Roger Stone is requesting proof that Russians hacked the DNC server, as was reported in the Mueller report. Stone claims if the Russians didn’t hack the DNC, his case should be dismissed.

As we’ve pointed out…. the entire fake Russia collusion narrative was based on the fairy tale that Russia hacked the DNC and then provided emails they stole to WikiLeaks. Roger Stone is out to prove that this narrative is a total fabrication.

We reported on May 11, 2019, that Roger Stone and his legal team requested the report from Crowdstrike, the firm connected with the Deep State who reportedly did inspect the DNC server after emails were released by WikiLeaks. This report was used by the FBI and the Mueller gang as support that the DNC was hacked by Russia.

Stone’s position is that if the Mueller team and the FBI did not inspect the DNC server, then how can they know that the server was hacked. This logical argument makes sense –

TRENDING: This Is America? Young Mother TASED, CUFFED AND ARRESTED for Not Wearing Face-Mask at Mostly Empty Stadium to Watch HS Football Game

The chain of custody of evidence is kind of a big deal. If the FBI didn't have custody of the server, and if they never examined it, they cannot verify what happened to the data on it. https://t.co/0PmN50YAmy — Praying Medic (@prayingmedic) May 10, 2019

The entire Russia collusion delusion is a sham. To date there has been no information reported that absolutely confirms that the DNC was hacked by the Russians. No reports to date show that the DNC server was inspected by the Mueller team and the FBI. Since this is the case, there is no way the Mueller team can claim the server was hacked.

Since there is no proof that the emails were hacked, the reports that Russians were involved in the collusion delusion evaporate. Qualified experts agree with this assertion.



After speaking w/ my @FBI sources & a @nytimes reporter with direct knowledge of the handling of the @DNC server it's true – there was no direct examination or physically custody of the DNC server – an "image" (i.e. copy) of the server was examined only: https://t.co/yDJKCYmUQC — Tony Shaffer (@T_S_P_O_O_K_Y) May 12, 2019

We reported two weeks ago that NSA Whistle blower Bill Binney looked at the DNC data leaked by WikiLeaks and determined that it was definitively not hacked, it was copied to a disk or flash drive.

NSA Whistleblower and longtime intelligence analyst Bill Binney on continuation of #RussiaGate fever: "The problem with the Mueller Report & the Rosenstein indictment is it's based on lies." FULL INTERVIEW: https://t.co/qiTOpvNd2q pic.twitter.com/tDSSSg0j0H — Status Coup (@StatusCoup) June 3, 2019

Then a few days ago we provided more arguments against Mueller’s assertion that the DNC was hacked by Russians.

Yaacov Apelbaum posted an incredible report earlier this year with information basically proving that the DNC was not hacked by the Russians.

One point by Apelbaum is:

… that three of the Russian GRU officers on the DOJ wanted list were allegedly working concurrently on multiple non-related projects like interfering with the 2016 United States elections (both HRC and DNC) while at the same time they were also allegedly hacking anti-doping agencies (Images 2-3).

The FBI says the three individuals below were working on both the DNC/HRC email hacking and the Olympic doping projects.

The same guys were working on both projects which is all but impossible. (Do we really know if they’re even Russians?)

Also, WikiLeaks has stated numerous times that Russia did not provide them with the emails they leaked in 2016 and Julian Assange has stated that WikiLeaks had nothing to do with Russia.

But of course the Mueller gang never interviewed WikiLeaks in an effort to determine how they received the Clinton emails. Of course the Mueller team could not risk WikiLeaks saying the emails were not received from Russia which would destroy their Russia hacked the DNC fairy tale.

Roger Stone continues to fight back! On Friday Stone filed two documents with the court!

In one document Stone points out that the government claims the Russians sent emails to WikiLeaks but the government agrees it cannot prove it and yet the government used this as the basis for obtaining all warrants related to the Mueller investigation and all actions related to the fake Russia collusion farce!

In his second reply with the court, Stone compels the government to obtain and provide to Stone the unredacted portions of the Crowdstrike report that the FBI and the Mueller gang used to create the Russia investigation and the Mueller investigation.

Today we have some more ammunition for Roger Stone –

To date we thought that the FBI’s whole case for how the Russians hacked the DNC/DCCC was supported by the CrowdStrike report and clearly it is. But what Deep State corrupt cops at the FBI and the Mueller gang hide in their reporting is that they evidently inspected other servers and laptops as well to build their case. Either that or they didn’t but they (again) lied to make it appear that they did.

One paragraph in the Mueller report states this –

In March 2016, the GRU [Russia] began hacking the email accounts of Clinton Campaign volunteers and employees…

Mueller states as fact that Russia hacked multiple employees and volunteers of the Democrat Party. If this did occur then the Mueller team and the FBI must have investigated these pc’s, laptops and servers, etc. to identify that Russia had indeed hacked them.

Where’s the support?

We know Donna Brazille’s computer was examined by the FBI, and we know Alexandra Chalupa’s computer and smart phone were examined by the FBI. Donna Brazille admitted it in her book, while Politico reported that Chalupa had her computer investigated.

However, it is highly unlikely that Chalupa’s computer was hacked. What she claimed is that she got a notification from Yahoo that someone tried to access her Yahoo email account (see below). She didn’t provide any proof that she was in fact hacked.

Also, as one expert has shared with us, if the GRU was out to get her email, they would not have done it on a Yahoo server, the easier and less protected target would have been her computer, router, mobile devices, etc. This is because Yahoo as well as all other online email providers like Gmail and MSN have a number of algorithms in place that check the login sequence and determine if its authentic. For example, they look at your device ID, IP Address, browser type, geographic zone,time of day, etc.

We realize that Stone is facing an uphill battle with the crooked Obama appointed judge overseeing his case (Amy Berman Jackson) but the facts are in his favor.

Mueller and his team must be held accountable. The more we dig, the more innocent Roger Stone gets.