« Hanger Steak (onglet) tonight | Main | Does anyone care? I do. »

19 October 2020


Feed You can follow this conversation by subscribing to the comment feed for this post.


Beyond the corruption angle, there are some hints that there may also be elements of sexual misconduct/child pornography involved, as the agent involved in subpoenaing the laptop content is a specialist in those fields.

So, not only bribery, blackmail, and inappropriate use of national power in foreign nations, but also potential crimes involving children/underage adolescents - extremely useful to blackmailers interested in influencing policies and extracting intelligence - might also be in play. Getting closer to Epstein territory.

So it is small wonder that The Twitter/Facebook Cone of Silence has been invoked.


Whoops, forgot the link...



Noooooooooooo!!!! (She wails from the innocent heartland). Tell me it ain't so, Joe. I know this, I have heard this, but I still do not want to believe it.


It's why Comey didn't actually shut the case into Hillary's private email server either. He (and by extension others) could reopen it at any time for leverage when Hillary became president--so they thought. That's why he was able to reopen the case at the 11th hour of the election.

Nor is it the first time the FBI tried to take down a president. Mark Felt revealed himself as "Deep Throat," the source to the Washington Post story that led to Nixon's demise as president. Felt was bitter and vindictive after having been passed over for the top job at the FBI.

Peter VE

Since you keep asking these inconvenient questions, I hope your car has a remote starter.


Peter VE

"Would you rather have died with Stonewall at Chancellorsville or live with Johnny Carson in Burbank? Is it better to be a dead lion than a live dog?" "Lancelot" by Walker Percy


Is it possible to construct a narrative that comports with all known facts wherein:
- the laptop was acquired (or accessed) by an intel operation,
- its HD was removed & contents copied,
- experts then crafted new (or modified the original) files, emails & imagery,
- which were then melded into the copied original data,
- to be fed back onto the original HD,
- that original HD reinstalled into the laptop,
- to be dropped off at the repair shop.

This would maintain the chain of production provenance between the laptop & its HD (traceable evidence) while enabling the file structure to appear coherent in time & physical locations on the HD’s data sectors. The whole thing strikes me as a high-tech take on the Zimmerman Telegram ... an info-op disseminating false information via the media.

The weakness of this outline (& the whole story in general) is, “what kind of pro intel agency would constantly depend upon Rudy for credibility?” He’s a mess, tainted by his own behavior. The strength of it is that it takes a lot of HW/SW forensics to validate truth about a HD, its contents & its tortured path.

The article that got me thinking about the technical feasibility of such an operation;




Yes. You can construct any sort of narrative that you like. You are grasping at straws.

Patrick Armstrong

ked. The laptop could easily have been positioned by a couple of well-trained flying pigs.


There’s a great deal of narrative construction & straw-grasping going on. Internal consistency does not make a particular selection of facts into truth. External & extensive confirmation has a role when the case at hand is so contentious. In this case the electorate is not moved. A very small portion is animated... a straw sideshow.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.


Post a comment

Comments are moderated, and will not appear until the author has approved them.

Your Information

(Name and email address are required. Email address will not be displayed with the comment.)

My Photo

February 2021

Sun Mon Tue Wed Thu Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
Blog powered by Typepad