Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Sense

Flynn: Foreign Intelligence Agencies Were Monitoring US Election, Willing to Provide Information to Trump
https://freerepublic.com/focus/f-news/3917421/posts

Worth noting in the focus on foreign action:

Flynn is talking about cyber buddies helping. I will assume that likely means Five-eyes associates. Although others have capacities it is unlikely you could trust the state actors to be truthful... but, correlations in multiple sources with proper weighting makes it harder, more over time, to spoof forensics ability to reconstruct an accurate snapshot of a particular moment, or event.

Everyone seems very intent on correlating the hack with foreign origins. It is highly likely that will prove true when the analysis is done. However, making the assumption that it is an outside hack rather than one conducted as an inside job with insiders assistance is obvious error.

China is clearly in focus, not only because of the obvious in political interest... but because of the known in relationships between China and insiders, including the common political interest apparently shared by some tech companies. Warfare hidden below the threshold... is what China thinks they’ve been doing.

Being over-looked is the potential, I’d say the probability, that the effort was conducted by “globalists” in or through domestic agencies... including likely rogue actors inside the various USG agencies as cooperators: political interests a strong intersect.

We know that Homeland Security... stood down... while claiming “no problem apparent here” ? Who else ?

Microsoft... and Covid... and vaccines... and China ties... and hacking that WAS CONVEYED through Microsoft “security” updates.

Microsoft WAS A VECTOR of this attack. Innocently, or not ?

The “Deep State” is the domestic political locus of globalism... with financial, commercial, and political elements with “team sports”... and actors who do not respect borders, or have real commitments to honor them, in result.

There ARE commercial actors involved... we know of FireEye, of SolarWinds, Microsoft... the election systems hardware and software purveyors including Dominion, Scytl, etc. And how many others ? Known bad actors with history in politics, in law firms, and known bad actors in Democrat funded “security” groups like Crowdstrike.

The network models are not... diffuse, or confusing.

Behind them... are external relationships with others: companies, countries, financiers, global banking houses and those who own them, other ideological fellow travelers.

Do not be too quick to pin the blame on a single source... like China... without being aware that China, too, may be a knowing cooperator in a pass through with and for others interests. That is not claiming China as an innocent... rather than characterizing the NATURE of China’s probable guilt as not entirely independent... not as guilt by association, but guilt IN association.

Confirming China’s probable role... will also require pinning down the paths and the various associations being exploited. Chinese agents acting against the U.S. from inside Microsoft... or Microsoft knowingly cooperating with China in a shared interest ? How do you tell which it is ?

Digital links are fairly easy to spoof... fingerprints can be faked... but only within limits, still. There are files less easily spoofed... and there are linkages that correlate the digital with the non-digital in access and interest.

China, yes... but who else is behind them, enabling them, working with them ?

What is Canada’s role in enabling access, or more ?

Probably just coincidence that all of the above would align with Democrats legitimate policy and financial, corrupt policy and financial, political, and electoral interests ?

Yeah. Multiple and overlapping coincidences...

Work the problem from both ends... given a pool of knowns on networks on both ends in how things are structured. Where must the two ends meet in order to close the loops ?

Hidden or encrypted information on Hunter’s laptops ?

Mule’s tied to the travel ?

Use of the SolarWinds hack... was not profligate, but conservative, avoiding (perhaps with an exception or two;<) imposing specific problems that might enable or require tracking it down and exposing it ? The hack was used, it appears, mostly in affording ACCESS, enabling a parallel MONITORING of the election (and other things) in real time ?

So, some appears it was intended in enabling direct “information collection” with a low profile... and some appears it was “parallel information collection” which is mostly necessary in providing proofs and checking up on sources to validate and vet them... rather than using access for finding clues.

Reconstructing “what” was being monitored (or, who) using overlapping means will likely link back to patterns in the overlap that id the perp(s)... enabling sorting out who used what to look at what... with overlaps not being coincidence.

Where does Scytl’s licit structuring of monitoring systems intersect with user “management consoles” used in illicitly applying the information being enabled by monitoring ?

Security designed to be as effective as a sieve... makes it harder to sort out later... but the pathways aren’t totally ephemeral... so reconstruction of comms still proves an endpoint.

Where does the “tailored access” enabled by the SolarWinds hack run parallel to those various structures in capacity banks and in the technical and interpersonal networks ?

Undoubtedly... many had interest in functioning monitors.

Which of them with the capacity, the interest, and the motivation... and a demonstrated willingness to assume the risks... proceeded from observation into “management” ?

Corporate, financial and political interests in the pool... with common concern re defending turf and expanding “globalism”... national socialism in bed with corporate monopolies... with tech focused agents fully synched with others interests ?

Controlled media messaging in the U.S. is not controlled as it is because that evolved independently in a collection of parallel monopolies ?

That we’re offered “Russia, Russia, Russia” in opposition to proofs of China’s aggression... is evidence of design and a structure in argument. It is not a proof of anything else. Russia and China might well be working together, hoping to prevent awareness of that fact being the goal in structure.

The “Deep State”... a globalist cabal of national socialists (ie., “public-private partnerships”... like that caught “charitably” funding extra-legal election functions in Georgia and Pennsylvania) focused on fostering control through monopoly enabled by and for corporations... clearly is behind it... in opposing Trump... in favoring China... and providing a rational path that connects all the dots.

Now, prove it...

The model used... is that same model which fully controls monopoly in the “tech” industry... through “standards” development... in practice functioning as a euphemism for coordinated planning of corporate action to dominate a market in a particular way... a political division of spoils masquerading as competition. Competition is a fiction.

Find the “standards” committees responsible for the relevant technical elements apparent in the exploit. Within that group... filter for the “coincidences” in interest. Only a fairly small group will have relevant technical competence... sufficient to enable what did happen... in the way that it did. Patterns in relationships and network comms between people will show the way.


49 posted on 12/21/2020 5:15:02 PM PST by Sense
[ Post Reply | Private Reply | To 48 | View Replies ]


To: Sense

Multiple Adversaries. Parallel Attacks.
New Revelations Expose a Second Actor ?
The Equivalent of a Nuclear Bomb Going Off ?
Intelligence Preparation of the Battlefield Before a War ?

https://www.youtube.com/watch?v=rGvQn1W7YFE


50 posted on 12/24/2020 2:42:41 PM PST by Sense
[ Post Reply | Private Reply | To 49 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson