It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: dashen
Welp. Laptop up and died.
Won't take a charge.
Exactly one year old to the day.
Back to burner phones like mama taught you
The spiraling rabbit hole of the Seth Rich Murder - With George Webb
It was at this point that I realized Eric Schmidt might not have been an emissary of Google alone. Whether officially or not, he had been keeping some company that placed him very close to Washington, DC, including a well-documented relationship with President Obama. Not only had Hillary Clinton’s people known that Eric Schmidt’s partner had visited me, but they had also elected to use her as a back channel. While WikiLeaks had been deeply involved in publishing the inner archive of the US State Department, the US State Department had, in effect, snuck into the WikiLeaks command center and hit me up for a free lunch.
Two years later, in the wake of his early 2013 visits to China, North Korea, and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. But at the time it was a novel thought.
Cohen’s directorate appeared to cross over from public relations and “corporate responsibility” work into active corporate intervention in foreign affairs at a level that is normally reserved for states. Jared Cohen could be wryly named Google’s “director of regime change.” According to the emails, he was trying to plant his fingerprints on some of the major historical events in the contemporary Middle East.
He could be placed in Egypt during the revolution, meeting with Wael Ghonim, the Google employee whose arrest and imprisonment hours later would make him a PR-friendly symbol of the uprising in the Western press. Meetings had been planned in Palestine and Turkey, both of which—claimed Stratfor emails—were killed by the senior Google leadership as too risky. Only a few months before he met with me, Cohen was planning a trip to the edge of Iran in Azerbaijan to “engage the Iranian communities closer to the border,” as part of Google Ideas’ project on “repressive societies.”
In internal emails Stratfor’s vice president for intelligence, Fred Burton (himself a former State Department security official), wrote, Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do . . . "[Cohen] is going to get himself kidnapped or killed. Might be the best thing to happen to expose Google’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and Google is left holding the #-bag."
In further internal communication, Burton said his sources on Cohen’s activities were Marty Lev—Google’s director of security and safety—and Eric Schmidt himself.15 Looking for something more concrete, I began to search in WikiLeaks’ archive for information on Cohen. State Department cables released as part of Cablegate reveal that Cohen had been in Afghanistan in 2009, trying to convince the four major Afghan mobile phone companies to move their antennas onto US military bases.16 In Lebanon he quietly worked to establish an intellectual and clerical rival to Hezbollah, the “Higher Shia League.”17 And in London he offered Bollywood movie executives funds to insert anti-extremist content into their films, and promised to connect them to related networks in Hollywood.
Three days after he visited me at Ellingham Hall, Jared Cohen flew to Ireland to direct the “Save Summit,” an event cosponsored by Google Ideas and the Council on Foreign Relations. Gathering former inner-city gang members, right-wing militants, violent nationalists, and “religious extremists” from all over the world together in one place, the event aimed to workshop technological solutions to the problem of “violent extremism.” What could go wrong?
Q !CbboFOtcZs ID: f983de No.1784226 📁 NEW
Jun 17 2018 09:59:54 (EST)
Do you believe in coincidences?
(d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or
SETH RICH | How The Hacker Guccifer 2.0 Was Made Up By The DNC
First off understanding the order in which the events happened will be important to understanding how it was the DNC could have manufactured the Russian campaign. Date Event Source 06/14/2016 The DNC releases a statement stating they have been hacked. Washington Post 06/15/2016 Crowdstrike (cybersecurity firm) releases reports suggesting the DNC was hacked by Russians Crowdstrike 06/15/2016 Guccifer 2.0 publishes first DNC email documents and claims he has sent them to Wikileaks.Guccifer insists he is not Russian. Guccifer 2.0 blog 06/16/2016 Vice publishes article titled "'Guccifer 2.0' Is Likely a Russian Government Attempt to Cover Up Its Own Hack." Other media outlets follow suit calling Guccifer a Russian government job Vice 07/10/2016 Seth Rich's murder Wikipedia 07/22/2016 Wikileaks releases the DNC email documents Wikileaks 07/27/2016 Trump makes infamous "Russia: If you're listening, I hope you're able to find the 30,000 emails that are missing" joke that starts allegations of Russian collusion Politico DNC announces they've been hacked. The day after, a hacker calling themself Guccifer 2.0 claims responsibility for the hack and announces they'll be giving the documents to Wikileaks. Guccifer 2.0 denies being a Russian hacker which they deny throughout their activity. With the Crowdstrike report and the metadata in Guccifer 2.0's documents the MSM start start saying Guccifer 2.0 is a Russian agent. Eventually Wikileaks releases the DNC documents a month after Guccifer 2.0 did.
originally posted by: Aallanon
a reply to: CoramDeo
No it wasn't. I think this is the set up for Trump to declassify