Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

I Think Manafort Is Refusing to Make Things Up for Mueller’s Hit Job
Rush Limbaugh.com ^ | November 27 2018 | Rush Limbaugh

Posted on 11/27/2018 5:34:51 PM PST by Kaslin

RUSH: Well, well, well, if anybody doubts the political nature of the Mueller investigation, all you have to do is take a look at the news today. For crying out loud, they really want us to believe that Paul Manafort met with Julian Assange three times before WikiLeaks published the Podesta emails?

Where’s this story been? If this were true, they would have known this all the way back when Obama and his buddies were spying on the Trump campaign. And we would have heard about this long before today. So what the heck is going on?

Greetings, my friends, and welcome. Here you are tuned to the most listened to radio talk show on earth and on Mars. The Rush Limbaugh program and the EIB Network, 800-282-2882. Send an email, ElRushbo@eibnet.us.

For crying out loud. Now the media salivating, barely able to keep its pants up here because they think they’ve got some brand-new revelation. There’s two things about Manafort. Manafort is said to have lied after reaching a plea deal with Mueller and his Trump-hating prosecutors. So that Manafort’s plea deal is now out the window, because what you do when you make a plea deal, you have to tell the truth about everything. And I don’t think Manafort’s been lying about anything. What Manafort’s refusing to do is to compose evidence, make it up!

I tell you, folks, I’m so tarnished here by what has happened to our Department of Justice ever since Trump announced his campaign for presidency that I do believe we have a two-tier justice system, and I don’t believe anything coming out of this bunch here, the Mueller investigation and people involved in it. Paul Manafort had nothing to do with anything.

All of this is designed to create a political climate where Trump can be pressured, where the Democrats can make a foundation for impeachment. That’s all that’s going on here, because they don’t have any evidence that Trump colluded. They’re ignoring the evidence of real collusion that took place here, as you know, between Hillary Clinton and the rest of the people on that side, Fusion GPS and Christopher Steele. All of that is being ignored.

Manafort was with the campaign two or three months, and now all of a sudden Manafort has become the focus? And this, of course, is allowing the media to say, “This should make Trump really, really nervous. Now that Manafort lied, Manafort’s lying to the prosecutor.” I don’t believe Manafort’s lying to the prosecutor. I think the prosecutor is asking Manafort to say a bunch of things that he won’t say. I think Manafort’s resisting the pressure.

Look, we know from the Enron trials, we know from the Enron task force that these people were — we know from the Ted Stevens trial that some of the very lawyers on those cases are on Mueller’s team, and they were suborning perjury from their own star witnesses against Ted Stevens. The case was eventually thrown out. These people ought not even be practicing law anymore. They ought not be part of the Justice Department.

The idea that they wouldn’t force using all the power they’ve got, Manafort, to make things up or to compose evidence. And if Manafort’s refusing to do it, then this is exactly what I would think would happen. “He’s lying to us. We’re gonna revoke the plea deal. To hell with Manafort.” They’re trying to break him.

Now This News in the U.K. Guardian that Manafort met three different times with Julian Assange in the Ecuadoran embassy in the U.K. That news just hit this morning. Why? What would be the point of Manafort meeting with Assange? And note something. In none of these stories do you see the name “Trump,” not a single time, not a single place is the word “Trump” mentioned, the president, the candidate. Trump is not implicated in any of this.

All this is a guilt-by-association thing. All of this is a political trap. This is not about the execution of justice. It’s not about law and order. It’s not about trying to get to the bottom of what happened in the 2016 election. It’s about trying to overturn it. And short of being able to do that, it’s about discrediting the winner.

So why is it news that Manafort might have met with Julian Assange? And I’m here to tell you, they had spies, we know that the Obama administration already had spies, they were looking, they had people embedded in the Trump campaign. If this had happened, I guaran-damn-tee you CNN and the Washington Post, New York Times would have been told about this months and months ago, they would have known about this.

Because the minute Manafort was hired, Carter Page over here and Manafort was supposedly, the FBI and the DOJ knew that he was a bad guy, and they were worried, they thought about informing Trump that they might have had some mistakes here in hiring these two guys, but then they didn’t. Instead they planted spies in the campaign to try to catch the Russians rather than inform the Trump campaign that they might have made a mistake. None of that happened. If Assange and Manafort had met, they would have known about it a long, long time ago. I mean, back in 2016 during the campaign.

So what are we supposed to conclude? Well, it’s not about what we’re supposed to conclude. It’s what the media can now start speculating. Possibility number one. Manafort had the Podesta emails because Manafort knew that the Russians had hacked the DNC server, and that’s where Podesta’s emails were. Except they weren’t. But, remember, we’re not dealing with facts here; we’re dealing with people that are willing to make it up and suborn perjury.

So don’t be surprised if you see a story somewhere, some obscure place to start, and it will be picked up and eventually in the Drive-By Media that Manafort might have had advance notice the Podesta emails were gonna be hacked and told Assange about it or gave those emails or a link to them to Assange. Or the third possibility is Manafort told Assange that there had been a hacking attack, successful, of Podesta’s emails and to tell WikiLeaks and Assange to be on the lookout and maybe go out there and try to find ’em. That’s the value here.

What other possibility is there for leaking that Paul Manafort met with Assange? I guarantee you it wasn’t about property or investments in the Caymans. The idea that Manafort met. And now Manafort is accused of lying to the special counsel so much and so badly that the special counsel, the inestimable Robert Mueller is now thinking of canceling the plea deal because he’s not getting what he wanted out of Manafort. Not getting what he wanted.

Manafort probably doesn’t know jack. Nobody knows jack because what they are trying to lay the foundation for happening didn’t, unless you go investigate Hillary Clinton. Are we blue in the face talking about this and are you blue in the face hearing about it? Sorry, but this has made the top of the fold of the news today, these two Manafort stories.


TOPICS: Culture/Society; Editorial
KEYWORDS: assange; enron; hackers; manafort; podesta; podestaemails; russians; tedstevens; wikileaks
Navigation: use the links below to view more comments.
first previous 1-2021-32 last
To: palmer; Ingtar; monkeyshine; pepsionice

Yes, Podesta’s email was a separate issue from the DNC server. The story is he fell for a fishing email but there are loads of possibilities. I read that his password was ‘password’. So who knows - it could have been read over his shoulder, or he borrowed someones computer and left the password autofill, or he was keylogged as he used a network computer at the DNC etc.

The point is while they may be separate incidents they aren’t necessarily separated by motive or persons. It could be the same person, or not. But all together the DNC leak, the Podesta hack, and the Hillary homebrew server (not to mention the little reported Awan Brothers controversy) together create the appearance of extreme recklessness when it comes to security - at the least. Even less reported was Hillary’s involvement with the Russian Skolvoko espionage scheme. The funny think is that while the media did report on these things as embarrassing foibles, they were incredibly soft and forgiving, and even Comey shrugged it all off.

But the psychology of the appearance of it all must have weighed heavy on them, because they really went heavy artillery in trying to project their weakness and culpability onto Trump. Trump taunted her about all this on the campaign trail with jokes about “Putin, release the emails!”, and that gave them the opening to try to pin it all on Russia and then try to tie Trump collusion into it.

PS: there are a number of articles explaining why the technical and physical data show it is extremely unlikely that the DNC hack was done via an overseas computer.


21 posted on 11/28/2018 3:30:23 PM PST by monkeyshine
[ Post Reply | Private Reply | To 18 | View Replies]

To: monkeyshine
PS: there are a number of articles explaining why the technical and physical data show it is extremely unlikely that the DNC hack was done via an overseas computer.

I agree with most of what you said. I have read some articles about the "overseas" computer. The DNC emails were zipped to less than 1 GB. That's nothing for any overseas data theft. The Chinese just stole 600 GB remotely, and there were bigger remote thefts than that one.

22 posted on 11/28/2018 4:14:21 PM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 21 | View Replies]

To: palmer

Just so I understand what you mean, you suggest that the foreigner executed a “zip” remotely on the server and then simply transferred the compressed file?

Obviously I don’t know what happened. The fake ‘fingerprint’ that appeared duplicated on at least 5 different documents could have been intentional subterfuge rather than a tell.

But the quickness to blame the Russian government is perhaps my biggest suspicion. I wrote upthread that there are only 3 possibilities 1) an outside hacker 2) an insider whistleblower or 3) an inside mole. The fact that there could have been one or more foreign agents planted inside the DNC is a major national security issue. But the DNC refused any investigation by the FBI.

I can understand that the DNC/HRC wanted to quickly turn the page on this issue - they had a campaign to run and didn’t want the distraction and a prolonged news cycle as any such investigation would incur. But at the same time, knowing that it was at least possible that the DNC had one or more foreign spies implanted should have sounded alarms. I suspect that the reason why they didn’t need any investigation is because they already knew who what when and how, and that it wasn’t any foreign agent at all. It suggests to me that the have known all along it was leaked by an inside whistleblower.


23 posted on 11/28/2018 4:53:56 PM PST by monkeyshine
[ Post Reply | Private Reply | To 22 | View Replies]

To: monkeyshine
All hackers use zip and often encryption before transferring data out of their victins computers. The worst thing they can do is transfer stuff in plain text and have it be detectabe anywhere along the route. Also they don't want other hackers to steal their stolen property.

I hadn't heard anything about "fake fingerprints". I imagine anything could have been done as misdirection. Yes, the DNC refusing to turn over the server is a huge red flag. I read the "crowdstrike" blog post in 2016 and was distinctly not impressed. Yet that became one of the centerpieces of the official investigation. If their blogpost is indeed part of what has been retracted then I will seriously lose whatever smidgen of faith I had left in the FBI.

24 posted on 11/28/2018 7:12:02 PM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 23 | View Replies]

To: palmer

redacted, not retracted.


25 posted on 11/28/2018 7:14:14 PM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 24 | View Replies]

To: palmer

As I understand it, many the documents published by Wikileaks were created in OpenOffice by copy & paste. The default language for the software was set to Russian and Romanian depending on the document. The ‘fingerprints’ as I understand it are that at least 5 of the documents were cut and pasted onto the exact same template, suggesting an attempt to make it appear as if the documents were stolen by Russian and Romanian speakers. But, theoretically anyway, they wouldn’t need to cut and paste them into a template they would just open and save them individually. Thus, the fingerprints suggest the documents were altered to make it appear as if they came from Russian hackers.

The third option, misdirection, would be if Russians actually did hack them, then tried to create plausible deniability by making it appear like a sloppy frame-up. I don’t personally believe that but don’t deny the possibility.


26 posted on 11/28/2018 8:41:54 PM PST by monkeyshine
[ Post Reply | Private Reply | To 24 | View Replies]

To: monkeyshine
I believe the exchange server (used by DNC) stores the emails in a big file acting as a database. Attachments are probably all separate files. The thief has to zip everything up, hundreds of attachments and one or more files.

At the other end they needed an automatic script to extract each email from the database fie and save it in its own file for easy access. If there was copy and paste involved that was probably scripted. The important point is that process would be the same whether an insider took the files or whether they were grabbed and transferred over the internet.

I suppose the template for the enpty OpenOffice doc could be language specific, before the English email contents are pasted in. Then saving might keep a few foreign language artifacts, hidden from normal view. I would not believe or bother investigating that any further. Anyone can use any process to do this including some automated thing downloaded from a freeware site in Romania or Russia. It would not count as evidence pointing to a perp country.

27 posted on 11/28/2018 8:56:04 PM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 26 | View Replies]

To: palmer

And that is the point. It isn’t evidence of anything except subterfuge. Hence, the fingerprint actually suggests it was not Russian hacking. Why would Russian hackers try to hide their involvement by using Russian language software templates?


28 posted on 11/28/2018 10:03:21 PM PST by monkeyshine
[ Post Reply | Private Reply | To 27 | View Replies]

To: palmer

Also, if it was an automated script to extract the data the script would be likely to handle every document the same way - a new file for each email/attachment. So the question is why do at least 5 use the same template? They are the aberration. There are lots of possible answers of course, including for whatever reason these particular documents having had special direct handling. But it’s just another peculiarity.


29 posted on 11/28/2018 10:09:12 PM PST by monkeyshine
[ Post Reply | Private Reply | To 27 | View Replies]

To: monkeyshine
They could do five by hand, then automate the rest without the language-specific template or automate stripping out the language. The point is that the presence of evidence pointing to a country is not probative in any way. All of cyber is like that. Hackers route their hacks through hacked servers all over the world. COuntry of origin kinds of evidence simply don't matter.

However the intelligence community claims to have deeper evidence of country of origin. Turns out that is a blog post by crowdsrike where the "investigator" (a former Russian hacker now naturalized US citizen) doodles around in the hacked server "watching" the alleged Russian hackers do their thing. First of all, the usual way to gather evidence in that case is to take the server online, freeze an image of it, and carefullly analyze it.

They could also trace connections on the internet with classified assets (e.g. routers in Russia where we have hacked and gather more or less unmanipulated data)., There is no indication in anything I read that we did that for the DNC server hack. If there was such data gathering, that would obviously be a classified source or method and should remain classified. So there's a catch 22, release the evidence and prove (to some extent) it was Russia, or don't reveal the source and method so we can use it some more. Like I said, I read most of the reports and I did not see a statement about extra classified evidence like I have described, at least for the DNC "hack".

If you want to read the crap from crowdstrike it is here: https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ (you can cut and paste that URL into your browser). I would recommend using a incognito window since crowdstrike are obviously a bunch of sleazoids.

30 posted on 11/29/2018 5:27:52 AM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 29 | View Replies]

To: palmer
take the server offline not online
31 posted on 11/29/2018 5:29:05 AM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 30 | View Replies]

To: monkeyshine

At the same time as the DNC system was breached, there was an attempt to breach the RNC that failed.


32 posted on 11/29/2018 6:04:00 PM PST by piasa (Attitude adjustments offered here free of charge.)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-32 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson