Episode 6 on WAAM 1600 AM: Pepsi, Susan Rice, and Syria with Guest Carol Roth [podcast]

Posted on April 9th, 2017 by Tracy Connors


This week, Pepsi managed to pull off the impossible. Left and right have temporarily put aside their differences and are now united by outrage over this commercial:

Pepsi pulled the ad when the internet wouldn’t stop mocking its inane premise,

dissecting it,

and remixing it.

How much did Pepsi spend on this disasterpiece of an ad? According to experts (read: persons who can convincingly deliver budget figures they’ve pulled out of their asses to a writer at People)

“At least $2 million, but probably more like $5 million, including Kendall’s fee,” the official says, adding the the media buy would be “roughly $100 million for a campaign like this.” A longtime production coordinator notes: “Kendall was likely paid a one-time fee for the ad. I’d guess anywhere from $400,000-$1 million.”

Ooops. That’ll leave a mark.

Moving on.

Mike Cernovich, who just two weeks ago was the subject of a 60 Minutes segment on “fake news” that was nothing more than a naked attempt by CBS’s Scott Pelley to try to undermine Cernovich’s credibility by lumping him in with people who traffic in clickbait stories that have zero basis in reality. The segment backfired in spectacular fashion on Pelley who ended up looking like an easy mark for anyone looking to push a pro-Democrat narrative.

This week, Cernovich has once again triumphed over the lying media hoaxsters once again by publishing a bombshell report about Susan Rice. On Sunday night Cernovich broke the news that Rice is behind the unmasking of names of Trump transition team members. In a post on Medium Cernovich wrote:

Susan Rice, who served as the National Security Adviser under President Obama, has been identified as the official who requested unmasking of incoming Trump officials, Cernovich Media can exclusively report.

The White House Counsel’s office identified Rice as the person responsible for the unmasking after examining Rice’s document log requests. The reports Rice requested to see are kept under tightly-controlled conditions. Each person must log her name before being granted access to them.

Cernovich’s reporting was backed up (but not credited of course) the following day by Eli Lake at Bloomberg:

White House lawyers last month learned that the former national security adviser Susan Rice requested the identities of U.S. persons in raw intelligence reports on dozens of occasions that connect to the Donald Trump transition and campaign, according to U.S. officials familiar with the matter.

The pattern of Rice’s requests was discovered in a National Security Council review of the government’s policy on “unmasking” the identities of individuals in the U.S. who are not targets of electronic eavesdropping, but whose communications are collected incidentally. Normally those names are redacted from summaries of monitored conversations and appear in reports as something like “U.S. Person One.”

Come Tuesday, Susan Rice was back on television, doing what she does best lying and dissembling with a healthy assist from MSNBC’s Andrea Mitchell. Here’s the full interview:

The most interesting part of the discussion takes place beginning at the 3:15 mark. Transcript via Real Clear Politics (my supposition about Andrea’s inner monologue throughout in italics):

MITCHELL: Within that process, and within the context of the Trump campaign, the Trump transition, did you seek the names of people involved in — to unmask the names of people involved in the Trump transition, the Trump campaign, people surrounding the president-elect —

Excellent question Andrea, Susan will have no problem shutting this line of questioning down.

RICE: Let me begin —

Oops that was too open ended, must interrupt her with a question that will solicit a definitive NO!

MITCHELL: — in order to spy on them, in order to expose them.

That’s a nice big softball for you Susan, I’ll step back now and let you hit it out of the park.

RICE: Absolutely not for any political purposes, to spy, expose, anything. But let me —

Ugh, why didn’t she just say NO! absolutely not. Let’s try this one more time… 

MITCHELL: Did you leak the name of Mike Flynn?

RICE: I leaked nothing to nobody and never have and never would.

Excellent work Susan! That grammatically incorrect mess of a sentence will be the only soundbite from this interview that anyone remembers. Success!

And so it was. Susan Rice didn’t leak nothing to nobody, which is not an answer to the question: are you responsible for the unmasking of the names of Trump transition team members? became the soundbite of the week. Spin like this works perfectly in a cable news interview with a friendly anchor, but I have my doubts about its effectiveness when the venue is a Congressional hearing where the questioners are former prosecutors. Best of luck with that Susan, can’t wait to see how you fare!

Carol Roth joined us to talk about the current state of the economy and her work with Microsoft Office Small Business Academy helping entrepreneurs with tips and best practices to help them realize their goals. Carol also returns in our bonus segment to drop a few f-bombs and talk sports with Fingers.

Finally we come to the latest news out of Syria. According to Western news reports, President al-Assad used chemical weapons against his own people in a bombing raid on the town of Khan Sheikhoun. These claims are being disputed by Assad and the Russians who have been providing military support to the Assad regime.

Syrian military forces have been making slow but steady progress in their fight against the rebels, and President Trump and other administration officials including Secretary of State Tillerson and UN Ambassador Nikki Haley have been signalling that the US isn’t interested in regime change in Syria. So, from a common sense standpoint, the Assad regime has nothing to gain and everything to lose by using chemical weapons at juncture in time.

BONUS CONTENT

Carol Roth stuck around to swear and discuss the Oakland Raiders moving to Las Vegas, and the HBO series Big, Little, Lies.

That segment is almost as important as our brief discussion about the US missile strikes that hit a Syrian airbase on Thursday evening. The base that was hit by 59 Tomahawk missiles is the supposed origination point of the chemical weapons laced bombs that were dropped by Syrian military forces earlier in the week.

What happened to this Trump?

Has he already become a swamp creature who blindly believes intelligence reports about WMDs? I have to wonder if he’s ever seen this reporting from Seymour Hersh about the 2013 sarin attack that almost resulted in the US going to war. It contradicts the accepted narrative that Assad was behind those attacks and instead points the finger at the Turks.

There is no time to wait for an investigation to be done, because there are dead children! Have you no heart?!

And what’s this from the Pentagon?

Note the part about giving the Russians a heads up. If the Russians were forewarned, surely they let Assad know what was about to go down. What the hell is going on? Was this strike just a minor show of force, to show that Trump won’t bother drawing red lines, that he’ll take military action on his own without Congressional approval? Surely, there are better ways of making a point.

I’ll let Alex Jones play us out…

Tags: , , , , , , , , , , , , , , , , , , , ,

Episode 4 on WAAM 1600 AM: Wikileaks, House Intel Committee Hearing, and Wiretaps [podcast]

Posted on March 26th, 2017 by Tracy Connors

Wikileaks added more docs to their Vault 7 caché. This week’s addition “Dark Matter” contains some more interesting revelations about what the CIA has been up to:

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

They have the ability to plant their tech on your phone before you even take it out of the box. But we should totally believe that they would never exploit this in order to obtain information on whomever they so choose right? Right.

Keeping the new revelations in mind,  ‘member when Trump sent out this tweetstorm (a phrase a despise only slightly less than nothing burger)?

The media and democrats were of course aghast, how dare Trump accuse No Drama Obama of the Scandal-Free Administration of such treachery!

Many minds were lost. And too much time was devoted to discussions of the President’s tweets.

According to a report compiled by the Media Research Center three days after Trump’s tweetstorm (apologies):

Since Saturday, when Donald Trump first took to Twitter to accuse former President Obama of wiretapping Trump Tower, the morning and evening shows of ABC, CBS and NBC have devoted 107 minutes, 33 seconds to refuting the President’s claim.

This over dramatized story should have died down in the wake of the first Wikileaks Vault 7 release, which confirmed what many already knew; our intelligence agencies can access private information via just about any electronic device they want (except microwaves) and/or turn that device’s listening capability on remotely and secretly. Which roughly boils down to: they can spy on EVERYONE. Last I checked, EVERYONE includes Trumps and his campaign team. Should probably just keep those alternative facts to myself, because the left has a narrative to push and the life of that narrative matters most of all.

Which brings us to this week and the much anticipated House Intelligence Committee hearing about

The perpetually offended defenders of the Deified Obama, didn’t want to miss a chance to clear his holy name, so FBI Director Comey was asked to respond to Trump’s twitter allegations.

The FBI Director, whose credibility and motives we attacked mercilessly by Democrats during the 2016 campaign, just said Trump’s tweets are total bs. Comey is officially back in the good graces of the Democratic Party hallelujah! Let the celebrations begin!

Hold up, what’s this?

More on Rep Nune’s press conference from Bloomberg:

House Intelligence Chairman Devin Nunes said Wednesday that the U.S. intelligence community collected multiple conversations involving members of Donald Trump’s transition team after he won the election last year.

He said the intercepts he’s seen appear to be legal and weren’t targeted at the transition team or related to Russia. But he said he was troubled by the collection — which he said was part of unrelated foreign surveillance — and the fact that the intelligence community reported the names of transition team members internally.

“I’m actually alarmed by it,” Nunes, a California Republican, told reporters at the Capitol. “Details with little or no apparent foreign intelligence value were widely disseminated in an intelligence community report,” he said. He said he didn’t know if Trump’s “own communications were intercepted.”

Well that’s rather odd. Didn’t Comey say that Trump was full of it? Hmmm who to believe? A politician or an IC agency chief? I’m gonna go with neither.

For those who have been following the RUSSIA! RUSSIA! RUSSIA! story and were disappointed to learn nothing in the way of new information from Monday’s five hour long House Intelligence Committee hearing, here’s a BFD to add to the story that I picked up this week from people who actually are engaged in investigative reporting.

Are you ready for this? The FBI wasn’t ever granted accessed to the allegedly hacked DNC server.

Yes, you read that correctly, the FBI hasn’t performed its one forensic investigation of the DNC server, rather is has relied on an assessment provided to them by the DNC’s contracted cyber security firm CrowdStrike.

Lee Stranahan has been following the ‘Russia hacked the US elections!’ story doggedly since last summer, and this week he published several pieces that contain information no major media outlet has previously reported. This comes from a monster of a piece that was published at Breitbart (emphasis mine):

On January 10th, Comey testified before the Senate Intelligence Committee and made a stunning admission: despite “multiple requests at different levels,” the Democratic National Committee had denied the FBI’s requests to examine the servers themselves. Instead, the FBI took the word of Crowdstrike, who Comey called a “highly respected private company.”

The hyperlink Stranahan included in the above paragraph takes you to a Hill piece with the headline, Comey: DNC denied FBI’s requests for access to hacked servers which provides greater detail about the DNC’s refusal to grant the FBI access to their servers, and their subsequent lying about said refusal.

The DNC told BuzzFeed in a statement published last week that the FBI never requested access to its servers after they were breached.

But a senior law enforcement official disputed that characterization the following day.

“The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated,” the official said.

“This left the FBI no choice but to rely upon a third party for information. These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier.”

CrowdStrike, the private security firm in question, has published extensive forensic analysis backing up its assessment that the threat groups that infiltrated the DNC were associated with Russian intelligence.

Of course this piece of the story hasn’t gotten major play in the news cycle. Perhaps our media betters, and the FBI Director know something we the plebs don’t about the credibility of CrowdStrike’s report. Surely if the FBI is willing accept their findings they have a sterling record.

Stranahan demolishes CrowdStrike’s credibility in a piece he published on Medium. The story is rather convoluted and the constant references to hacker jargon can make it difficult for non-programmers like me to follow, but Stranahan’s piece and this one from Voice of America are worth slogging through. Stranahan’s piece gives a detailed timeline of the unraveling/debunking of a report CrowdStrike published in December of 2016.

The report lays out the supposed evidence that a Russian hacking group CrowdStrike has dubbed “Fancy Bear” (this is the same group CrowdStrike says is behind the DNC hack) then planted their signature malware “Agent X” (again this is the malware CrowdStrike says was used to hack the DNC server) in an update for an Android App on military forums used by Ukrainian military personnel.

Apparently the Ukrainian military personnel are so careless about OpSec, that they are willing to download updates to their Apps from rando internet forums. Sounds totally plausible. Once the Ukrainian military rubes installed the update onto their phone, Agent X went to work. The exploit allowed Fancy Bear access to the position data of Ukrainian D-30 howitzers, turning them into sitting ducks. According to CrowdStrike, this resulted in the loss of 80% of Ukraine’s D-30 howitzers.

There is one minor problem about CrowdStrike’s report (which is broken down in greater detail in the Voice of America piece previously referenced), the Ukrainian Defense Ministry says they haven’t lost 80% of their D-30 howitzers. Oops.

If you’re looking for a more detailed version of the CrowdStrike, Fancy Bear, Agent X, DNC and Ukrainian military “hacks” story, I highly recommend this piece by Justin Raimondo over at AntiWar.com.

Even though the Ukrainian military wasn’t hacked by Fancy Bear, they may be the reason Rep Adam Schiff seems so hell bent on pinning blame on the Russians. Or more accurately I should say, arming the Ukrainian military. Turns out one of Schiff’s big financial backers stands to gain big league if the US decides to strengthen its support of Ukraine in their on-going conflict with the Russians.

From Justin Raimondo at AntiWar:

Schiff is betraying his own rather specialized interests here: on July 18, 2013, a fundraiser for Schiff’s reelection campaign was held at the home of Ukrainian arms dealer Igor Pasternak in Washington, D.C. Price of admission: $2,500 a head, and $1,000 for guests. Why is Pasternak such a fan of Schiff’s?

The answer may be found in a Washington Times story published in January, headlined “Ukraine Desperate for Surveillance Equipment in Stand Off With Russia,” which details the efforts of the Ukrainian government to get around the Obama administration’s reluctance to provide them with the “defensive weapons” Schiff is so eager to shower them with

So Rep Schiff is chummy with Ukrainian arms dealers eh? Gee I wonder if Schiff’s correspondence with Igor is being surveilled…

Then finally we have dear old Donna Brazile. You know Donna, the Good Christian Woman who understands persecution. The woman who has never told a lie in her life.

Donna finally decided to come clean to Time and admit what we all already knew, she fed townhall debate questions to old Hildo’s campaign.

My job was to make all our Democratic candidates look good, and I worked closely with both campaigns to make that happen. But sending those emails was a mistake I will forever regret.

Took you long enough Donna.

Guess all is forgiven now, so she’ll just go back to getting paid to run her mouth on television and work on campaigns. Because justice.

That does it for this week’s news. We’ll be back next Sunday with an all new Enough Already Radio. All episodes will be posted to SoundCloud. You can also subscribe to the podcast on iTunes, Google Play, Stitcher and TuneIn, or follow us on facebook. Check the feed often, you never know when we’re going to drop an Enough Already Bite.

follow Fingers on twitter @FingersMalloy
follow Tracy on twitter @TracyLConnors

 

Tags: , , , , , , , , , , , , , , , , , , , , ,