Following are the passages that I consider to be the chief and most important allegations that are in the opening 11% (that’s up through page 49 of the of the 448-page document) of the “Report On The Investigation Into Russian Interference In The 2016 Presidential Election”. That’s Robert Mueller’s March 2019 report, which had been commissioned by the U.S. Congress to find grounds to charge U.S. President Donald Trump with being an agent of the Russian Government and to replace him with Vice President Mike Pence for that reason.
Report On The Investigation Into Russian Interference In The 2016 Presidential Election
The Internet Research Agency (IRA) carried out the earliest Russian interference operations identified by the investigation — a social media campaign designed to provoke and amplify political and social discord in the United States. The IRA was based in St. Petersburg, Russia, and received funding from Russian oligarch Yevgeniy Prigozhin and companies he controlled. Prighozhin is widely reported to have ties to Russian President Vladimir Putin. …
The IRA later used social media accounts and interest groups to sow discord in the U.S. political system through what it termed “information warfare.” The campaign evolved from a generalized program designed in 2014 and 2015 to undermine the U.S. electoral system, to a targeted operation that by early 2016 favored candidate Trump and disparaged candidate Clinton.
The IRA’ s operation also included the purchase of political advertisements on social media in the names of U.S. persons and entities, as well as the staging of political rallies inside the United States. To organize those rallies, IRA employees posed as U.S. grassroots entities and persons and made contact with Trump supporters and Trump Campaign officials in the United States. The investigation did not identify evidence that any U.S. persons conspired or coordinated with the IRA. …
At the same time that the IRA operation began to focus on supporting candidate Trump in early 2016, the Russian government employed a second form of interference: cyber intrusions (hacking) and releases of hacked materials damaging to the Clinton Campaign. The Russian intelligence service known as the Main Intelligence Directorate of the General Staff of the Russian Army (GRU) carried out these operations.
In March 2016, the GRU began hacking the email accounts of Clinton Campaign volunteers and employees, including campaign chairman John Podesta. In April 2016, the GRU hacked into the computer networks of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC). The GRU stole hundreds of thousands of documents from the compromised email accounts and networks. Around the time that the DNC announced in mid-June 2016 the Russian government’s role in hacking its network, the GRU began disseminating stolen materials through the fictitious online personas “DCLeaks” and “Guccifer 2.0.” The GRU later released additional materials through the organization WikiLeaks. …
While the investigation identified numerous links between individuals with ties to the Russian government and individuals associated with the Trump Campaign, the evidence was not sufficient to support criminal charges. Among other things, the evidence was not sufficient to charge any Campaign official as an unregistered agent of the Russian government or other Russian principal. And our evidence about the June 9, 2016 meeting and WikiLeaks’s releases of hacked materials was not sufficient to charge a criminal campaign-finance violation. Further, the evidence was not sufficient to charge that any member of the Trump Campaign conspired with representatives of the Russian government to interfere in the 2016 election. …
The Office investigated several other events that have been publicly reported to involve potential Russia-related contacts. For example, the investigation established that interactions between Russian Ambassador Kislyak and Trump Campaign officials both at the candidate’s April 2016 foreign policy speech in Washington, D.C., and during the week of the Republican National Convention were brief, public, and non-substantive. And the investigation did not establish that one Campaign official’s efforts to dilute a portion of the Republican Party platform on providing assistance to Ukraine were undertaken at the behest of candidate Trump or Russia. The investigation also did not establish that a meeting between Kislyak and Sessions in September 2016 at Sessions’s Senate office included any more than a passing mention of the presidential campaign. …
Throughout 2016, IRA accounts published an increasing number of materials supporting the Trump Campaign and opposing the Clinton Campaign. For example, on May 31, 2016, the operational account “Matt Skiber” began to privately message dozens of pro-Trump Facebook groups asking them to help plan a “pro-Trump rally near Trump Tower.”55
To reach larger U.S. audiences, the IRA purchased advertisements from Facebook that promoted the IRA groups on the newsfeeds of U.S. audience members. According to Facebook, the IRA purchased over 3,500 advertisements, and the expenditures totaled approximately $100,000.56
During the U.S. presidential campaign, many IRA-purchased advertisements explicitly supported or opposed a presidential candidate or promoted U.S. rallies organized by the IRA (discussed below). As early as March 2016, the IRA purchased advertisements that overtly opposed the Clinton Campaign. For example, on March 18, 2016, the IRA purchased an advertisement depicting candidate Clinton and a caption that read in part, “If one day God lets this liar enter the White House as a president – that day would be a real national tragedy.”57
Similarly, on April 6, 2016, the IRA purchased advertisements for its account “Black Matters” calling for a “flashmob” of U.S. persons to “take a photo with #HillaryClintonForPrison2016 or #nohillary2016.”58 IRA-purchased advertisements featuring Clinton were, with very few exceptions, negative.59
IRA-purchased advertisements referencing candidate Trump largely supported his campaign. The first known IRA advertisement explicitly endorsing the Trump Campaign was purchased on April 19, 2016. The IRA bought an advertisement for its Instagram account “Tea Party News” asking U.S. persons to help them “make a patriotic team of young Trump supporters” by uploading photos with the hashtag “#KIDS4TRUMP.”60 In subsequent months, the IRA purchased dozens of advertisements supporting the Trump Campaign, predominantly through the Facebook groups “Being Patriotic,” “Stop All Invaders,” and “Secured Borders.” …
The IRA operated individualized Twitter accounts similar to the operation of its Facebook accounts, by continuously posting original content to the accounts while also communicating with U.S. Twitter users directly (through public tweeting or Twitter’s private messaging).
The IRA used many of these accounts to attempt to influence U.S. audiences on the election. Individualized accounts used to influence the U.S. presidential election included @TEN_ GOP ( described above); @jenn _ abrams ( claiming to be a Virginian Trump supporter with 70,000 followers); @Pamela_Moore13 (claiming to be a Texan Trump supporter with 70,000 followers); and @America:__Ist_ (an anti-immigration persona with 24,000 followers).67 In May 2016, the IRA created the Twitter account @march_for_trump, which promoted IRA-organized rallies in support of the Trump Campaign (described below).68 …
The IRA organized and promoted political rallies inside the United States while posing as U.S. grassroots activists. First, the IRA used one of its preexisting social media personas (Facebook groups and Twitter accounts, for example) to announce and promote the event. The IRA then sent a large number of direct messages to followers of its social media account asking them to attend the event. From those who responded with interest in attending, the IRA then sought a U.S. person to serve as the event’s coordinator. In most cases, the IRA account operator would tell the U.S. person that they personally could not attend the event due to some preexisting conflict or because they were somewhere else in the United States.82 The IRA then further promoted the event by contacting U.S. media about the event and directing them to speak with the coordinator.83
After the event, the IRA posted videos and photographs of the event to the IRA’s social media accounts. 84
The Office identified dozens of U.S. rallies organized by the IRA. The earliest evidence of a rally was a “confederate rally” in November 2015. 85 The IRA continued to organize rallies even after the 2016 U.S. presidential election. The attendance at rallies varied. Some rallies appear to have drawn few (if any) participants while others drew hundreds. …
From June 2016 until the end of the presidential campaign, almost all of the U.S. rallies organized by the IRA focused on the U.S. election, often promoting the Trump Campaign and opposing the Clinton Campaign. Pro-Trump rallies included three in New York; a series of pro-Trump rallies in Florida in August 2016; and a series of pro-Trump rallies in October 2016 in Pennsylvania. The Florida rallies drew the attention of the Trump Campaign, which posted about the Miami rally on candidate Trump’s Facebook account (as discussed below).86 …
Starting in June 2016, the IRA contacted different U.S. persons affiliated with the Trump Campaign in an effort to coordinate pro-Trump IRA-organized rallies inside the United States. In all cases, the IRA contacted the Campaign while claiming to be U.S. political activists working on behalf of a conservative grassroots organization. The IRA’s contacts included requests for signs and other materials to use at rallies, 107 as well as requests to promote the rallies and help coordinate Iogistics.108 While certain campaign volunteers agreed to provide the requested support (for example, agreeing to set aside a number of signs), the investigation has not identified evidence that any Trump Campaign official understood the requests were coming from foreign nationals. …
III. RUSSIAN HACKING AND DUMPING OPERATIONS
Beginning in March 2016, units of the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU) hacked the computers and email accounts of organizations, employees, and volunteers supporting the Clinton Campaign, including the email account of campaign chairman John Podesta. Starting in April 2016, the GRU hacked into the computer networks of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC). The GRU targeted hundreds of email accounts used by Clinton Campaign employees, advisors, and volunteers. In total, the GRU stole hundreds of thousands of documents from the compromised email accounts and networks. 109 The GRU later released stolen Clinton Campaign and DNC documents through online personas, “DCLeaks” and “Guccifer 2.0,” and later through the organization WikiLeaks. The release of the documents was designed and timed to interfere with the 2016 U.S. presidential election and undermine the Clinton Campaign. …
By no later than April 12, 2016, the GRU had gained access to the DCCC computer network using the credentials stolen from a DCCC employee who had been successfully spearphished the week before. Over the ensuing weeks, the GRU traversed the network, identifying different computers connected to the DCCC network. By stealing network access credentials along the way (including those of IT administrators with unrestricted access to the system), the GRU compromised approximately 29 different computers on the DCCC network. 119
Approximately six days after first hacking into the DCCC network, on April 18, 2016, GRU officers gained access to the DNC network via a virtual private network (VPN) connection120 between the DCCC and DNC networks.121 Between April 18, 2016 and June 8, 2016, Unit 26165 compromised more than 30 computers on the DNC network, including the DNC mail server and shared file server.122
b. Implantation of Ma/ware on DCCC and DNC Networks
Unit 26165 implanted on the DCCC and DNC networks two types of customized malware, 123 known as “X-Agent” and “X-Tunnel”; Mimikatz, a credential-harvesting tool; and rar.exe, a tool used in these intrusions to compile and compress materials for exfiltration. X-Agent was a multi-function hacking tool that allowed Unit 26165 to log keystrokes, take screenshots, and gather other data about the infected computers (e.g., file directories, operating systems).124 XTunnel was a hacking tool that created an encrypted connection between the victim DCCC/DNC computers and GRU-controlled computers outside the DCCC and DNC networks that was capable of large-scale data transfers. 125 GRU officers then used X-Tunnel to exfiltrate stolen data from the victim computers. …
c. Theft of Documents from DNC and DCCC Networks
Officers from Unit 26165 stole thousands of documents from the DCCC and DNCnetworks, including significant amounts of data pertaining to the 2016 U.S. federal elections.
Stolen documents included internal strategy documents, fundraising data, opposition research, and emails from the work inboxes of DNC employees.
The GRU began stealing DCCC data shortly after it gained access to the network. On April 14, 2016 (approximately three days after the initial intrusion) GRU officers downloaded rar.exe onto the DCCC’s document server. The following day, the GRU searched one compromised DCCC computer for files containing search terms that included “Hillary,” “DNC,” “Cruz,” and “Trump.”131 On April 25, 2016, the GRU collected and compressed PDF and Microsoft documents from folders on the DCCC’s shared file server that pertained to the 2016 election.132 The GRU appears to have compressed and exfiltrated over 70 gigabytes of data from this file server.133
The GRU also stole documents from the DNC network shortly after gaining access. On April 22, 2016, the GRU copied files from the DNC network to GRU-controlled computers. Stolen documents included the DNC’ s opposition research into candidate Trump.134 Between approximately May 25, 2016 and June 1, 2016, GRU officers accessed the DNC’s mail server from a GRU-controlled computer leased inside the United States.135 During these connections, Unit 26165 officers appear to have stolen thousands of emails and attachments, which were later released by WikiLeaks in July 2016.136
B. Dissemination of the Hacked Materials
The GRU began planning the releases at least as early as April 19, 2016, when Unit 26165 registered the domain dcleaks.com through a service that anonymized the registrant.137 Unit 26165 paid for the registration using a pool of bitcoin that it had mined. 138 The dcleaks.com landing page pointed to different tranches of stolen documents, arranged by victim or subject matter. Other dcleaks.com pages contained indexes of the stolen emails that were being released (bearing the sender, recipient, and date of the email). To control access and the timing of releases, pages were sometimes password-protected for a period of time and later made unrestricted to the public.
Starting in June 2016, the GRU posted stolen documents onto the website dcleaks.com, including documents stolen from a number of individuals associated with the Clinton Campaign.
These documents appeared to have originated from personal email accounts (in particular, Google and Microsoft accounts), rather than the DNC and DCCC computer networks. DCLeaks victims included an advisor to the Clinton Campaign, a former DNC employee and Clinton Campaign employee, and four other campaign volunteers. 139 The GRU released through dcleaks.com thousands of documents, including personal identifying and financial information, internal correspondence related to the Clinton Campaign and prior political jobs, and fundraising files and information.140 …
2. Guccifer 2.0
On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents. In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as “Fancy Bear”) were responsible for the breach. 145 Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including “some hundred sheets,” “illuminati,” and “worldwide known.” Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day. 146 …
3. Use of WikiLeaks
In order to expand its interference in the 20 I 6 U.S. presidential election, the GRU units transferred many of the documents they stole from the DNC and the chairman of the Clinton Campaign to WikiLeaks. GRU officers used both the DCLeaks and Guccifer 2.0 personas to
communicate with WikiLeaks through Twitter private messaging and through encrypted channels, including possibly through WikiLeaks’s private communication system. …
c. The GRU’s Transfer of Stolen Materials to WikiLeaks
Both the GRU and WikiLeaks sought to hide their communications, which has limited the Office’s ability to collect all of the communications between them. Thus, although it is clear that the stolen DNC and Podesta documents were transferred from the GRU to WikiLeaks, [REDACTED] …
An analysis of the metadata collected from the WikiLeaks site revealed that the stolen Podesta emails show a creation date of September 19, 2016.171 Based on information about Assange’s computer and its possible operating system, this date may be when the GRU staged the stolen Podesta emails for transfer to WikiLeaks (as the GRU had previously done in July 2016 for the DNC emails). 172 The WikiLeaks site also released PDFs and other documents taken from Podesta that were attachments to emails in his account; these documents had a creation date of October 2, 2016, which appears to be the date the attachments were separately staged by WikiLeaks on its site. 173
Beginning on September 20, 2016, WikiLeaks and DCLeaks resumed communications in a brief exchange. On September 22, 2016, a DCLeaks email account email@example.com sent an email to a WikiLeaks account with the subject “Submission” and the message “Hi from DCLeaks.” The email contained a PGP-encrypted with the filename “wiki_mail.txt.gpg.” 174 …
d. WikiLeaks Statements Dissembling About the Source of Stolen Materials
As reports attributing the DNC and DCCC hacks to the Russian government emerged, WikiLeaks and Assange made several public statements apparently designed to obscure the source of the materials that WikiLeaks was releasing. The file-transfer evidence described above and other information uncovered during the investigation discredit WikiLeaks’s claims about the source of material that it posted.
Beginning in the summer of 2016, Assange and WikiLeaks made a number of statements about Seth Rich, a former DNC staff member who was killed in July 2016. The statements about Rich implied falsely that he had been the source of the stolen DNC emails. On August 9, 2016, the @WikiLeaks Twitter account posted: “ANNOUNCE: WikiLeaks has decided to issue a US$20k reward for information leading to conviction for the murder ofDNC staffer Seth Rich.” 180
Likewise, on August 25, 2016, Assange was asked in an interview, “Why are you so interested in Seth Rich’s killer?” and responded, “We’re very interested in anything that might be a threat to alleged Wikileaks sources.” The interviewer responded to Assange’s statement by commenting, “I know you don’t want to reveal your source, but it certainly sounds like you’re suggesting a man who leaked information to WikiLeaks was then murdered.” Assange replied, “If there’s someone who’s potentially connected to our publication, and that person has been murdered in suspicious circumstances, it doesn’t necessarily mean that the two are connected. But it is a very serious matter … that type of allegation is very serious, as it’s taken very seriously by us.”181
After the U.S. intelligence community publicly announced its assessment that Russia was behind the hacking operation, Assange continued to deny that the Clinton materials released by WikiLeaks had come from Russian hacking. According to media reports, Assange told a U.S. congressman that the DNC hack was an “inside job,” and purported to have “physical proof” that Russians did not give materials to Assange. 182
Those are highlights from the opening 11% of the report, which is up through page 49 in the 448-page document. These are a prosecutor’s allegations; they are not necessarily true. Robert Mueller has a lengthy history of publicly alleging things that subsequently have come to be widely recognized to have been false. Furthermore, there are very serious reasons to doubt some of the most basic aspects of the Mueller report’s accounts of how information came to Wikileaks from Hillary Clinton’s and her campaign’s computers. Mueller even has been condemned by the FISA court for having violated the law and deceived that court. But these are his main allegations in Mueller’s ‘Russiagate’ report.
Ron Paul: Biden Administration accept that it has a “Zelensky problem”
“Last week the world stood on the very edge of a nuclear war, as Ukraine’s US-funded president, Vladimir Zelensky, urged NATO military action over a missile that landed on Polish soil.”
This is a comment from the prominent American political leader Ronald Ernest Paul was for many years the member of the U.S. House of Representatives from Texas. Three times he sought the Presidency of the United States: once as the Libertarian Party nominee and twice as a candidate for the Republican Party. He continues in his comment:
“But there was a problem. The missile was fired from Ukraine – likely an accident in the fog of war. Was it actually a Russian missile, of course, that might mean World War III.
‘While Zelensky has been treated as a saint by the US media, the Biden Administration, and both parties in Congress, something unprecedented happened this time: the Biden Administration pushed back. According to press reports, several Zelensky calls to Biden or senior Biden Staff went unanswered.
‘The Biden Administration went on to publicly dispute Zelensky’s continued insistence that Russia shot missiles into NATO-Member Poland. After two days of Washington opposition to his claims, Zelensky finally, sort of, backed down.
‘We’ve heard rumors of President Biden’s frustration over Zelensky’s endless begging and ingratitude for the 60 or so billion dollars doled out to him by the US government, but this is the clearest public example of the Biden Administration’s acceptance that it has a “Zelensky problem.”
‘Zelensky must have understood that Washington and Brussels knew it was not a Russian missile.
‘Considering the vast intelligence capabilities of the US in that war zone, it is likely the US government knew in real time that the missiles were not Russian. For Zelensky to claim otherwise seemed almost unhinged. And for what seems like the first time, Washington noticed.
‘As a result, there has been a minor – but hopefully growing – revolt among conservatives in Washington over this dangerous episode. Georgia Rep. Marjorie Taylor-Greene introduced legislation demanding an audit of the tens of billions of dollars shipped to Ukraine – with perhaps $50 billion more in the pipeline.
‘When the Ukraine war hysteria finally dies down – as the Covid hysteria died down before it – it will become obvious to vastly more Americans what an absolute fiasco this whole thing has been,” writes Ron Paul.
The G20 is dead. Long live the G20
The seventeenth G20 Heads of State and Government Summit held in Bali, Indonesia, on 15–16 November stands out as a consequential event from many angles. The international politics is at an inflection point and the transition will not leave unaffected any of the institutions inherited from the past that is drifting away forever.
However, the G20 can be an exception in bridging time past with time present and time future. The tidings from Bali leave a sense of mixed feelings of hope and despair. The G20 was conceived against the backdrop of the financial crisis in 2007 — quintessentially, a western attempt to burnish the jaded G7 by bringing on board the emerging powers that stood outside it looking in, especially China, and thereby inject contemporaneity into global discourses.
The leitmotif was harmony. How far the Bali summit lived up to that expectation is the moot point today. Regrettably, the G7 selectively dragged extraneous issues into the deliberations and its alter ego, North Atlantic Treaty Organisation (NATO), made its maiden appearance in the Asia-Pacific. Arguably, the latter must be counted as a fateful happening during the Bali summit.
What happened is a negation of the spirit of the G20. If the G7 refuses to discard its bloc mentality, the cohesion of the G20 gets affected. The G7-NATO joint statement could have been issued from Brussels or Washington or London. Why Bali?
The Chinese President Xi Jinping was spot on saying in a written speech at the APEC CEO Summit in Bangkok on November 17 that “The Asia-Pacific is no one’s backyard and should not become an arena for big power contest. No attempt to wage a new cold war will ever be allowed by the people or by the times.”
Xi warned that “Both geopolitical tensions and the evolving economic dynamics have exerted a negative impact on the development environment and cooperation structure of the Asia-Pacific.” Xi said the Asia-Pacific region was once a ground for big power rivalry, had suffered conflicts and war. “History tells us that bloc confrontation cannot solve any problem and that bias will only lead to disaster.”
The golden rule that security issues do not fall within the purview of G20 has been broken. At the G20 summit, the western countries held the rest of the participants at the Bali summit to ransom: ‘Our way or no way’. Unless the intransigent West was appeased on Ukraine issue, there could be no Bali declaration, so, Russia relented. The sordid drama showed that the DNA of the western world hasn’t changed. Bullying remains its distinguishing trait.
But, ironically, at the end of the day, what stood out was that the Bali Declaration failed to denounce Russia on the Ukraine issue. Countries such as Saudi Arabia and Turkey give reason for hope that G20 can regenerate itself. These countries were never western colonies. They are dedicated to multipolarity, which will ultimately compel the West to concede that unilateralism and hegemony is unsustainable.
This inflection point gave much verve to the meeting between the US President Joe Biden and the Chinese President Xi Jinping at Bali. Washington requested for such a meeting on the sidelines of the G20 summit, and Beijing consented. One striking thing about the meeting has been that Xi was appearing on the world stage after a hugely successful Party Congress.
The resonance of his voice was unmistakable. Xi underscored that the US has lost the plot, when he told Biden: “A statesman should think about and know where to lead his country. He should also think about and know how to get along with other countries and the wider world.” (here and here)
The White House readouts hinted that Biden was inclined to be conciliatory. The US faces an uphill challenge to isolate China. As things stand, circumstances overall work to China’s advantage. (here , here and here)
The majority of countries have refused to take sides on Ukraine. China’s stance amply reflects it. Xi told Biden that China is ‘highly concerned’ about the current situation in Ukraine and support and look forward to a resumption of peace talks between Russia and China. That said, Xi also expressed the hope that the US, NATO and the EU ‘will conduct comprehensive dialogues’ with Russia.
The fault lines that appeared at Bali may take new forms by the time the G20 holds its 18th summit in India next year. There is reason to be cautiously optimistic. First and foremost, it is improbable that Europe will go along with the US strategy of weaponising sanctions against China. They cannot afford a decoupling from China, which is the world’s largest trading nation and the principal driver of growth for the world economy.
Second, much as the battle cries in Ukraine rallied Europe behind the US, a profound rethink is under way. Much agonising is going on about Europe’s commitment to strategic autonomy. The recent visit of German Chancellor Olaf Scholz to China pointed in that direction. It is inevitable that Europe will distance itself from the US’ cold war aspirations. This process is inexorable in a world where the US is not inclined to spend time, money or effort on its European allies.
The point is, in many ways, America’s capacity to provide effective global economic leadership has irreversibly diminished, having lost its pre-eminent status as the world’s largest economy by a wide margin. Besides, the US is no longer willing or capable of investing heavily in shouldering the burden of leadership. Simply put, it still has nothing on offer to match China’s Belt and Road Initiative. This should have had a chastening influence and prompted a change of mindset toward cooperative policy actions, but the American elite are stuck in the old groove.
Fundamentally, therefore, multilateralism has become much harder in the present-day world situation. Nonetheless, the G20 is the only game in town to bring together the G7 and the aspiring developing countries who stands to gain out of a democratised world order. The western alliance system is rooted in the past. The bloc mentality holds little appeal to the developing countries. The gravitation of Turkey, Saudi Arabia and Indonesia toward the BRICS conveys a powerful message that the western strategy in conceiving the G20 — to create a ring of subaltern states around the G7 — has outlived its utility.
The dissonance that was on display in Bali exposed that the US still clings to its entitlement and is willing to play the spoiler. India has a great opportunity to navigate the G20 in a new direction. But it requires profound shifts on India’s part too –away from its US-centric foreign policies, coupled with far-sightedness and a bold vision to forge a cooperative relationship with China, jettisoning past phobias and discarding self-serving narratives, and, indeed, at the very least, avoiding any further descent into beggar-thy-neighbour policies.
President Biden under fire
Republicans announced that they are launching an investigation that will focus on President Biden himself and any illicit or unethical financial ties he had to his son Hunter’s overseas dealings, writes “The Daily Mail”.
Now Joe Biden and his family are facing an onslaught of subpoenas from the House majority members, who say they know where the proverbial bodies are buried.
Rep. James Comer led the press conference, where he made clear that the president himself was the target of the House GOP’s probe. He is a ranking member of the House Oversight Committee, will have the power to issue legally-backed demands for documents, information and testimony once the 188th Congress begins on January 3.
The congressman laid out his plans to use that power to go after the Bidens for alleged wire fraud, tax evasion, money laundering, illegal foreign lobbying and defrauding the government.
The evidence Comer is currently combing through, and is seeking to claw via subpoena, could ultimately result in articles of impeachment for the president and prison for the First Son.
Comer is also asking the Treasury for copies of more than 150 suspicious activity reports (SARs) involving the Bidens, filed by banks under anti-financial crime laws, that could be key to tracing the flows of foreign funds to the family’s coffers.
Amid all the shocking messages involving Joe Biden, possibly the most important email of the 154,000 on Hunter’s abandoned laptop is the infamous ‘big guy’ email, suggesting that the president was secretly involved in, and set to profit from, an alleged Chinese influence operation.
In total Joe met with fifteen of Hunter’s business associates according to White House visitor logs and records from the First Son’s laptop.
Emails on Hunter’s abandoned laptop published by DailyMail.com show that Hunter and Joe paid each other’s bills, and Hunter’s business partner Eric Schwerin did Joe’s taxes and visited the then-VP at the White House at least 27 times.
Joe also hosted Hunter’s best friend, business partner and now convicted fraudster Devon Archer at the White House just days before Archer and Hunter were appointed to the Burisma board (Ukraine) in 2014.
Archer was entertained at the West Wing on April 16 2014 according to visitor logs. Joe traveled to Kiev five days later on April 21. The next day, Archer joined the Ukrainian gas company’s board. On April 28, British officials froze $23million in accounts belonging to Burisma owner Mykola Zlochevsky, accusing him of fraud. The following month Hunter also joined the gas firm’s board.
Soon we may see some ugly tricks of Biden’s Ukrainian friends revealed…
USA-KSA Energy War and Global Energy Crisis
The response of the USA to OPEC and its partner’s plan to reduce output by two million barrels per day...
Is a Marshall Plan for Ukraine possible?
Reflecting on Ukraine’s future beyond the current conflict, many politicians and experts speculate about the expediency of a new Marshall...
Why International Institutions Survive: An Afterword to the G20 Summit
We, of course, are extremely critical of the very idea of global institutions and the prospects for their survival amid the emergence of a qualitatively...
America Produces Biological Weapons; Does Russia? Does China?
On November 26th, Russia’s RT News bannered “US ‘military biological activities’ a threat to the world – Russia”, and reported...
The Taliban Finally Granted Permission to the Former President Karzai to leave Afghanistan
Based on the information, the former president of Afghanistan, Hamid Karzai, was permitted to leave the country. At a time,...
The Charisma and Chaos of Imran Khan
The chances of Imran Khan winning the elections of 2018 were quite murky. Despite his unparalleled fan base and populist...
Can ‘border guard’ diplomacy strengthen ties between Myanmar-Bangladesh?
The 8th Border Conference between Border Guard Bangladesh (BGB) and Myanmar Border Guard Police (BGP) has started. The conference, which...
Defense3 days ago
The Ukraine War is a sales-promotion campaign for Lockheed and other U.S. ‘Defense’ Contractors
East Asia4 days ago
Hollywood with Chinese Characteristics
Southeast Asia4 days ago
‘Mr. Trong Goes to Beijing’: General Secretary Trong’s Beijing Visit Affirms Vietnamese Balancing Act with China
Diplomacy4 days ago
Higher Education and Diplomacy: Essential Skills for Becoming a Diplomat
Finance4 days ago
Europe in panic: Six weeks left before the US rolls out ‘industrial subsidies’
Southeast Asia3 days ago
Sustain instability in Myanmar is censure to India’s Act East Policy: Time for Proactive measure
Tech News4 days ago
New world-class European supercomputer inaugurated in Italy
Middle East4 days ago
Further Setbacks over Fragile Iran Nuclear Negotiations Following Death of Mahsa Amini