« Hanger Steak (onglet) tonight | Main | Does anyone care? I do. »

19 October 2020


Feed You can follow this conversation by subscribing to the comment feed for this post.


Beyond the corruption angle, there are some hints that there may also be elements of sexual misconduct/child pornography involved, as the agent involved in subpoenaing the laptop content is a specialist in those fields.

So, not only bribery, blackmail, and inappropriate use of national power in foreign nations, but also potential crimes involving children/underage adolescents - extremely useful to blackmailers interested in influencing policies and extracting intelligence - might also be in play. Getting closer to Epstein territory.

So it is small wonder that The Twitter/Facebook Cone of Silence has been invoked.


Whoops, forgot the link...



Noooooooooooo!!!! (She wails from the innocent heartland). Tell me it ain't so, Joe. I know this, I have heard this, but I still do not want to believe it.


It's why Comey didn't actually shut the case into Hillary's private email server either. He (and by extension others) could reopen it at any time for leverage when Hillary became president--so they thought. That's why he was able to reopen the case at the 11th hour of the election.

Nor is it the first time the FBI tried to take down a president. Mark Felt revealed himself as "Deep Throat," the source to the Washington Post story that led to Nixon's demise as president. Felt was bitter and vindictive after having been passed over for the top job at the FBI.

Peter VE

Since you keep asking these inconvenient questions, I hope your car has a remote starter.


Peter VE

"Would you rather have died with Stonewall at Chancellorsville or live with Johnny Carson in Burbank? Is it better to be a dead lion than a live dog?" "Lancelot" by Walker Percy


Is it possible to construct a narrative that comports with all known facts wherein:
- the laptop was acquired (or accessed) by an intel operation,
- its HD was removed & contents copied,
- experts then crafted new (or modified the original) files, emails & imagery,
- which were then melded into the copied original data,
- to be fed back onto the original HD,
- that original HD reinstalled into the laptop,
- to be dropped off at the repair shop.

This would maintain the chain of production provenance between the laptop & its HD (traceable evidence) while enabling the file structure to appear coherent in time & physical locations on the HD’s data sectors. The whole thing strikes me as a high-tech take on the Zimmerman Telegram ... an info-op disseminating false information via the media.

The weakness of this outline (& the whole story in general) is, “what kind of pro intel agency would constantly depend upon Rudy for credibility?” He’s a mess, tainted by his own behavior. The strength of it is that it takes a lot of HW/SW forensics to validate truth about a HD, its contents & its tortured path.

The article that got me thinking about the technical feasibility of such an operation;




Yes. You can construct any sort of narrative that you like. You are grasping at straws.

Patrick Armstrong

ked. The laptop could easily have been positioned by a couple of well-trained flying pigs.


There’s a great deal of narrative construction & straw-grasping going on. Internal consistency does not make a particular selection of facts into truth. External & extensive confirmation has a role when the case at hand is so contentious. In this case the electorate is not moved. A very small portion is animated... a straw sideshow.

The comments to this entry are closed.

My Photo

February 2021

Sun Mon Tue Wed Thu Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
Blog powered by Typepad