Posts

Hunter Biden Gets a Step Closer to Vindicating Twitter’s Takedown Decision

Yesterday, as things moved closer to an expulsion vote for George Santos, activist “Anarchy Princess” taunted Santos staffer, Vish Burra, about whether he hacked Hunter Biden’s phone.

AP: Like the same way that you got into Hunter Biden’s stuff?

VB: [laughter]

AP: Yeah, didn’t you hack Hunter Biden’s shit, his phone or something?

VB: [turns to camera] Yeah, and I’d do it again.

Burra, who in 2020 was the producer of Steve Bannon’s podcast, has previously described “extracting” the contents of the “laptop” and took credit for hooking Bannon up with Emma-Jo Morris, who published the initial NY Post story.

Hunter Biden described Burra’s past claims in his lawsuit against Rudy Giuliani and Robert Costello for unlawfully accessing and manipulating his data.

As further evidence of Defendants’ illegal hacking of Plaintiff’s data, it recently has come to light that Defendant Giuliani apparently worked directly with Steve Bannon and Vish Burra to access, manipulate, and copy Plaintiff’s “laptop,” which Burra has dubbed the “Manhattan Project” because he and others “were essentially creating a nuclear political weapon,” referring to Burra’s work with Defendant Giuliani and others (Steve Bannon and Bernie Kerik) to manipulate the “laptop.”

But Burra has not, as far as I know, confessed to “hack[ing] Hunter Biden’s shit.”

Yesterday — whether in jest or not — he did.

Later that same day, Matt Taibbi and Michael Shellenberger had their semi-annual appearance before Jim Jordan’s Weaponizing Government committee.

At the hearing, Dan Goldman had this exchange with Shellenberger about the “Hunter Biden” “laptop:”

DG: You’ve talked about the Hunter Biden laptop, and how the FBI knew it existed. You are aware, of course, that the laptop, so to speak, was actually — that was published in the New York Post was actually a hard drive that the NY Post admitted — here! — was not authenticated as real. It was not the laptop the FBI had. You’re aware of that, right?

MS: It was the same contents.

DG: How do you know?

MS: Because it’s the same —

DG: You would have to authenticate it to know it was the same contents. You have no idea.

MS: [inaudible] conspiracy. Are you suggesting the NY Post participated in a conspiracy to construct the contents of the Hunter Biden laptop?

DG: No, sir, the problem is that hard drives can be manipulated by Rudy Giuliani or Russia.

MS: What’s the evidence that that happened?

DG: Well, there is actual evidence of it, but the point —

MS: There’s no evidence of it. You’re engaged in a conspiracy theory.

Miranda Devine (who keeps dog-whistling about Hunter Biden’s “expensive” lawyers) and the House GOP all seem to think this was a very clever exchange, as that’s the clip they all sent out to froth up the rubes.

Goldman is right: You’d need to authenticate the contents of the “laptop.” As I have shown, even the FBI had not checked whether anything was altered on the laptop they received while in John Paul Mac Isaac’s custody, ten months after receiving it. Their computer guy was still suggesting ways to do that on October 22, 2020, over a week after the NY Post story was published. At the time, Lesley Wolf — the villain of the Republican story — was in no rush to do so.

Understand, though: the critical question here is not whether the hard drive was authenticated. The question is whether it was hacked. Here’s how Vijaya Gadde described the decision to take down the original NY Post link in October 2020.

For example, on October 14th, 2020, the New York Post tweeted articles about Hunter Biden’s laptop with embedded images that look like they may have been obtained through hacking. In 2018, we had developed a policy intended to, to prevent Twitter from becoming a dumping ground for hacked materials. We applied this policy to the New York Post tweets and blocked links to the articles embedding those source materials. At no point did Twitter otherwise prevent tweeting, reporting, discussing or describing the contents of Mr. Biden’s laptop.

If the data in NY Post’s hands was hacked, then according to Twitter’s terms of service, links to it should have been taken down.

If the data in NY Post’s hands was hacked, then the takedown that Republicans claim was a violation of their speech was, in fact, adherence to Twitter’s terms of service as they existed at the time.

And Hunter Biden’s lawsuit alleges that Rudy Giuliani and Robert Costello unlawfully accessed — hacked — his data.

And yesterday, Burra — the guy who set up the tie between Bannon and the NY Post in the first place — laughingly agreed that he did hack Hunter Biden’s shit.

Now, Michael Shellenberger says there’s no evidence the data on the hard drive was altered by Burra and others. Miranda Devine says you have to take the word of the Bidens to believe that happened.

They said that the same day Burra laughingly said he would hack Hunter Biden again.

More importantly, you don’t have to go to the Bidens for evidence that the hard drive was altered. You can go to Garrett Ziegler, whom Hunter Biden has also accused of hacking his shit.

In the set of emails publicly released by Ziegler at BidenLaptopEmails dot com, there is an email from Hunter Biden’s Rosemont Seneca email account (hosted by Gmail), that was sent on September 1, 2020 ET (September 2 GMT).

It’s a resent version of an email sent in 2016 (DDOS says that a footer was also altered).

If everything John Paul Mac Isaac says is true, if everything Rudy Giuliani says is true, this “laptop” was in the custody of Rudy Giuliani (or Robert Costello, on Rudy’s behalf) on the date it was sent. Whoever resent this email — and it was sent over a year after Hunter left Burisma — it was added to the “laptop” while it was in Rudy’s custody.

I’ll leave it to the lawyers and the tech people to explain how an email set from an account hosted by Gmail was added to the hard drive from which Garrett Ziegler obtained his copy. I’ll leave it to the lawyers to argue about whether it would necessarily require unauthorized access to Hunter Biden’s Gmail or iCloud account for that email to be on the hard drive.

But it’s something that could not have been on the laptop when someone — allegedly Hunter Biden — dropped off a laptop at John Paul Mac Isaac’s shop on April 12, 2019. By all understandings of the dissemination of various hard drives — which Thomas Fine has illustrated this way — it would have been on what NY Post worked from on its October 14, 2020 story.

There’s no evidence, Michael Shellenberger said. You’re supposed to take the words of the Bidens, Miranda Devine said.

And on the same day they made those claims, Vish Burra said, of hacking Hunter Biden’s stuff, “Yeah, and I’d do it again.”

Matt Taibbi Declares John Podesta’s Risotto Recipe Was “True”

The Democrats on Jim Jordan’s insurrection protection committee were really unprepared for Matt Taibbi and Michael Shellenberger yesterday, failing to call out their repeated false claims.

One of the most interesting details came when Taibbi described that someone besides Elon Musk invited him to have unfettered access to a company under a consent decree. Given the likelihood that this person was not even a Twitter employee, it gives the FTC far more reason to want to know why a company under a consent decree made information on individual users available to journalists.

But the hearing was nevertheless useful for the way it revealed that Taibbi doesn’t know the difference between “authentic” and “true.” In an exchange with Stephen Lynch about whether Russia interfered in the 2016 election (in which Lynch falsely claimed that the intelligence report attributing the Russian campaign to Russia involved 18 intelligence agencies, instead of three, and mispronounced both Shellenberger’s and Yevgeniy Prigozhin’s name), Taibbi professed to be uncertain whether Russia conducted a hack-and-dump campaign.

Lynch: Do you believe that Russia engaged in a hack-and-release campaign damaging to the Clinton campaign, back in 2016?

Taibbi: I don’t know and I would say it’s irrelevant.

[snip]

Lynch: Mr. Shellenbech [sic] do you believe that the Russians engaged in a hack-and-release campaign with respect to the damaging information they released regarding the Clinton campaign?

Shellenberger: To the best of my awareness, that is what happened, yes.

Lynch: Okay, fair enough.

Shellenberger: That’s not the same thing as influence campaign.

Lynch: I understand.

Taibbi: Also that material was true. That is not a legitimate predicate for censorship.

Taibbi obviously thought he was being very clever, justifying publishing material stolen from an American because it was “true.” (And Shellenberger was being equally clever, not understanding that a hack-and-leak campaign is, indeed, part of an information operation.)

But instead, he betrayed something that is obvious from his propaganda efforts: Taibbi doesn’t understand the difference between “authentic” and “true.” When someone makes false claims about authentic material, it is a lie.

For example, Taibbi has repeatedly claimed that the FBI was not building cases on the suspected voter suppression accounts they turned over to Twitter, even though he included a screen cap showing the FBI taking steps — asking in what venue they needed to serve legal process and seeking a preservation order — that allows them to conduct an investigation.

The email is authentic. His claims about FBI’s efforts to investigate voter suppression are — he himself proved — a lie.

He also betrays that he doesn’t understand some of the material released in 2016 was neither “true” nor “authentic.” Not only were the Guccifer 2.0 documents altered, but the persona repeatedly falsely claimed they were something they were not, most obviously when the persona claimed he was releasing Clinton Foundation documents and I had to explain that that’s not what they were to Glenn Greenwald.

That persona did just what Taibbi has done with the Twitter files, wow credulous people (like Greenwald) with “authentic” files, while making false claims about them.

#MattyDickPic’s confusion about the difference between “true” and “authentic” became more obvious later in the hearing.

Goldman: Are you aware that there was an analysis of the hard drive that was done by the Washington Post at a later date?

Shellenberger: My awareness is that multiple media organizations have done an analyses, including CBS, and found that it was indeed, the laptop was authentic, and that nothing had been changed on it.

Goldman: Let’s just get something clear. The laptop that the FBI had is different than the hard drive that Rudy Giuliani gave to the New York Post. A hard drive, you will agree with this, is a copy of a laptop, right?

Shellenberger: Yes.

Goldman: And you are aware that hard drives can be altered, are you not?

Shellenberger: Of course.

Goldman: So are you aware that the Washington Post analysis of the hard drive showed that it had been altered?

Shellenberger: I have heard that, but I’m also saying that CBS verified —

Taibbi: Politico …

Shellenberger: and other media organizations have verified…

Never mind that Shellenberger seems to have no fucking clue that the laptop CBS analyzed is not the same hard drive that Rudy gave to the Post, and therefore is not the “laptop” on which the story that Twitter throttled was based. Never mind that CBS’ analysis is inconsistent with John Paul Mac Isaac’s claims that the process by which he made his own copy of the laptop was repeatedly interrupted, a problem that would make it difficult to distinguish from an iCloud hack and a real laptop (who puts voice mail messages on a laptop hard drive, for example?), a detail consistent with what I know of the Washington Post analysis (which was conducted by two different people).

But the cutest was little #MattyDickPics chiming in to claim that Politico had authenticated “the laptop.”

They claim no such thing! They authenticated some files (and not forensically, but instead by a witness who couldn’t even confirm the emails hadn’t been altered).

Shreckinger’s source remembered viewing both emails but was not able to compare the text leaked to the Post with the original emails. Other emails from the leaked files matched a cache of emails released by a Swedish government agency, two people who communicated with Hunter Biden said.

This kind of “authentication,” when the claims of someone with a bias like Tony Bobulinski can supplant forensic authentication, is precisely the problem with hack-and-leak reporting, regardless of whether Russian hackers or Matt Taibbi’s buddies do the hacking.

And neither Michael Shellenberger nor Matt Taibbi understand that.

Matt Taibbi does not know the difference between “true” and “authentic,” and it shows in his propaganda.

“Dumb & silent we may be led, like sheep, to the Slaughter:” Elvis Chan, Hacks, the Klan, and the Twitter Files

In one of many false claims Michael Shellenberger made (see this thread for another) in his Twitter Files thread purporting to address Twitter’s handling of the “Hunter Biden” “laptop” (but which focused a lot on non-Twitter material on the “laptop”), he made this claim about the deposition of FBI Assistant Agent in Charge Elvis Chan.

Chan was interviewed as part of the lawsuit filed by Eric Schmitt before Schmitt was elected to the Senate. The suit alleges that the government has violated the First Amendment rights of Americans by pressuring social media companies to take down misinformation. The bolded language below, from an address by George Washington, appears in the first paragraph of Schmitt’s complaint.

if Men are to be precluded from offering their sentiments on a matter, which may involve the most serious and alarming consequences, that can invite the consideration of Mankind; reason is of no use to us—the freedom of Speech may be taken away—and, dumb & silent we may be led, like sheep, to the Slaughter. [my emphasis]

Shellenberger’s tweet is part of an argument that the FBI warned the social media companies specifically about Hunter Biden. Indeed, his tweet is premised on the claim that the FBI gave “warnings of a hack-and-leak operation relating to Hunter Biden.” [my emphasis]

In fact, though Hunter Biden came up in this deposition 36 times, Chan’s testimony was that Hunter Biden came up in just one briefing with social media companies, one in which someone from FBI’s Foreign Influence Task Force, Laura Dehmlow, refused to comment in response to a question from Facebook about the already-published NY Post story.

Q. BY MR. SAUER: Do you know that in 20– so you remember sometime in 2020 a Facebook analyst asked the FBI to comment on the status of the Hunter Biden investigation?

A. That’s correct.

Q. And you believe that this occurred after there had been, you know, a New York Post article about the contents of the laptop that you referred to — I think you referred to earlier you finding out about it that way, right?

A. Yeah, I only found out through news media. I have no internal knowledge of that investigation, and yeah, I believe that it was brought up after the news story had broke.

Q. And so the — what did the Facebook analyst ask Ms. Dehmlow? Did they ask, you know, “Hey, we have the story. Can you confirm it,” or what did they ask?

A. Yeah, they just — I can’t remember the exact question, but I believe the investigator asked if the FBI could provide any information about the Hunter Biden investigation.

Q. Did they refer to the laptop in particular that had been the subject of the news stories?

A. I can’t recall.

Q. And what did Ms. Dehmlow respond?

A. She said no comment. She said something to the effect that the FBI has no comment on this.

Q. Did she indicate why the FBI declined to comment?

A. Yes. It was because — at the time I do not believe that we had confirmed that it was an active — we had — at the time we had not confirmed that the FBI was actually investigating Hunter Biden. So she did not have the authority to say anything or to comment about it.

Q. Did she know at the time that the FBI had the laptop and that the contents had not been hacked?

MR. SUR: Objection; calls for speculation and gets into law enforcement privilege.

Q. BY MR. SAUER: To your knowledge?

A. I have no idea. I never asked her, and she never told me.

Q. Did Hunter Biden come up with any other social media platforms during 2020?

A. Not to my knowledge.

Q. Do you recall any mention of Hunter Biden at any meetings with any social media platforms?

A. No. It stood out because that Facebook meeting was the only one where an individual from one of the companies even asked about it.

Q. You’re confident that Hunter Biden did not come up at any other meetings between federal government officials and social media platforms in 2020?

A. I was confident that I was not a party to any meeting with social media companies where Hunter Biden was discussed outside of the one incident that I told you about.

Q. That was the one where it was a FITF Facebook meeting where the analyst asked Ms. Dehmlow and she refused to comment, correct?

A. That is correct. That is correct.

Note that Twitter Files propagandists often refer to Dehmlow’s actions in 2020 and describe that she was in charge of the entire FITF effort, but at the time she was only in charge of the China unit. That has the effect of falsely suggesting she and all the other FITF warnings were focused primarily on Russia (Iran is similarly neglected from the focus of the Twitter Files propagandists).

In his deposition, Chan takes issue with former Twitter head of Trust and Safety Yoel Roth’s use, in a declaration explaining why Twitter took down links to the NY Post article, of the word, “expectation,” to describe FBI’s warnings to be on the lookout for hack-and-leak operations and notes that the FBI would have been the only federal law enforcement agency who offered such warnings; CISA, which organized other meetings with the FBI, is not a law enforcement agency (though the Twitter File propagandists have at times claimed it is). He also has to correct Schmitt’s lawyer when he treats Roth’s reference to the Infosec community’s response to the NY Post story to include the FBI, as opposed to the private sector Infosec community.

But Chen’s testimony — whether it accords with Twitter’s own records or not — is quite clear: while the FBI (and CISA and ODNI) were absolutely warning that there might be hack-and-leak operations in 2016, those warnings did not mention Hunter Biden. Rather than admitting that, Shellenberger instead states as fact that these warnings were “relating to Hunter Biden.”

And then he does something funnier. To prove that these warnings “relating to Hunter Biden” that weren’t related to Hunter Biden weren’t based on any new information, he points to Chan’s repeated comments that the FBI had not seen any intrusions like the 2016 ones.

Q. You said that there might be a Russian hack-and-dump operation?

A. So what I said was although we have not seen any computer intrusions into national-level political committees or election officials or presidential candidates at this time, we ask you to remain vigilant about the potential for hack-and-dump operations, or something to that effect.

Q. Did you specifically refer to the 2016 hack-and-dump operation that targeted the DCCC and the DNC?

A. I believe I did.

Q. Did you provide any basis to the social media platforms for thinking that such an operation 20 might be coming?

A. The basis was — my basis was it had happened once, and it could happen again.

Q. Did you have any other specific information other than it had happened four years earlier?

[snip]

THE WITNESS: Through our investigations, we did not see any similar competing intrusions to what had happened in 2016. So although from our standpoint we had not seen anything, we specifically, in an abundance of caution, warned the companies in case they saw something that we did not.

Q. BY MR. SAUER: So did you ask the companies if they had seen any attempts at intrusions or unauthorized access?

A. This is something that we — that I regularly ask the companies in the course of our meetings. 

Q. Did you ask them in these meetings?

A. Not at every meeting, but I believe I asked them at some meetings.

Q. And did you repeatedly warn them at these meetings that you anticipated there might be hack-and-dump operations, Russian-initiated hack-and-dump operations?

[snip]

THE WITNESS: So repeatedly I would say — can you — can you ask your question like — what do you mean by “repeatedly”? Like times, five times?

Q. BY MR. SAUER: Well, did you do it more than once?

A. I did it more — yes. I warned the companies about a potential for hack-and-dump operations from the Russians and the Iranians on more than one occasion, although I cannot recollect how many times. [my emphasis]

But note that Chan specifically referenced hacks of “national-level political committees or election officials or presidential candidates.”

Hunter Biden is not and was not a national-level political committee.

Hunter Biden is not and was not an election official.

Hunter Biden is not and was not a presidential candidate.

Having misrepresented what Chan said about the extent of any discussions of Hunter Biden (whether it is accurate or not), Shellenberger then pointed to testimony about hacks of political candidates to disclaim the FBI had any information about hacks of someone who is not a political candidate.

And while it doesn’t show up in this deposition because Eric Schmitt doesn’t much care about Russian hacking, Chan’s reference to Russia and Iran is significant: because according to former CISA Director Chis Krebs’ January 6 Committee deposition, both did hack “election-adjacent systems” in 2020.

Q Are you able to form any conclusions as to whether there was a cyber intrusion in connection with the 2020 election?

A Yes. In fact, we released alerts on these things throughout. There were both Russian and Iranian actors that were able to gain access to election-adjacent systems. The Iranians, in one case, I think, had access to a voter registration database. But we’re not aware of any instance where they were in a system that would’ve been directly connected or, you know, involved in casting, counting, certifying of votes.

Indeed, Iran conducted the most notable information operation in 2020, emails to Democrats in Florida purporting to be Proud Boys providing disinformation about the election. So a good deal of the wailing about last minute warnings to social media companies in 2020 had to do, in part, with foreigners maligning far right militia members, not Hunter Biden. We haven’t heard anything about the FBI’s efforts to protect the reputation of the Proud Boys from Elmo’s propagandists, though.

Several more points about Chan’s responses on hack-and-leak campaigns are worth nothing. First, Chan said he kept raising the potential of a hack-and-leak campaign, “in case [the tech companies] saw something that we did not.” Russian denialists like Matt Taibbi — who espoused the Single Server fallacy until at least 2019 — don’t understand this, but when GRU engaged in a hack-and-leak campaign in 2016, tech companies were seeing the operation and attributing it to Russia in real time (though not Twitter, that I am aware of). Tech companies saw some parts of the attack before the FBI did. Yet in his deposition, Chan had to repeatedly explain to Schmitt’s lawyer that most of his interactions with social media companies involve hacks, not disinformation.

THE WITNESS: Yeah. The majority of my interaction with Facebook is not in the disinformation or malign-foreign-influence realm. It is actually for things related to my — to the Cyber Branch, which are specifically cyber investigations.

One time Chan even had to explain that “malign foreign influence” sometimes involves hacking (the Iranian campaign targeting the Proud Boys appears to have, for example). And Chan described several times that his team not only investigated part of the 2016 hack, but still had an active investigation into those actors. That’s important not only because he would have firsthand knowledge of the kinds of attribution social media companies (and Google and Microsoft) had in 2016, but for another reason: On October 19, 2020, DOJ indicted a bunch of GRU hackers, including one charged in the 2016 hack-and-leak campaign, for a variety of additional hacks, including the hack-and-leak targeting Emmanuel Macron. The Macron campaign, specifically, included both Google and Twitter components. So in the very same weeks when — right wingers complain — Elvis Chan was in close contact with Twitter about the ongoing election, he or his subordinates were likely working with prosecutors in Pittsburgh on an indictment implicating both Google and Twitter.

Emmanuel Macron is not mentioned in the Chan deposition.

Something else not mentioned in the Chan deposition — not once among the 36 mentions of Hunter Biden!!! — is Burisma Holdings. Mind you, it was not FBI that had attributed a 2019 hack of Burisma to the GRU, the very same actors under discussion, earlier in 2020, it was a Bay Area Infosec company, that same Infosec community that Yoel Roth had attributed some of his concerns about Hunter Biden to. We have no idea whether the FBI — whether a team under Chan’s direction, possibly! — similarly discovered that GRU had hacked Burisma in 2019. Chan was never asked. It’s one of the questions you’d have to ask, though, if you wanted to know whether the FBI had any knowledge that might lead them to believe that Hunter Biden — as distinct from “national-level political committees or election officials or presidential candidates” — had been targeted with a GRU info op during the 2020 presidential cycle.

So there are several things that you would want to ask Elvis Chan about whether he knew of things in 2020 that might have raised concerns that the NYPost article was part of a hack-and-leak campaign, including what hacks Russian and other foreign countries did do, his interactions with Bay Area companies Google and Twitter in those very same weeks in advance another indictment of the GRU, as well as his knowledge of the Bay Area attribution of a GRU campaign targeting Burisma. Eric Schmitt’s lawyer didn’t ask. Which is to say that nothing in this deposition addresses Shellenberger’s specific claims, which unsurprisingly didn’t stop him from claiming it did.

But at least we know he knows of the deposition, though from the looks of his screen cap, he may have mostly just searched it for isolated language that would confirm his priors.

Lee Fang, whose single entry in Twitter Files is the least dishonest, has also read it. He posted a screen cap reporting as “news” that the FBI weighs in on legislation that affects the FBI (which is tantamount to confessing that Fang knows next to nothing about how DC works; Fang did not retract his wildly erroneous article that was significantly debunked by Chan’s deposition).

In other words, two people associated with the Twitter Files have at least claimed familiarity with this deposition.

And yet, as recently as Friday, #MattyDickPics has continued to make grossly false claims about what FBI was doing.

Over and over again, Matty has complained that the FBI sent Twitter URLs for tweets, including tweets written by Americans.

Some of the moderation decisions he reviewed in his first Twitter File thread focus on Tweets about the means and method of voting. He calls Tweets advertising an incorrect day for election day “silly numbers.”

In short, Matt Taibbi has gone from being furious that Twitter removed non-consensually posted dick pics, some of which were the product of inauthentic campaign launched by Steve Bannon buddy Guo Wengui, to being outraged that the FBI shared Tweets advertising the wrong day for election day.

He has done so in spite of the fact that Chan’s deposition explains why the FBI was doing that: because sending false information that might lead someone to lose their opportunity to vote is a crime.

Q. But you received reports, I take it, from all over the country about disinformation about time, place and manner of voting, right?

A. That is — we received them from multiple field offices, and I can’t remember. But I remember many field offices, probably around ten to 12 field offices, relayed this type of information to us. And because DOJ had informed us that this type of information was criminal in nature, that it did not matter where the — who was the source of the information, but that it was criminal in nature and that it should be flagged to the social media companies. And then the respective field offices were expected to follow up with a legal process to get additional information on the origin and nature of these communications.

Q. So the Department of Justice advised you that it’s criminal and there’s no First Amendment right to post false information about time, place and manner of voting?

[snip]

A. That was my understanding.

Q. And did you, in fact, relay — let me ask you this. You say manner of voting. Were some of these reports related to voting by mail, which was a hot topic back then?

A. From my recollection, some of them did include voting by mail. Specifically what I can remember is erroneous information about when mail-in ballots could be postmarked because it is different in different jurisdictions. So I would be relying on the local field office to know what were the election laws in their territory and to only flag information for us. Actually, let me provide additional context. DOJ public integrity attorneys were at the FBI’s election command post and headquarters. So I believe that all of those were reviewed before they got sent to FBI San Francisco.

Q. So those reports would come to FBI San Francisco when you were the day commander at this command post, and then FBI San Francisco would relay them to the various social media platforms where the problematic posts had been made, right?

A. That is correct.

Q. And then the point there was to alert the social media platforms and see if they could be taken down, right?

A. It was to alert the social media companies to see if they violated their terms of service. [my emphasis]

I’ve got a request into the FBI but have not gotten a response about what crime this violated, but I believe the crime DOJ was relying on — Bill Barr’s DOJ! — was the Ku Klux Klan Act, which was passed in 1871 to prevent racists from conspiring to deprive former slaves from voting. This is the same crime that Douglass Mackey was charged with for allegedly conducting a more systematic campaign to misinform black voters about when to vote in 2016 (Mackey has pled not guilty and is vigorously contesting the constitutionality of the statute).

In other words, after complaining that Twitter chose to take down revenge porn targeting Joe Biden’s son, Taibbi is now complaining that DOJ enforced a law designed to protect Black people’s right to vote.

And his fellow Twitter File propagandists, at least two of whom claim familiarity with Elvis Chan’s deposition that explains this, are letting him continue to grossly misrepresent an effort to protect the right to vote.