Rigged: The Other Facts About the 2020 Election

Two of the most dangerous people of the 2020 election were Mark Zuckerberg and Marc Elias. We all know Zuckerberg but many need to be reminded who Marc Elias really is.

Marc Elias the Democratic National Committee’s election lawyer and legal adviser to Hillary Clinton’s 2016 campaign, filed more than 50 lawsuits around the country challenging state election laws in advance of the 2020 presidential election.

In a 2018 Tweet, President Donald Trump referred to Elias as the Democrats’ “best Election stealing lawyer.”

Marc Elias

Though most of the state laws he challenged have been on the books for years, Elias went full steam ahead asking courts to overrule state election laws, force states to count ballots that came in after Election Day, or force states to have unattended ballot collection boxes.

Elias chairs the political law group for the progressive, Seattle-based firm Perkins Coie, “which has had a stranglehold on Democratic legal work for years,” National Review noted in a Nov. 3 analysis.

Since 2019, Perkins Coie has been paid at least $41 million for its political work by Democratic-affiliated organizations, according to Federal Election Commission records. Republican lawyers say that is likely just a fraction of what Perkins Coie has received, because it doesn’t include legal work for many left-wing nonprofits.

Elias was also a key player in the Russia collusion hoax. As the attorney for both the DNC and Clinton campaign, he helped bankroll research by Fusion GPS that created the bogus “Steele dossier” used by the FBI to obtain FISA warrants to spy on the Trump campaign during the 2016 race. source

***

In “Rigged,” author Mollie Hemingway lays out what amounts to a fascinating alternative to the “stolen” charge. She presents a strong case that the $419 million that Facebook founder Mark Zuckerberg ostensibly spent to get out the vote was actually used by Democrat activists to infiltrate local election operations and take over jobs government workers were supposed to do.

Hemingway, a senior editor at The Federalist and a Fox commentator, shows how two Zuckerberg nonprofits used their unprecedented deep pockets to line up left-wing groups in key cities that in turn hired poll workers, collected absentee ballots and cured those with errors.

In Green Bay, Wisconsin, the Democratic mayor outsourced the planning and managing of the election to these activists. Hemingway cites an e-mail from the mayor’s chief of staff saying, “I am taking all of my cues” from one of the Zuckerberg groups.

The city clerk, nominally in charge of the election, was reportedly unhappy with the changes, went on leave shortly before election day and soon resigned.

As Hemingway puts it in excerpts published by The Post, “It was a genius plan. And because no one ever imagined that a coordinated operation could pull off the privatization of the election system, no laws were built to combat it.”

Texas researcher William Doyle crunched the numbers showing how the nonprofits concentrated in areas Biden won, often spending three or four times as much money per voter as they spent in districts Trump won.

“The 2020 election wasn’t stolen,” Doyle concluded. “It was likely bought by one of the world’s wealthiest and most powerful men pouring his money through legal loopholes.”

***Rigged: How the Media, Big Tech, and the Democrats Seized ...

Back in December of 2020, this site published two items exposing these operations.

Georgia/The Fulton County Board of Commissioners voted to accept a $6.3 million grant from the Mark-Zuckerberg funded Center for Technology and Civic Life “Safe Elections” project at a September 2, 2020 board meeting. It proceeded without asking a single question about the name of the group providing the funding, the origin of the funding, or the details of what the funding would be used for.

Here is the report on the clawback provisions Zuclerberg demanded if his money was not used as he required.

It begins with the Center for Technology and Civic Life (CTCL), which received nearly $400 million from Zuckerberg. Zuckerberg began the sizeable donations is September boost resources for local election officials, such as additional polling places and ballot drop boxes. Four federal lawsuits were filed in late September by Michigan’s Election Integrity Fund, by the Wisconsin Voters’ Alliance, by the Minnesota Voters’ Alliance, and by two Pennsylvania congressional candidates and several state house members. The lawsuits contend federal law prohibits local governments from accepting private federal election grants. Zuckerberg won the lawsuits in each case, so far.

The lawsuits focus on the Center for Tech and Civic Life spending about $26 million in grants across 12 cities in Michigan, Pennsylvania, Minnesota and Wisconsin, which combined cast over 75% off their two million votes in favor of Hillary Clinton in the 2016 election, according to the plaintiffs. source

Then in June of 2021, is the other item:

In exchange for the money, elections divisions agreed to conduct their elections according to conditions set out by the CTCL, which is led by former members of the New Organizing Institute, a training center for progressive groups and Democratic campaigns.

A CTCL partner, the Center for Civic Design, helped design absentee ballot forms and instructions, crafted voter registration letters for felons and tested automatic voter registration systems in several states, working alongside progressive activist groups in Michigan and directly with elections offices in Georgia and Utah.

Still other groups with a progressive leaning, including the Main Street Alliance, The Elections Group and the National Vote at Home Institute, provided support for some elections offices.

“COVID-19 response” grants of varying amounts to  2,500 municipalities in 49 states.

Facebook, with the CTCL, was also part of the effort, providing a guide and webinar for election officials on how to engage voters. Included were directions to report “voter interference” to Facebook authorities. The company also provided designated employees in six regions of the U.S. to handle questions. Together, the groups strategically targeted voters and waged a voter assistance campaign aimed at low-income and minority residents who typically shun election participation, helping Democratic candidates win key spots all over the U.S.

The little-explored roles of CTCL and other such groups emerged in emails and other records obtained by RealClearInvestigations and public documents secured by conservative litigants and groups, including the Foundation for Government Accountability, which has filed more than 800 public records requests with elections offices accepting the grants.

Previously, the Zuckerberg-funded effort has been described in generally positive terms, notably when NPR reported in December on “How Private Money From Facebook’s CEO Saved The 2020 Election” — in the face of the coronavirus pandemic, President Trump’s doubts about the legitimacy of the process and “Congress’ neglect.”

In 2018, RCI reported that a New York University School of Law program funded by billionaire Michael Bloomberg had placed environmentally minded lawyers in the offices of Democratic state attorneys general to challenge Trump administration policies. And examples of private efforts to steer cash-strapped public education are numerous, from the Koch charities on the right to more recent race-conscious programs on the left emphasizing the legacy and centrality of white racism in society.

Zuckerberg did not respond to an emailed request from RCI for comment. In a post-election interview, he praised Facebook’s security work during the election and singled out its policing of “misinformation.” He noted working with polling officials to watch for information that might lead to “voter suppression” and said Facebook had strengthened its enforcement “against militias and conspiracy networks like Q-Anon.”

Biden Getting Softer on Moscow

Was any of this actually discussed in that summit between Biden and Putin? No mention of any of it during the press conference. Read on…

The state trials of Russia’s newest Zircon hypersonic missile from a surface carrier will begin in August 2021, a source in the military-industrial complex told.

source

Newsweek reports in part:

Moscow has warned the Pentagon that the U.S. deploying hypersonic missiles in Europe could unintentionally spark hostilities, just hours after Russia test-fired a weapon it wants to equip its warships and submarines with.

On Monday, Pentagon Press Secretary John Kirby was asked about Russia’s claims that it had successfully tested a Tsirkon hypersonic cruise missile.

“The tactical and technical characteristics of the Tsirkon missile were confirmed during the tests,” the Defense Ministry said, also releasing video of the weapon, which President Vladimir Putin had previously boasted would be able to reach speeds of Mach 9, and hit targets up to 700 miles away.

When asked about the test, Kirby said: “We’re certainly aware of President Putin’s claims, […] it’s important to note that Russia’s new hypersonic missiles are potentially destabilizing and pose significant risks because they are nuclear capable systems.”

Kirby added: “By contrast, the United States is developing solely non-nuclear hypersonic strike capabilities. So alongside our NATO allies we remain committed to deterrence while promoting greater stability in the region.”

But then we have the matter of the Havana Syndrome.

More than 20 officials have reported symptoms similar to Havana Syndrome – a mystery brain illness – since President Joe Biden took office in January.

The syndrome is unexplained, but US scientists say it is most probably caused by directed microwave radiation.

It was first found in Cuba in 2016-17.

US and Canadian diplomats in Havana complained of symptoms ranging from dizziness, loss of balance, hearing loss and anxiety to something they described as “cognitive fog”.

The US accused Cuba of carrying out “sonic attacks”, which it strongly denied, and the incident led to increased tension between the two nations.

A 2019 US academic study found “brain abnormalities” in the diplomats who had fallen ill, but Cuba dismissed the report.

The Vienna cases first came to light in the New Yorker magazine on Friday and were later confirmed by the US State Department, which said it was “vigorously investigating”.

Reuters quoted an Austrian foreign ministry statement saying it was “working with the US authorities on jointly getting to the bottom of this”.

Vienna has long been a centre for diplomatic activity and has had a reputation as a hotspot for espionage, particularly during the Cold War.

Countries like the US have a large diplomatic presence there.

The city is currently hosting indirect talks between Iran and the US over attempts to resurrect the 2015 Iran nuclear deal.

Cases of the condition have been reported elsewhere in the world, but US officials say the numbers in Vienna are greater than in any other city apart from Havana.

In June, US Secretary of State Antony Blinken announced a wide-ranging review into the causes of the illness.

Then there is the matter of that pesky pipeline…Russia’s….Biden shuttered our own Keystone pipeline  on day one.

Yandex, a Russian tech company is on 250 US University Campuses

It is no wonder they are hacking America to death…

Do we really know what is inside these machines?

Forbes:

Yandex, a Russian tech company working on self-driving systems, is partnering with GrubHub to deploy a fleet of delivery robots on selected college campuses in the United States later this year.

Yandex NV Tests Autonomous Delivery Robots on Russian Streets

© 2020 Bloomberg Finance LP

Financial terms of the partnership were not disclosed.

Yandex often compares itself to Google. It offers arange of services, including a search engine, ride-hailing and food delivery. The company began operating food delivery robots, called Rovers, in 2019 in Moscow, Tel Aviv and Ann Arbor, Michigan.

“We chose to partner with GrubHub for campus delivery because of GrubHub’s unparalleled reach into college campuses across the United States, as well as the flexibility and strength of their ordering platform,” said Dmitry Polishchuk, CEO of Yandex Self-Driving Group. “We are delighted to deploy dozens of our rovers, taking the next step in actively commercializing our self-driving technology in different markets across the globe.’’

The partnership plans to launch the Rovers on 250 campuses.

“While college campuses are notoriously difficult for cars to navigate, specifically as it relates to food delivery, Yandex robots easily access parts of campuses that vehicles cannot,” Brian Madigan, GrubHub vice president of corporate and campus partners, said in a statement.

Yandex robot fleets have logged seven million autonomous miles since the team was founded in 2017, second only to Alphabet’s Waymo. That’s up from two million miles in February 2020.

MORE FOR YOU

Elon Musk Is On The Hook For Billions If He Loses Lawsuit Over Tesla’s SolarCity Deal

A Hydrogen-Powered Boat Is Sailing The World. If Not In Cars, Do Boats Make Sense?

Yandex employs about 400 engineers, plus operational and support staff.

Artem Fokin, Yandex’s head of business development, told Forbes.com that the company has spent only $100 million dollars on development in the four years since inception. That’s relatively frugal compared to Silicon Valley teams, which have raised billions toward the same goal.

The company’s Rovers deliver take-out meals, groceries, and retail consumer goods. Yandex has increased the dimensions and carrying capacity of the Rovers over time, to accommodate larger loads.

“We’ve worked to make the cost of Rover delivery extremely economical,” spokesman Yulia Shveyko, told Forbes.com contributor David Silver in May. “In Russia, human delivery is very price-competitive, and we have to be even more affordable than that.”

Unlike public roads, where vehicles travel in lanes and their travel patterns are predictable, Yandex vehicles must navigate sidewalks and other pedestrian paths where people’s movements are less orderly.

They can operate in broad daylight and in the dark of night, in moderate snowfall and rain, as well as in controlled and uncontrolled pedestrian crossing scenarios. But they can only travel at speeds up to 5 miles per hour.

Yandex owns 73% of its Self-Driving Group, while Uber owns 19% and a group of Yandex employees own the remaining 8%.

 

REvil, the Ransomware Hackers System Identified

Ahead of the three-day Fourth of July weekend, the REvil gang is suspected to be behind a new ransomware attack Friday that affected at least 200 companies in the U.S.

REvil, based in Russia, was likely behind the JBS Meat Packing attack in May, according to the FBI. The Flashpoint Intelligence Platform has suggested that former REvil members were involved in the recent Colonial Pipeline attack earlier this year as well, allegedly done by the DarkSide ransomware group. More here from Newsweek.

Per the FBI’s most recent statement:

Updated July 4, 2021: 

If you feel your systems have been compromised as a result of the Kaseya ransomware incident, we encourage you to employ all recommended mitigations, follow guidance from Kaseya and the Cybersecurity and Infrastructure Security Agency (CISA) to shut down your VSA servers immediately, and report your compromise to the FBI at ic3.gov. Please include as much information as possible to assist the FBI and CISA in determining prioritization for victim outreach. Due to the potential scale of this incident, the FBI and CISA may be unable to respond to each victim individually, but all information we receive will be useful in countering this threat.


Original statement:

The FBI is investigating this situation and working with Kaseya, in coordination with CISA, to conduct outreach to possibly impacted victims. We encourage all who might be affected to employ the recommended mitigations and for users to follow Kaseya’s guidance to shut down VSA servers immediately. As always, we stand ready to assist any impacted entities.

Additionally:

Kaseya had expected that it would be able to patch and restore its VSA software-as-a-service product by today, but technical problems its developers encountered have blocked the rollout. As of 8:00 AM EDT today, the company was still working to resolve the issues it encountered.

Reuters quotes US President Biden as offering, yesterday, a relatively upbeat preliminary assessment of the consequences of the ransomware campaign: “It appears to have caused minimal damage to U.S. businesses, but we’re still gathering information,” Mr. Biden said, adding “I feel good about our ability to be able to respond.”

That said, the US Government is continuing its investigation and is signalling an intention to do something about REvil and other gangs or privateers. Among other things, the US Administration said that it has communicated very clearly to Russian authorities that the US wants the REvil operators brought to book. CBS News reported yesterday that White House press secretary Psaki said that the US had been in touch with Russian officials about the REvil operation, and that if Russia doesn’t take action against its ransomware gangs, “we will” TASS is, of course, authorized to disclose that Russia not only had nothing to do with the attack, and that it knew nothing about it, and that in fact Moscow had heard nothing from Washington about the matter.

But, outside government cyber experts have uncovered the following:

Hat tip source

Resecurity® HUNTER, cyber threat intelligence and R&D unit, identified a strong connection to a cloud hosting and IoT company servicing the domain belonging to cybercriminals.

According to the recent research published by ReSecurity on Twitter, starting January 2021 REVil leveraged a new domain ‘decoder[.]re’ in addition to a ransomware page available in the TOR network.

***

The domain was included within the ransom notes dropped by the recent version of REVil, it came in the form of a text file containing contact and payment instructions.

revil map

Typically, the collaboration between the victim and REVil was organized via a page in TOR, but in the case their victim is not able to access the Onion Network, the group prepared domains available in Clearnet (WWW) acting as a ‘mirror’.

revil
TOR host

 

revil
WWW host (decoder[.]re)

To access the page in WWW or TOR – the victim needs to provide a valid UID (e.g.,”9343467A488841AC”). The researchers acquired a significant number of UIDs and private keys as a result of ransomware samples detonated and through the collaboration with victims globally. The private keys determine if the same functional process is available on both resources confirming, they’re delivering exactly the same content.

Like decryptor[.]cc and decryptor[.]top in previous REvil / Sodinokibi versions, decoder[.]re is used to grant the victims access to the threat actors WEB-site for further negotiations. The application hosted on it contains ‘chat’ functionality enabling interactive close to real-time communications between the victim and REVil.

The threat actors also used a disposable temporary e-mail address created via https://guerrillamail.com to anonymously register the domain name, which was later used for name servers too, this also allowed them to park other elements of their infrastructure. Such e-mails could only be used a limited number of times, for example all communications with them would be automatically deleted within 1 hour.

Resecurity was able to collect the available and historical DNS records, then create a visual graph representing the current network infrastructure used by REVil and shared it with the cybersecurity community. According to experts, such a step may facilitate proper legal action against ransomware, as well as outline parties responsible for such malicious activity, as the uncovered details raise significant questions regarding the reaction from hosting providers and law enforcement.

revil map

Based on the network and DNS intelligence collected by experts, the IPs associated with it have been rotated at least 3 times in Q1 2021 and were related to a particular cloud hosting and IoT solutions provider located in Eastern Europe, which continues to service them.

It’s hard to believe such malicious activity has gone unnoticed by certain governments resulting in damage to thousands of enterprises globally.” – said Gene Yoo, Chief Executive Officer of Resecurity.

President Joe Biden has ordered U.S. intelligence agencies to investigate the sophisticated ransomware attack on Kaseya presumably conducted by REVil, a notorious cybercriminal syndicate believed to have ties to Russian-speaking actors that’s previously gone after high-profile targets such as Apple and Acer.

The group is also believed to be behind last month’s successful attack on the world’s largest meat processing company, JBS, that extorted $11 million in ransom. REvil took official responsibility for the attack and released an announcement in their blog which is available in TOR network asking for $70 million payment from Kaseya – the biggest ransom payment demand known in the industry today.

The attack has already affected over 1,000 businesses globally disrupting their operations. One suspected victim of the breach, the Sweden-based retailer Coop, closed at least 800 stores over the weekend after its systems were taken offline.

The White House Press Secretary Jen Psaki said the US will take action against the cybercriminal groups from Russia if the Russian government refuses to do so.

The investigation is still ongoing.

About the author: Gene Yoo, Chief Executive Officer (Resecurity, Inc.)

Biden Gives Putin a List of Entities to not Hack

Yup…16 of them. All the other parts of infrastructure is okay or not as important? Does the same list apply to hackers from China, Iran or North Korea? Do they get a copy too?

Primer:

Remember MH17? Just for what context on Russian operatives, it is not just the United States.

Russian hackers compromised the computer systems of the Dutch national police while the latter were conducting a criminal probe into the downing of Malaysia Airlines Flight 17 (MH17), according to a new report. MH17 was a scheduled passenger flight from Amsterdam to Kuala Lumpur, which was shot down over eastern Ukraine on July 17, 2014. All 283 passengers and 15 crew on board, 196 of them Dutch citizens, were killed.

Dutch newspaper De Volkskrant, which revealed this new information last week, said the compromise of the Dutch national police’s computer systems was not detected by Dutch police themselves, but by the Dutch General Intelligence and Security Service (AIVD). The paper said that neither the police nor the AIVD were willing to confirm the breach, but added that it had confirmed the breach took place through multiple anonymous sources.

On July 5, 2017, the Netherlands, Ukraine, Belgium, Australia and Malaysia announced the establishment of the Joint Investigation Team (JIT) into the downing of flight MH-17. The multinational group stipulated that possible suspects of the downing of flight MH17 would be tried in the Netherlands. In September 2017, the AIVD said it possessed information about Russian targets in the Netherlands, which included an IP address of a police academy system. That system turned out to have been compromised, which allowed the attackers to access police systems. According to four anonymous sources, evidence of the attack was detected in several different places.

The police academy is part of the Dutch national police, and non-academy police personnel can access the network using their log-in credentials. Some sources suggest that the Russian Foreign Intelligence Service (SVR) carried out the attack through a Russian hacker group known as APT29, or Cozy Bear. However, a growing number of sources claim the attack was perpetrated by the Main Directorate of the Russian Armed Forces’ General Staff, known commonly as GRU, through a hacker group known as APT28, or Fancy Bear. SVR attackers are often involved in prolonged espionage operations and are careful to stay below the radar, whereas the GRU is believed to be more heavy-handed and faster. The SVR is believed to be partly responsible for the compromise of United States government agencies and companies through the supply chain attack known as the SolarWinds cyber attack, which came to light in late 2020. source

Live blog: Biden, Putin finish Geneva summit, confirms ... source

(notice Victoria Nuland at the table?)

FNC:

President Biden told reporters Wednesday he gave President Vladimir Putin a list of 16 critical infrastructure entities that are “off limits” to a Russian cyberattack.

Those entities include energy, water, health care, emergency, chemical, nuclear, communications, government, defense, food, commercial facilities, IT, transportation, dams, manufacturing and financial services.

“We’ll find out whether we have a cybersecurity arrangement that begins to bring some order,” Biden said. Putin, for his part, denied any involvement in a recent spate of cyberattacks that have hit major industries across the U.S.

“I looked at him. I said, ‘How would you feel if ransomware took on the pipelines from your oil fields?’ He said, ‘It would matter.’ This is not about just our self-interest.” the president said.

Biden refused to say if military action was on the table if Russia was found to be responsible for a ransomware attack.

“In terms of the red line you laid down is military response an option for a ransomware attack?” a reporter asked.

“Thank you very much,” Biden said as he abruptly tried to end the shorter-than-expected conference. “No, we didn’t talk about military response,” he said when pressed again.

Biden in another moment had said he didn’t make any threats but rather “simple assertions.”

Biden stressed the need for both nation “to take action against criminals that conduct ransomware activities on their territory.”

Putin, in his own press conference after the meeting, claimed that American sources say that a “majority” of the cyberattacks in the world come from within the U.S.

The number of organizations affected by ransomware has jumped 102% compared to the beginning of 2020 and “shows no sign of slowing down,” according to a research note last month from IT security firm Check Point.

Both Colonial Pipeline and JBS Holdings, a meat-processing company, have been subject to major cyberattacks, where against the guidance of the FBI they paid millions of dollars in ransom to resume operation. The Colonial Pipeline attack was linked back to a Russian hacking group.