Finally the DoJ Sues Google

Justice Department Sues Monopolist Google For Violating Antitrust Laws

The Antitrust Case against Google | Yale Insights source is Yale and endorse the anti-trust case complete with a roadmap.

Department Files Complaint Against Google to Restore Competition in Search and Search Advertising Markets

Today, the Department of Justice — along with eleven state Attorneys General — filed a civil antitrust lawsuit in the U.S. District Court for the District of Columbia to stop Google from unlawfully maintaining monopolies through anticompetitive and exclusionary practices in the search and search advertising markets and to remedy the competitive harms. The participating state Attorneys General offices represent Arkansas, Florida, Georgia, Indiana, Kentucky, Louisiana, Mississippi, Missouri, Montana, South Carolina, and Texas.

“Today, millions of Americans rely on the Internet and online platforms for their daily lives.  Competition in this industry is vitally important, which is why today’s challenge against Google — the gatekeeper of the Internet — for violating antitrust laws is a monumental case both for the Department of Justice and for the American people,” said Attorney General William Barr. “Since my confirmation, I have prioritized the Department’s review of online market-leading platforms to ensure that our technology industries remain competitive.  This lawsuit strikes at the heart of Google’s grip over the internet for millions of American consumers, advertisers, small businesses and entrepreneurs beholden to an unlawful monopolist.”

“As with its historic antitrust actions against AT&T in 1974 and Microsoft in 1998, the Department is again enforcing the Sherman Act to restore the role of competition and open the door to the next wave of innovation—this time in vital digital markets,” said Deputy Attorney General Jeffrey A. Rosen.

As one of the wealthiest companies on the planet with a market value of $1 trillion, Google is the monopoly gatekeeper to the internet for billions of users and countless advertisers worldwide. For years, Google has accounted for almost 90 percent of all search queries in the United States and has used anticompetitive tactics to maintain and extend its monopolies in search and search advertising.

As alleged in the Complaint, Google has entered into a series of exclusionary agreements that collectively lock up the primary avenues through which users access search engines, and thus the internet, by requiring that Google be set as the preset default general search engine on billions of mobile devices and computers worldwide and, in many cases, prohibiting preinstallation of a competitor. In particular, the Complaint alleges that Google has unlawfully maintained monopolies in search and search advertising by:

  • Entering into exclusivity agreements that forbid preinstallation of any competing search service.
  • Entering into tying and other arrangements that force preinstallation of its search applications in prime locations on mobile devices and make them undeletable, regardless of consumer preference.
  • Entering into long-term agreements with Apple that require Google to be the default – and de facto exclusive – general search engine on Apple’s popular Safari browser and other Apple search tools.
  • Generally using monopoly profits to buy preferential treatment for its search engine on devices, web browsers, and other search access points, creating a continuous and self-reinforcing cycle of monopolization.

These and other anticompetitive practices harm competition and consumers, reducing the ability of innovative new companies to develop, compete, and discipline Google’s behavior.

The antitrust laws protect our free market economy and forbid monopolists from engaging in anticompetitive practices. They also empower the Department of Justice to bring cases like this one to remedy violations and restore competition, as it has done for over a century in notable cases involving monopolists over other critical industries undergirding the American economy like Standard Oil and the AT&T telephone monopoly. Decades ago the Department’s case against Microsoft recognized that the antitrust laws forbid anticompetitive agreements by high-technology monopolists to require preinstalled default status, to shut off distribution channels to rivals, and to make software undeletable. The Complaint alleges that Google is using similar agreements itself to maintain and extend its own dominance.

The Complaint alleges that Google’s anticompetitive practices have had harmful effects on competition and consumers. Google has foreclosed any meaningful search competitor from gaining vital distribution and scale, eliminating competition for a majority of search queries in the United States. By restricting competition in search, Google’s conduct has harmed consumers by reducing the quality of search (including on dimensions such as privacy, data protection, and use of consumer data), lessening choice in search, and impeding innovation. By suppressing competition in advertising, Google has the power to charge advertisers more than it could in a competitive market and to reduce the quality of the services it provides them. Through filing the lawsuit, the Department seeks to stop Google’s anticompetitive conduct and restore competition for American consumers, advertisers, and all companies now reliant on the internet economy.

Google is a limited liability company organized and existing under the laws of the State of Delaware, and is headquartered in Mountain View, California. Google is owned by Alphabet Inc., a publicly traded company incorporated and existing under the laws of the State of Delaware and headquartered in Mountain View, California.

DOJ Charges 6 Russian Military Hackers for Global Cyberattacks

FNC: The Justice Department on Monday announced the indictment of six military hackers with the Russian GRU who allegedly carried out a global conspiracy that included cyberattacks around the world.

The alleged attacks hit targets in Ukraine, the 2018 Winter Olympics in South Korea, and western Pennsylvania.

“No country has weaponized its cyber-capabilities as maliciously and irresponsibly as Russia,” Assistant Attorney General John C. Demers said at a DOJ press conference.

The defendants are six current and former members of GRU, Russia’s military intelligence service. The DOJ said the attacks began in November 2015 and continued until at least October 2019. The allegations do not include any interference in U.S. elections.

The alleged attacks include malware strikes against the Ukrainian power grid, Ministry of Finance, and State Treasury Service; spearphishing campaigns and attacks against French President Emmanuel Macron’s political party, local French governments, and French politicians before their 2017 elections; the global NotPetya malware attack that infected computer worldwide including those in medical facilities in western Pennsylvania and a large American pharmaceutical company; the Olympic Destroyer attack that targeted computers supporting the 2018 Olympics; a spearphishing campaign targeting South Korean officials and citizens, as well as Olympic athletes; another spearphishing campaign against the United Kingdom’s Defence Science and Technology Laboratory, and attacks targeting government entities and companies in Georgia.

(Source: FBI)

(Source: FBI)

The NotPetya attack alone allegedly resulted in nearly $1 billion in losses, the DOJ said.

The Olympic attacks allegedly came after Russian athletes were banned from competing under the Russia flag due to their country’s government-sponsored doping efforts. The defendants – Yuriy Sergeyevich Andrienko, Sergey Vladimirovich , Pavel Valeryevich Frolov, Anatoliy Sergeyevich Kovalev, Artem Valeryevich Ochichenko and Petr Nikolayevich Pliskin – are charged with conspiracy, computer hacking, wire fraud, aggravated identity theft and false registration of a domain name.

“The crimes committed by these defendants,” said Western District of Pennsylvania U.S. Attorney Scott Brady, “are truly breathtaking in their scope, scale, and impact.”

The Justice Department thanked tech companies including Google, Facebook and Twitter for assisting them in their investigation, but did not explain how they helped.

***

In part from the Justice Department: These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort.

Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics.  The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name.

According to the indictment, beginning in or around November 2015 and continuing until at least in or around October 2019, the defendants and their co-conspirators deployed destructive malware and took other disruptive actions, for the strategic benefit of Russia, through unauthorized access  to victim computers (hacking).  As alleged, the conspiracy was responsible for the following destructive, disruptive, or otherwise destabilizing computer intrusions and attacks:

  • Ukrainian Government & Critical Infrastructure: December 2015 through December 2016 destructive malware attacks against Ukraine’s electric power grid, Ministry of Finance, and State Treasury Service, using malware known as BlackEnergy, Industroyer, and KillDisk;
  • French Elections: April and May 2017 spearphishing campaigns and related hack-and-leak efforts targeting French President Macron’s “La République En Marche!” (En Marche!) political party, French politicians, and local French governments prior to the 2017 French elections;
  • Worldwide Businesses and Critical Infrastructure (NotPetya): June 27, 2017 destructive malware attacks that infected computers worldwide using malware known as NotPetya, including hospitals and other medical facilities in the Heritage Valley Health System (Heritage Valley) in the Western District of Pennsylvania; a FedEx Corporation subsidiary, TNT Express B.V.; and a large U.S. pharmaceutical manufacturer, which together suffered nearly $1 billion in losses from the attacks;
  • PyeongChang Winter Olympics Hosts, Participants, Partners, and Attendees: December 2017 through February 2018 spearphishing campaigns and malicious mobile applications targeting South Korean citizens and officials, Olympic athletes, partners, and visitors, and International Olympic Committee (IOC) officials;
  • PyeongChang Winter Olympics IT Systems (Olympic Destroyer): December 2017 through February 2018 intrusions into computers supporting the 2018 PyeongChang Winter Olympic Games, which culminated in the Feb. 9, 2018, destructive malware attack against the opening ceremony, using malware known as Olympic Destroyer;
  • Novichok Poisoning Investigations: April 2018 spearphishing campaigns targeting investigations by the Organisation for the Prohibition of Chemical Weapons (OPCW) and the United Kingdom’s Defence Science and Technology Laboratory (DSTL) into the nerve agent poisoning of Sergei Skripal, his daughter, and several U.K. citizens; and
  • Georgian Companies and Government Entities: a 2018 spearphishing campaign targeting a major media company, 2019 efforts to compromise the network of Parliament, and a wide-ranging website defacement campaign in 2019.

Cybersecurity researchers have tracked the Conspirators and their malicious activity using the labels “Sandworm Team,” “Telebots,” “Voodoo Bear,” and “Iron Viking.”

Justice Dept Brands Huawei as a Criminal Enterprise

Gotta hope that Europe takes note, especially Britain. Europe so far has approved Huawei as the vendor platform for 5G. Check your use of apps at the Google store and take a second look at your smart devices.

Image result for huawei source

FDD: The U.S. Department of Justice (DOJ) indicted Chinese telecommunications firm Huawei Technologies and its subsidiaries last week for alleged racketeering, theft of intellectual property, and conspiracy to commit bank fraud, among other charges. The indictment portrays Huawei not merely as a company that has broken the law, but as a fundamentally criminal enterprise.

The new charges target Huawei, four of Huawei’s subsidiaries (Huawei Device Co. Ltd., Huawei Device USA Inc., Futurewei Technologies Inc., and Skycom Tech Co. Ltd.), and Huawei’s chief financial officer, Meng Wanzhou, for violating the Racketeer Influenced and Corrupt Organizations (RICO) Act, which Congress passed in 1970 to combat organized crime.

According to the DOJ, the Huawei business model entailed “the deliberate and repeated misappropriation of intellectual property of companies headquartered or with offices in the United States.” DOJ also highlighted other violations, including Huawei’s role in sanctions evasion and fraudulent activities.

Last week’s indictment marks the first time DOJ charged a company with suspect connections to a foreign government as a criminal enterprise. Although Huawei asserts it is not state-owned, the company has indirect ties to the Chinese government and has yet to publically disclose who exactly owns and controls the company. Huawei’s majority shareholder is the company’s labor union, which keeps the details of its membership and governance structure out of the public eye. Last year, Jiang Xisheng, a top executive, explained during a press conference that the labor union’s ownership is simply a matter of legal convenience; this only further obfuscated who is really in charge. Additionally, Huawei’s founder, Ren Zhangfei, served in the Chinese military and is a member of the Chinese Communist Party.

While the indictment does not say that Beijing directed Huawei to operate as a criminal enterprise, China’s National Intelligence Law of 2017 requires Huawei and other private companies to provide the government with their data to “support, assist, and cooperate with state intelligence according to the law.” In short, the law empowers Beijing to exploit Huawei as an intelligence asset whenever it sees fit.

In other high-profile cases, the Chinese government has stolen sensitive U.S. data to achieve a strategic advantage. U.S. officials have even deemed China’s espionage and intelligence activities as a “long-term existential threat to the security of our nation.” In 2012, the head of the U.S. National Security Agency estimated that China’s economic espionage cost U.S. companies $250 billion in annual losses. Additionally, the targeting of strategic industries has allowed Beijing to enhance its own military capabilities at America’s expense.

The exploitation of Huawei could clearly enhance Beijing’s intelligence collecting capabilities. Just last week, the U.S. government reported that for over ten years Huawei secretly maintained “back doors” on its mobile networks that allowed the company – and potentially the Chinese government – to have direct access to their users’ most sensitive data.

The indictment of Huawei as a criminal enterprise shows that the Trump administration was mistaken when it placated Beijing by softening previous penalties for Huawei’s misconduct. If the court finds Huawei guilty under RICO, the administration should ensure the full application of all penalties necessary to end its criminal pursuits.

 

Chinese Spy Leading California Public Pension Fund?

This may add some very new and different questions when it comes to the Biden foreign operations….read on….

Rep. Jim Banks, R-Ind., joined “Mornings with Maria” to explain why he wrote a letter to California Gov. Gavin Newsom highlighting his concerns about the state public pension fund’s chief investment officer having ties to China.

The fund has invested $3.1 billion in Chinese companies, some of which have been blacklisted by the U.S. government, Banks told FOX Business’ Maria Bartiromo.

“If this were up to me, I would fire [Chief Investment Officer Yu Ben Meng] immediately because of these suspicious ties,” he said. “We learned that Mr. Meng, who is the chief investment officer of CalPERS, was actually recruited to this position by the [Chinese Communist Party] through something called the Thousand Talents Program. Now he’s denied it.”

CalPERS stands for the California Public Employees’ Retirement System, the largest public pension fund in the nation.

“What is unusual is that many of these companies are companies that we’ve blacklisted, that make Chinese military equipment or are responsible for technologies like Hikvision, which is the equipment that’s used by the Chinese for surveillance on the Uighur Muslim population that they’ve been abusing in their own country,” Banks said.

The Commerce Department blacklisted Hikvision in October “for engaging in or enabling activities contrary to the foreign policy interests of the United States.”

CalPERS defended Meng.

“This is a reprehensible attack on a U.S. citizen. We fully stand behind our Chief Investment Officer who came to CalPERS with a stellar international reputation,” a CalPERS spokeswoman told Reuters.

China's Social Credit System – It's Coming To The United ...

Hold on, it is actually worse… going back 4 months ago….

(Reuters) – Some of the biggest public pensions funds in the United States have invested in one of the world’s largest purveyors of video surveillance systems that the U.S. government claims are used in wide-scale repression of the Muslim population of western China.

The Trump administration’s decision to put the company, Hangzhou Hikvision Digital Technology Co (002415.SZ), on a blacklist last week has prompted at least two of the pension plans to say they are reviewing or monitoring that development.

The blacklist applies to Hikvision and seven other companies because they allegedly enabled the crackdown that has led to mass arbitrary detentions in the Xinjiang region.

“We are tracking the situation given this new development with the Department of Commerce’s announcement,” a spokeswoman for the California State Teachers’ Retirement System (CalSTRS) said in an email.

CalSTRS owned 4.35 million Hikvision shares at the end of June 30, 2018, the last data available. The holding, owned directly and through emerging market exchange-traded funds, would be worth $24 million at that share count.

The New York State Teachers Retirement System also owned Hikvision, reporting 81,802 shares at the end of June, up from 26,402 shares at the end of 2018, fund disclosures show.

“Our holdings are primarily held according to their weights in passive portfolios matching the MSCI ACWI ex-U.S. index, our policy benchmark. We are monitoring the situation,” said a spokesman for the teachers’ fund. The ex-U.S. All Country World Index includes stocks from 22 developed and emerging markets.

The blacklisting means Hikvision and the other companies will not be able to buy U.S. technology, such as software and microchips, without specific U.S. government approval. It does not prevent U.S. investors from buying the companies’ shares. In August, Hikvision had been banned from selling to U.S. federal agencies because the government said its products could allow access to sensitive systems.

Hikvision’s General Manager Hu Yangzhong told Reuters on Wednesday it has been talking to the U.S. government about Xinjiang and has hired human rights lawyers to defend itself against the blacklisting.

A spokeswoman for law firm Sidley Austin LLP, which has lobbied for Hikvision this year, declined to comment.

Another major fund investing in Hikvision shares is the Florida Retirement System (FRS), with 1.8 million shares at the end of June.

A spokesman for the fund said it was working closely with external money managers “related to the issue in order to meet all regulatory and fiduciary requirements.”

POSTER CHILD

Risk consultants say the ease with which money used for the retirements of tens of millions of Americans is being invested in such companies should concern U.S. authorities at every level, as well as Americans generally.

“Hikvision has emerged as the corporate poster child for enabling Chinese human rights abuses, with its surveillance cameras visible atop the walls of detention camps incarcerating some one million or more Uighurs in Xinjiang,” said Roger Robinson, president and CEO of Washington DC-based risk consultancy RWR Advisory Group.

Beijing denies any mistreatment of people at the camps, which it says provide vocational training to help stamp out religious extremism and teach new work skills.

Robinson said that many Americans are unwittingly owning shares in such companies because they are in index funds. “They are picked up by the index providers in sizable numbers and sluiced into U.S. investor portfolios with seemingly very little, if any, due diligence or disclosure in the categories of national security and human rights.”

MSCI Inc (MSCI.N), whose products are designed for global investors, added Hikvision to its benchmark emerging markets index last year. MSCI declined to comment.

One other company among the blacklisted eight that is owned by some of the big pension funds is iFlytek Co Ltd (002230.SZ), a speech-recognition firm. Its shares were owned by funds in Florida, New York State as well as CalSTRS and the California Public Employees Retirement System (CalPERS) indirectly through the iShares MSCI Emerging Markets ETF at their last disclosure dates. IShares, a top ETF provider owned by BlackRock Inc (BLK.N), declined to comment.

CUTTING TIES

Not all the funds have stuck with Hikvision.

The New York State Common Fund, one of the country’s biggest pension funds, liquidated its position months ago. It had owned 2.7 million shares worth $14.2 million at the end of March through an external fund manager, but sold them in May, a spokesman said, declining to say why.

U.S. mutual funds have also cut or eliminated positions in Hikvision amid the negative publicity, which included it being named in a Human Rights Watch report on mass surveillance in Xinjiang in May.

Just 9% of global emerging markets funds now own Hikvision, down from 20% in 2018, according to Copley Fund Research. One fund to pull out is the $2.7 billion Artisan Developing World Fund (APDYX.O), which had a $66 million position in Hikvision at the end of March but reported holding no shares three months later, fund disclosures show. Artisan did not respond to a request for comment.

At least one U.S. pension fund had worried this summer about whether to invest in the Chinese surveillance company.

The $33 billion Alaska Permanent Fund had considered an investment in a China fund featuring Hikvision as a top holding, according to minutes of a June meeting of its trustees and staff. The minutes were published last month.

Schroders Global Asset Management, a finalist for the fund’s mainland China investment mandate, touted Hikvision as a top performer.

Some Alaska trustees, however, worried about “headline risks” of investing in companies that aid the Chinese government’s surveillance activities, according to the minutes.

Jack Lee, portfolio manager of the China fund, assured Alaska pension officials he had spoken with Hikvision executives. Hikvision will “try to avoid that kind of business,” the trustees were told, but “they don’t necessarily know how their equipment is used,” Lee told the trustees, according to the minutes.

Reuters could not determine whether Alaska made an investment in the Schroders fund that included Hikvision stock.

A spokeswoman for the Alaska Retirement Management Board, which oversees the pension, said it does not have any additional information to share regarding Schroders’ efforts. A Schroders spokesman declined to comment.

 

 

It is Bigger than Burisma and the Bidens, Trump Knows

Speaker Pelosi held a press conference after the first day of the open impeachment inquiry hearing declaring that she is the smartest when it comes to intelligence and she will defend and protect the whistle-blower with all her might. HPSCI Chairman Adam Schiff said at least twice that he does not know nor has he spoken to the whistle-blower. Sheesh really? REALLY?

Pelosi and Schiff are for sure covering for something much larger and it is in Ukraine and likely at least a few other countries. There was a historic theft from PrivatBank a few years ago that was in excess of $5 BILLION. Then Ukraine was forced to nationalize the bank until such time the monies were tracked, found or recovered, which still has not happened. The country was financially suffering and the reputation of corruption in Ukraine continued to fester.

Seems our own U.S. State Department was enlisted to step up operations in Ukraine using several government agencies and non-government agencies known as NGO’s.

The matter of the whistle-blower is but one piece of all things Ukraine even while 2 State Department officials, George Kent and William Taylor provide testimony in the first round of the public hearing. (BTW, Kent’s wife is of Crimean-Tatar ancestry) Kent and Taylor are in the thick of all things Ukraine and beyond even while responding in open testimony they were unaware of key political events stateside.

Our not so favorite nefarious operator George Soros is very much at the center of much of the chaos in Ukraine, the Hillary Clinton/John Kerry State Department and some of those NGO’s.

List below are some bullet items for reference. It is difficult to piece together the whole mess but the facts below may help the reader with the long game plot against President Trump because his handful of phone calls with Ukraine President Zelensky regarding investigations into corruption(s) has struck a nerve that the power-brokers in DC are driven to stop and protect.

  • To boost legitimacy of Ukraine and Burisma, the Obama administration partnered Burisma with USAID.
  • USAID was enlisted to prepare for a new generation of Ukrainian politicians.
  • From the U.S. Ukraine Business Council: Briefing by Vadym Pozharskyi, Advisor to the Board of Directors, Burisma Holdings Ukraine’s largest independent gas producer, 30% market share by gas output volume in 2015

    Vadym Pozharskyi currently serves as an Advisor to the Board of Directors at the Burisma Holdings. He is also in charge of the Holding’s overseas expansion, GR & PR block. Prior to that, he worked for 4 years in the public sector, inter alia, on positions of the Head of the International Relations Department at the Ministry of Ecology and Natural Resources of Ukraine and the Deputy Head of the State Environmental Investment Agency of Ukraine.

    During these engagements he extensively cooperated with international organizations, led the negotiations group to UNFCCC on the restoration of Ukraine’s status in Kyoto protocol. From 2010 until 2014, Mr. Pozharskyi was the Global Environment Facility (GEF) Focal point in Ukraine.

    Burisma Holdings, www.BURISMA.com, since its launch in 2002, has rapidly become the largest gas producer in Ukraine.  Burisma Holdings consists of 4 operating companies, engaged in exploration and production of hydrocarbons (dealing with hydrocarbon production).  Burisma Holdings has expanded its operations beyond Ukraine and now operates in Germany, Mexico, Italy, and Kazakhstan.

    Burisma Geothermal is a new branch of Burisma Holdings.  It is a 100% owned subsidiary which specializes in geothermal energy development and electricity production from renewable and environmentally friendly energy sources in Europe.  Burisma Holdings has purchased equipment and technologies from such USA companies as Halliburton and Caterpillar.

  • Several U.S. government agencies were tapped to provide financial assistance to Ukraine and President Trump is right to ask harder questions as there is no Inspector General assigned to Ukraine to track that spending for legitimacy. Remember the legacy of corruption in Ukraine and Trump has a duty to see if he can trust a brand new leader in Zelensky who was never a politician.

 

 

 

 

 

 

  • William B. Taylor is the executive vice president at the U.S. Institute of Peace. Earlier, he was the special coordinator for Middle East Transitions in the U.S. State Department. He oversaw assistance and support to Egypt, Tunisia, Libya and Syria. He served as the U.S. ambassador to Ukraine from 2006 to 2009. Ambassador Taylor became chargé d’affaires ad interim for Ukraine in June 2019. In picking through some of the other names in the membership of The American Academy of Diplomacy  (NGO) which includes Taylor, they are: Madeleine Albright, Hillary Clinton, Jon Huntsman Jr., John Kerry, Victoria Nuland, Thomas Pickering, Susan Rice, Wendy Sherman, Strobe Talbott and Kent Volker.
  • Willam Taylor as part of the U.S. Institute of Peace, not only was USAID a deeper partner in Ukraine but Google is also. USAID was/is a sponsor of RADA. RADA and the USAID program that launched in November of 2013 collectively took to the streets in Ukraine for what is known as the Revolution of Dignity coordinating with Members of Parliament and civil society organizations and other international experts.
  • President Trump mentioned Crowdstrike in the phone call. Crowdstrike was hired by Perkins Coie to investigate the hacking of he DNC server. Perkins Coie was the law firm of record for the DNC and hired Fusion GPS. Trump has the notion that Crowdstrike also may have operated out of Ukraine that clues point to Crowdstrike was part of foreign interference into our 2016 elections. It should be noted that a independent group of journalists based in Britain are seeking a UK report of Russian/Ukraine interference their Britain’s election. As a matter of fact, Crowdstrike has an office in London.

 

  • With all this political power and international resumes, how was it that Russia was allowed to annex Crimea and invade Ukraine in the first place? Where was Taylor, Nuland, Kerry, Rice or Obama? Too busy with the Iran nuclear deal it seems. The United States needed Russia’s cooperation with the Iran JCPOA so Obama did not grant the request of Ukraine for military aide other than to ship MRE’s and blankets. Congress (read Democrats) never complained until President Trump was in a phone call and approved the eventual shipment of real military aide.

So, back to the beginning, where does this whistle-blower fit in? Seems he was/is the Ukraine expert assigned to VP Biden who was assigned by Obama to be the leader of the envoy for all things Ukraine. At least 6 emails obtained from a FOIA list the Ciaramella in the email chain. Others include Victoria Nuland, George Kent and Kathleen Kavalec. There are other names in the email discussion(s) dated June 2016.

This is a larger operation that has a genesis in Ukraine. There are known quantities of moving parts but it is clear that Pelosi, Schiff and perhaps many others at NGO’s, the State Department, the previous members of the Obama White House are in fact just a little nervous that Trump and his lawyer Rudy Giuliani are treading in waters made dark by operatives they are working to hide, defend and protect.