Democrats are trying their second Russian collusion hoax, this time trying to cover the Biden’s in the process of taking down Trump.
Democrats do not give up. They will never stop trying to protect their cash-funneling, self-appointed controlling ways, and to do so, Donald Trump must be removed from office. They tried to get him impeached with the first Russian hoax orchestrated by the previous administration which weaponized the intelligence community against a single man in order to interfere with the presidential election in favor of Hillary.
That didn’t work.
So, they came up with a Lawfare idea of a ‘whistleblower.’ Of course, there was no evidence here either, but the real plan was hidden until yesterday.
Sundance at Conservative Treehouse, once again, illuminates the evil intentions of our democrat masters and exactly what’s happening to oust the most effective president the United States has seen in scores of years:
Yesterday’s ridiculous, albeit proactive, New York Times narrative about Russians hacking Burisma now makes sense.
Today the Lawfare team (Mary McCord et al) within Adam Schiff’s impeachment crew send additional files of evidence (pdf below) to be included in the impeachment articles constructed by HJC Chairman Jerry Nadler.
It is all coordinated.
The “new evidence” relates to information turned over by Lev Parnas, an SDNY indicted former associate of Trump’s personal attorney Rudy Giuliani.
The Lawfare purpose is to bolster their premise that President Trump was trying to force Ukraine President Volodymyr Zelensky to investigate Joe Biden’s corrupt activity around the Ukrainian company Burisma.
The Lawfare crew behind Schiff waited until the last minute to push the new “evidence” because they didn’t want republicans to deconstruct it during the impeachment evidence gathering phase.
So the proactive democrat strategy was/is to use the New York Times presentation of Russia hacking Burisma to negate the provenance of the evidence against the Bidens.
In essence, to cast doubt upon any documents that would show Joe and Hunter Biden participating in an actual influence and money-laundering scheme.
The SDNY created legal leverage upon Lev Parnas using the familiar strategy of charging “FARA violations”, as noted in the background of the House explanation.
The purpose was/is to extract anything from Parnas that could be twisted or construed to show evidence that Rudy Giuliani was working on behalf of President Trump to pressure Ukraine into investigating Burisma, Joe Biden and Hunter Biden.
To counter any evidence that would highlight the truth that Hunter and Joe Biden were indeed participating in a pay-to-play influence and money laundering scheme for personal financial benefit, the same democrat operatives created a 2020 Russian ‘hacking claim’ using former Crowdstrike employee Blake Darché and his colleague Oren Falkowitz.
NYT – […] The hackers fooled some of them into handing over their login credentials, and managed to get inside one of Burisma’s servers, Area 1 said.
“The attacks were successful,” said Oren Falkowitz, a co-founder of Area 1, who previously served at the National Security Agency. Mr. Falkowitz’s firm maintains a network of sensors on web servers around the globe — many known to be used by state-sponsored hackers — which gives the firm a front-row seat to phishing attacks, and allows them to block attacks on their customers. (link)
Blake Darche’ and Oren Falkowitz formed a new cyber-security company named “Area-1 Security”. It is analysis from this group that the New York Times uses to push the Russia hacking of Burisma narrative. It’s all the same players, just switching around the subject.
- The 2016 Lawfare group is now 2020’s Just Security;
- the 2016 CrowdStrike group is now 2020’s Area-1 Security;
- and the 2016 Russia DNC hack is now the 2020 Russia Burisma hack…
It’s the same players, the same story, the same approach.
Go deep on Oleg Falkowitz and Oren Falkowitz HERE
In February 2008, Oleg Falkowitz was hired as the Iran Mission Manager and Special Assistant For Policy and Cybersecurity at the Office of the Director of National Intelligence.
In February 2009, Oleg Falkowitz left his position at the Office of the Director of National Intelligence.
In August 2010, Oleg Falkowitz was hired as Director of Technology and Data Science Program (J2 — Intelligence) at the United States Cyber Command.
In July 2012, Oleg Falkowitz left his position at both the United States Cyber Command and the National Security Agency.
In January 2013, Falkowitz left his position at sqrrl.
Blake Darché published the article “Once a Target, Always a Target” in Medium, which was about “Cozy Bear”.
Between July 17–19, 2017, Oren Falkowitz, John Brennan, Andrea Mitchell and David Sanger attended the Fortune Brainstorm Tech Conference in Aspen, CO.
So we see, very clearly, that the entire next step has been carefully planned and is being orchestrated according to the will of these elitist rulers.