":false},"author":1254,"featured_media":317655,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[461,519],"tags":[115,30,96,3604,535,698,59,757,524,754,40],"class_list":{"0":"post-317654","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-editorials","8":"category-newswire","9":"tag-barack-obama","10":"tag-big-brother","11":"tag-cover-up","12":"tag-donald-trump","13":"tag-global-news","14":"tag-hillary-clinton","15":"tag-military","16":"tag-nato","17":"tag-russia","18":"tag-syria","19":"tag-white-house"},"_links":{"self":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/317654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1254"}],"replies":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=317654"}],"version-history":[{"count":0,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/317654\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/317655"}],"wp:attachment":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=317654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=317654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=317654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}