“Yesterday’s ridiculous, albeit proactive, New York Times narrative about Russians hacking Burisma now makes sense. Today the Lawfare team (Mary McCord et al) within Adam Schiff’s impeachment crew sends additional files of evidence (pdf below) to be included in the impeachment articles constructed by HJC Chairman Jerry Nadler.
It is all coordinated. The “new evidence” relates to information turned over by Lev Parnas, an SDNY indicted former associate of Trump’s personal attorney Rudy Giuliani. The Lawfare purpose is to bolster their premise that President Trump was trying to force Ukraine President Volodymyr Zelensky to investigate Joe Biden’s corrupt activity around the Ukrainian company Burisma.
The Lawfare crew behind Schiff waited until the last minute to push the new “evidence” because they didn’t want republicans to deconstruct it during the impeachment evidence-gathering phase. Additionally, the Lawfare crew anticipates a Trump impeachment defense surrounding actual evidence of the Biden corruption, which makes the Trump request to Zelensky valid.
So the proactive democrat strategy was/is to use the New York Times presentation of Russia hacking Burisma to negate the provenance of the evidence against the Bidens. In essence, to cast doubt upon any documents that would show Joe and Hunter Biden participating in an actual influence and money-laundering scheme.
The SDNY created legal leverage upon Lev Parnas using the familiar strategy of charging “FARA violations”, as noted in the background of the House explanation.
The purpose was/is to extract anything from Parnas that could be twisted or construed to show evidence that Rudy Giuliani was working on behalf of President Trump to pressure Ukraine into investigating Burisma, Joe Biden and Hunter Biden.
To counter any evidence that would highlight the truth that Hunter and Joe Biden were indeed participating in a pay-to-play influence and money laundering scheme for personal financial benefit, the same democrat operatives created a 2020 Russian ‘hacking claim’ using former Crowdstrike employee Blake Darché and his colleague Oren Falkowitz.
NYT – […] The hackers fooled some of them into handing over their login credentials, and managed to get inside one of Burisma’s servers, Area 1 said.
“The attacks were successful,” said Oren Falkowitz, a co-founder of Area 1, who previously served at the National Security Agency. Mr. Falkowitz’s firm maintains a network of sensors on web servers around the globe — many known to be used by state-sponsored hackers — which gives the firm a front-row seat to phishing attacks, and allows them to block attacks on their customers. (link)
Blake Darche’ and Oren Falkowitz formed a new cyber-security company named “Area-1 Security”. It is an analysis from this group that the New York Times uses to push the Russian hacking of Burisma narrative. It’s all the same players, just switching around the subject.
- The 2016 Lawfare group is now 2020’s Just Security;
- the 2016 CrowdStrike group is now 2020’s Area-1 Security;
- and the 2016 Russia DNC hack is now the 2020 Russia Burisma hack…
It’s the same players, the same story, the same approach.
Go deep on Oleg Falkowitz and Oren Falkowitz HERE
In February 2008, Oleg Falkowitz was hired as the Iran Mission Manager and Special Assistant For Policy and Cybersecurity at the Office of the Director of National Intelligence.
In February 2009, Oleg Falkowitz left his position at the Office of the Director of National Intelligence.
In August 2010, Oleg Falkowitz was hired as Director of Technology and Data Science Program (J2 — Intelligence) at the United States Cyber Command.
In July 2012, Oleg Falkowitz left his position at both the United States Cyber Command and the National Security Agency.
In January 2013, Falkowitz left his position at sqrrl.
Blake Darché published the article “Once a Target, Always a Target” in Medium, which was about “Cozy Bear”.
Between July 17–19, 2017, Oren Falkowitz, John Brennan, Andrea Mitchell and David Sanger attended the Fortune Brainstorm Tech Conference in Aspen, CO.