Yesterday’s ridiculous, albeit proactive, brand new York Times narrative about Russians hacking Burisma currently makes sense. Today the Lawfare team (Mary McCord et al) within Adam Schiff’s impeachment crew send additional files of evidence (pdf below) to be included within the impeachment articles constructed by HJC Chairman Jerry Nadler.
in which will be all coordinated. The “brand new evidence” relates to information turned over by Lev Parnas, an SDNY indicted former associate of Trump’s personal attorney Rudy Giuliani. The Lawfare purpose will be to bolster their premise in which President Trump was trying to force Ukraine President Volodymyr Zelensky to investigate Joe Biden’s corrupt activity around the Ukrainian company Burisma.
The Lawfare crew behind Schiff waited until the last minute to push the brand new “evidence” because they didn’t want republicans to deconstruct in which during the impeachment evidence gathering phase. Aditionally, the Lawfare crew anticipate a Trump impeachment defense surrounding actual evidence of the Biden corruption, which makes the Trump request to Zelensky valid.
So the proactive democrat strategy was/will be to use the brand new York Times presentation of Russia hacking Burisma to negate the provenance of the evidence against the Bidens. In essence, to cast doubt upon any documents in which would certainly show Joe along with Hunter Biden participating in an actual influence along with money-laundering scheme.
Here’s the letter along with documentary evidence through Adam Schiff (House Link Here):
The SDNY created legal leverage upon Lev Parnas using the familiar strategy of charging “FARA violations”, as noted within the background of the House explanation.
The purpose was/will be to extract anything through Parnas in which could be twisted or construed to show evidence in which Rudy Giuliani was working on behalf of President Trump to pressure Ukraine into investigating Burisma, Joe Biden along with Hunter Biden.
To counter any evidence in which would certainly highlight the truth in which Hunter along with Joe Biden were indeed participating in a pay-to-play influence along with money laundering scheme for personal financial benefit, the same democrat operatives created a 2020 Russian ‘hacking claim’ using former Crowdstrike employee Blake Darché along with his colleague Oren Falkowitz.
NYT – […] The hackers fooled some of them into handing over their login credentials, along with managed to get inside one of Burisma’s servers, Area 1 said.
“The attacks were successful,” said Oren Falkowitz, a co-founder of Area 1, who previously served at the National Security Agency. Mr. Falkowitz’s firm maintains a network of sensors on web servers around the globe — many known to be used by state-sponsored hackers — which gives the firm a front-row seat to phishing attacks, along with allows them to block attacks on their customers. (link)
Blake Darche’ along with Oren Falkowitz formed a brand new cyber-security company named “Area-1 Security”. in which will be analysis through in which group in which the brand new York Times uses to push the Russia hacking of Burisma narrative. in which’s all the same players, just switching around the subject.
- The 2016 Lawfare group will be currently 2020’s Just Security;
- the 2016 CrowdStrike group will be currently 2020’s Area-1 Security;
- along with the 2016 Russia DNC hack will be currently the 2020 Russia Burisma hack…
in which’s the same players, the same story, the same approach.
Go deep on Oleg Falkowitz along with Oren Falkowitz HERE
In February 2008, Oleg Falkowitz was hired as the Iran Mission Manager along with Special Assistant For Policy along with Cybersecurity at the Office of the Director of National Intelligence.
In February 2009, Oleg Falkowitz left his position at the Office of the Director of National Intelligence.
In August 2010, Oleg Falkowitz was hired as Director of Technology along with Data Science Program (J2 — Intelligence) at the United States Cyber Command.
In July 2012, Oleg Falkowitz left his position at both the United States Cyber Command along with the National Security Agency.
The same month, Oren Falkowitz co-founded the organisation sqrrl along with became the Chief Executive Officer.
In January 2013, Falkowitz left his position at sqrrl.
In November 2013, Oren Falkowitz, Blake Darché along with Phil Syme founded the organisation Area 1 Security.
Blake Darché published the article “Once a Target, Always a Target” in Medium, which was about “Cozy Bear”.
Between July 17–19, 2017, Oren Falkowitz, John Brennan, Andrea Mitchell along with David Sanger attended the Fortune Brainstorm Tech Conference in Aspen, CO.
LINK to Background