Category Archives: Elections

National Entertainment – Political Soap Opera Lie

☆ The National Blatant – News Entertainment – Political Soap Opera Lie ☆

I know it’s easy to criticize, but when I see or read a story that repeats fiction & drama, packages it as fact on a massive scale, I just have to comment.

I’m referring to this ongoing FBI investigation into Russian collusion with the Trump campaign. Let me begin by stating the obvious, Donald Trump won the election in 2016 by a simple, well known strategy. He ran a campaign without assumptions on which states “were in the bag”, by visiting those who were supposedly going to vote Democrat. This included among others, Ohio, Pennsylvania, Florida. His campaign managers knew full well that the key to victory is to win at least 270 votes in the electoral college.

The key to debunking this false story, is to understand how the electoral college vote works. I’m going to quote from an NPR article written 2 November 2016.

☆ ☆ ☆ ☆ ☆
“To win the presidency, you don’t have to win the majority of the popular vote. You have to win the majority of electoral votes — that is, 270 of them.”

“In most states, a candidate wins electoral votes by winning the most voters.

“So. Win a state by just one vote, and you win all of its electoral votes (unless you live in Nebraska or Maine, which divvy up their votes a little differently).”
☆ ☆ ☆ ☆ ☆

The key is still to win the popular vote. That’s the beginning and ending of this whole national mythical “boogie man”, story. The inherent protection, and incredibly simple, yet intelligent method to select our leadership, is a representative voting system which prevents just a handful of densely populated urban areas as representative of the entire country. It’s possible to gain 270 electoral votes through 11 of the most populated states, such as California, Texas, New York, Florida, Pennsylvania, Illinois, Ohio, Michigan, Georgia, North Carolina, New Jersey, for example, but in reality, that’s not how the 2016 election finished.

Hillary Clinton won the popular vote in some of the most densely populated urban areas such as, New York City, Los Angeles, Miami, Chicago, Seattle, etc. What she didn’t gain though, were the most states and the majority of the electoral vote. There are 540 votes possible, and Clinton won just 232 while Trump won 306 of the electoral vote. Her overall popular vote was higher, but not the electoral college vote. These facts are key to understand just how much fabrication, or unfounded anxiety, there is in the repeated false narrative, “The Russians Hacked Our Election”.

No they didn’t, and if you follow the rest of my explanation, you should be able to see for yourself, the media and the “Intelligence Community”, are weaving a tale.

Forbes_2016_Electoral_College_map_a

Most people who complain about the electoral college, either don’t understand why it’s such a good system, or refuse to believe it even after it’s explained. It also makes it vastly more difficult to affect the outcome of the election by outside electronic “hacked” alterations.

Since there isn’t a single, nationwide, homogeneous voting system, an outside bad actor, can’t alter the outcome of the election. An outside perpetrator may be able to get into a less than secure, local database, but actual voting tallies are performed at precinct levels and differ widely in methods from other localities, even in the same state. Recall the election when George Bush & Al Gore ran against each other, and there was a big dust up over the punch ballots being used in certain counties in Florida. That system wasn’t even state wide, so “hanging chads”, were unique and paper ballots had to be reviewed. That’s just not a system, as flawed as it is, which could have had a rogue state, or spy agency, come in and electronically alter the outcome.

Why is this so important to know? It’s because once you know this information, and take enough time to think about these basic facts, then the repeated news stories, and all the Mueller, Trump drama, can be seen for what it really is, and that’s political Kabuki theater.

CBS 60 Minutes just did a story on the 2016 election hacking, spy-craft. I encourage you to go to the 60 Minutes Web page and watch the video or go to YouTube to understand what I’m saying a little better. I also probably know more about computer networks, and how they function than the average person, since I’ve worked as an IT professional for many years. I’ve also done large scale communications programming, although that’s not a current skill set.

Here’s a summary of the basic 60 Minutes story.

☆ Some Russian cyber-techs infiltrate Illinois state voting records. After about 3 weeks, their outside network activities intensify. Illinois election records IT personnel take note of how much they’re being slammed from outside network traffic. They inform the FBI, and their IT super techs help investigate the penetration. They agree with the Illinois IT team, you’ve been hacked. Meanwhile, at an unknown point in the time-line, Illinois voting records IT personnel manage to stop the breach. Still, they’re pretty sure their voter database information has been obtained by an outside organization.

* The facts behind the Illinois database access; the hackers extracted personal information on roughly 90,000 registered voters, and none of the information was expunged or altered.

The FBI compares their collected network data, to the patterns (signatures or fingerprints which they like to call it, but that’s not a technical description), to other states voting records IT management, and at least 20 other states are likely to have been penetrated. In addition to that, the Democrat National Committee data records have been hacked. Understandably, because if you know anything about network spy-craft, your weakest links are usually the same everywhere. The biggest, most important users, are often those with the patterns sought out by hackers. They’re not IT disciplined, they don’t like to follow rules, and they seldom use strong, secure passwords. This isn’t always the way ‘hackers’ get in, but it’s a common recurring problem, and even the lead IT person can only politely suggest that the head honchos follow their rules.

We saw that huge security problem play out on national TV, when Hillary Clinton faced a Congressional committee and insisted she was justified in using her own private servers. No matter which side of the issue you found yourself on in that past extravaganza, it’s a prime example of how arrogance and power always win over any technical support opposition. Public or private, any tech person, if they want to keep their job, will go along with their bosses requests, no matter how impactful those decisions are on security.

So, we know there were multiple breeches performed by clever outsiders. The information they gave us through the media outlets are, John Podesta, Hillary Clinton, and Huma Abedin, emails revealed the Democrats in power, and under the influence of the Clinton campaign undermined the campaign of Bernie Sanders in the Democrat primary runoff. This was later confirmed by Former DNC Chair Donna Brazile in her Tell-All Book.

And we know that some of Donald Trump key people conducted meetings with influential Russians, to see if there was any dirt they could dish on Hillary Clinton and her campaign.

Overall conclusion’s by the 60 Minutes story? Russian hackers broke into some of our voter record databases and emails (NEWS FLASH: they’ve been doing that to large US Corporations for a couple of decades – including our banks). Even 60 minutes, and the people they interviewed were careful enough with the facts to not make the false claim, that success in breaching voting records changes the actual vote, in November. What they did claim was, “it undermines the integrity and the confidence Americans might have in our Democratic system.”

And here’s the final point I wish to make. That’s a far stretch, our politicians have been successful in undermining our country and election process for decades. Can anyone recall, Watergate? If you wish to remain ignorant on how votes are cast, collected, and counted; then you’re going to believe that somehow the Russians set the fox loose into the chicken coop, and rousted all the chickens, making them (this implies you), to change your vote for Trump. I’m quite certain you didn’t decide to change your mind on who to vote for because those rascally Russians have your name, home address, and phone number.

In case you want to know something more, the IP address they revealed in the 60 Minutes story can be traced to the following. No, they didn’t give you this info, but I found it out of curiosity.

registered person: Vilko Damianov
address: 4000, Bulgaria, Plovdiv, 2 Lyuben Karavelov, unit 5.

☆ Don’t be an unwitting pawn ☆

I just found this related information on “Hacking the Vote”.

_____________________________________________________

Russia – Trump – Clinton – Saga

US flag WhitehouseThe Russia Investigation will eventually run its course, but despite the motivations of it, we should be willing to understand these 2016 election facts.

Hillary, in spite of her ‘fait accompli’, experience, or the many allegations, lost an important national campaign for president against a historically unpopular, politically inexperienced, misogynistic, boastful, inconsiderate, rude, willfully ignorant, and compulsive liar.

Hillary Rodham Clinton Speaks At The University Of Miami

Hillary Clinton – explains it’s everyone’s fault but hers

It’s not the fault of the FBI, or the Russians, that made a difference, she still could have won. What she failed to do was visit Wisconsin, hardly paid attention to Michigan, and Pennsylvania. She lost by very narrow margins in those states.Whatever your perception of the embassy attack in Libya, the fact was the attack at Benghazi went on for hours, without any outside support. As a matter of fact, the support ready and willing to go was ordered to stand down. Even if Hillary Clinton as Secretary of State didn’t issue such orders, her response when asked about her lack of being in the loop, “What difference does it make”, coupled with earlier false assertions by her and others, it was motivated by a video critical of Muslims.

Then we saw her response to using private email servers in her home, for classified government communications, maintained by a private “uncertified” tech support company, as if that’s perfectly OK. It was another demonstration of, she will do what she wants, public interests be damned.

Even if you didn’t know or care these things mattered, to many voters it did. She even lost some support within her own party after it was revealed how her campaign undermined the Bernie Sanders primary campaign. It was seen by many as, she would do whatever she thought necessary, to win. That was another blow to her credibility / integrity.

It was a campaign on the slow drip of morphine, oblivious to the impact of the activities of the Clinton Foundation, which curried favor to individuals or organizations making large donations. It was another set of denials to make in the face of mounting evidence.

Donald Trump - running for President in 2016So, here we are, left with someone who knew how to self promote and is now routinely attacked in the media. It’s as if the national humiliation of the woman they all thought would be the next president, could be erased, or at least the person responsible for her defeat could be shown to be as big of a scoundrel as a large number of voters thought Hillary Clinton was, and even more incompetent.

 Official Government Report on the Benghazi Embassy 

The report says there were no undue delays in responding to the attacks, and they pointedly rejected unfounded allegations that the U.S. response was deliberately thwarted by a “stand down” order.

Quite the contrary: the safe evacuation of all U.S. government personnel from Benghazi twelve hours after the initial attack and subsequently to Ramstein Air Force Base was the result of exceptional U.S. government coordination and military response, the independent Accountability Review Board concluded in its Dec. 18, 2012, report.

Note by author: Like most government cover ups, those who continued to work for it, compromised their stories to preserve their jobs and reputations. The accusation of a stand down order wasn’t about the local CIA operatives, they responded quickly. Army Lt. Col. S.E. Gibson located in Tripoli said; “I was not ordered to stand down. I was ordered to remain in place,” Gibson told the House Armed Services Committee. ” The Tripoli team arrived in Benghazi in about an hour, but it was delayed at the airport “for at least three hours,” according to the Senate homeland security committee report. They later concluded the delay was caused by operation confusion, “miscalculation”, not a deliberate effort to thwart the rescue. It wasn’t necessary to have additional boots on the ground immediately. The GRS force in defense of the compound was standing by to laser guide any support aircraft which could have been there in approximately 1 hour.

“General Ham was head of AFRICOM and Commander of the 2011 US-NATO operation to depose Gadhafi in Libya. Rear Admiral Charles M. Gaouette was in command of the Carrier Strike Group Three (CSG-3), then deployed in Middle Eastern waters during the attack on Benghazi.” 

“Both Ham and Rear Admiral Gaouette reported receiving the same desperate cables for additional security and backup that Obama administration officials received and ignored from Benghazi.”

“General Ham and Gaouette attempted to launch ready response teams in the region capable of provided the much needed assistance during the seven hour long assault on Benghazi. Both were then relieved of command for their actions, described by the US Military as “allegations of inappropriate leadership judgment.”

“General Ham immediately had a rapid response unit ready and communicated to the Pentagon that he had a unit ready to deploy to Benghazi. Then, General Ham received the order to stand down. His response was “screw it,” – he was going to help anyway.”

“Within minutes after issuing an order to deploy his ready response team, Ham’s second in command apprehended the General and told him that he was now relieved of his command. Ham knows who issued the order to STAND DOWN as well as the order to relieve him of his command at AFRICOM.”

“Gaouette readied vital intelligence and communications operations for an extraction effort to be launched by Ham.”

“Stars and Stripes reported October 18, 2012 that General Ham is being replaced by Gen. David Rodriguez. They also reported on October 27, 2012 that Adm. Gaouette is being replaced by Rear Adm. Troy M. Shoemaker. The Navy stated that it was “replacing the admiral in command of an aircraft carrier strike group in the Middle East, pending the outcome of an internal investigation into undisclosed allegations of inappropriate judgment.”

Notes from the Pentagon Investigation:

Q: But do you think, you know, if an F-15, if the military had allowed a jet to go fly over, that it might have prevented [the second attack]?
A: Yeah, and if we had gotten clearance from the Libyan military for an American plane to fly over Libyan airspace. The Libyans that I talked to and the Libyans and other Americans who were involved in the war have told me also that Libyan revolutionaries were very cognizant of the impact that American and NATO airpower had with respect to their victory. They are under no illusions that American and NATO airpower won that war for them. And so, in my personal opinion, a fast-mover flying over Benghazi at some point, you know, as soon as possible might very well have prevented some of the bad things that happened that night.

Benghazi_embassy_interior

Response to Hillary Clinton’s use of Personal Servers for State Department Email

Note by author: The use of private, personal servers for official government communications at a State Department level was one of the most glaring bad judgement calls made by Hillary Clinton. No matter what her motivations were, the fact that she wasn’t concerned about the ramifications, and to use language which attempted to portray this as something innocent, assumes great naivete of the electorate on how classified material is supposed to be handled. Many of us have served in a capacity, either in the military or for contractors which are required to handle communications in the strictest and most secure methods as required by government. The NSA has for many years posted guidelines for private companies on how to maintain security. With Clinton working as head of the State Department, she was required to uphold these regulations.

I’ve heard many excuses, or the explanation as described in the above link, “the State Department’s track record for its own email security isn’t exactly spotless”, “there’s no evidence these servers were hacked.” Perhaps that’s true, but the same couldn’t be said for the DNC, and many of it’s users were the same people communicating on the Clinton email servers.

At the Department of State, there is accountability for the security of email systems. If we learned that State’s email servers had been hacked or left needlessly vulnerable, there would be investigations and consequences. With Clinton’s off-the-books scheme, there are only questions.

“… there have been five separate security vulnerabilities identified with Outlook Web Access since ClintonEmail.com was registered in 2009. These security bugs include doozies like “a flaw that may lead to an unauthorized information disclosure” (2010) and “a remote attacker can gain access to arbitrary files.” (2014).

heartbleed security bug

Heartbleed was unknown but active during her tenure as Secretary of State

 _____________________________________________

Economics 101 – The Mess We’re In

Politicians have modified capitalism to suit their largest contributing supporters, thereby enhancing their future elections. This is often referred to as Crony Capitalism 1.

Here are some basics which people are either ill-informed, or refuse to understand because their beliefs override facts.

  • Poor people don’t employ other poor people.
  • People that possess money, or obtain credit, leverage their ideas and talent at great risk, often employ other people.
  • This can enhance the wealth of those business leaders who combine & leverage the labor and skills of others in creative ways.
  • Creditors and investors provide capital to the business, and benefit by the financial gain of the company.
  • Those whose primary object is to decide what’s fair in compensation, for the labor and skill of employees, do so by taking more from those who create and sustain that employment.
  • Eventually, the balance is tilted under government control, such that they and their closest friends & allies, receive the greatest benefits through confiscating the profits from the investors and the company.
  • They (politicians) redistribute profits to appease the employees, and describe that as fair. Creditors & investors withdraw their support.
  • Those who have placed themselves at the greatest risk and have used their imagination to begin or enhance the business, now find their financial rewards diminished.
  • These dwindling profits, and the lack of investors, push the owners into foreclosure and bankruptcy and they join the throng of those who have already staked out their claim for government assistance.
  • In the end, everyone’s standard of living has diminished except the politicians and their cronies.
  • The poor become more poor because business has been destroyed by those who gained their office through a promise of fairness.
  • Larger business, through the support of their friends in government, buy the distressed assets at reduced prices and become more wealthy.

__________________________________________________________

  1. Crony Capitalism An economy that is nominally free-market, but allows for preferential regulation and other favorable government intervention based on personal relationships. In such a system, the false appearance of “pure” capitalism is publicly maintained to preserve the exclusive influence of well-connected individuals.