There are a number of images that have been posted on the G-TV site that make false claims about the individuals seen in the Hunter Biden laptop imagery.
One example is a photo showing a naked woman on a bed that suggests that this is Malia, President Obama’s daughter. This identification is false. Despite the fact that the G-TV site often contains genuine content, they frequently misidentify the location, context, and individuals seen in these images and videos. Their reasoning for doing so is unclear, it could potentially be done in order to increase circulation or for some political agenda.
Image 1: A frame from a video posted on the G-TV website misidentifying the woman (POI-1) on the bed as Malia, President Obama’s daughter
Image 2: The POI-1 seen in bed in Image 1 was taken in West Hollywood on September 27, 2018.
Image 3: POI-1 failed to match Malia Obama on face recognition and body geometry
A note to whomever is posting these false narratives: there is plenty of damning material on the hard drive that speaks for itself, you don’t have to further ‘enhance’ it by making up ludicrous claims, spreading fictitious stories about the rape of under age Chinese girls, or misidentifying individuals as celebrities. By doing so, you are not only compromising your own credibility, you are also tainting the authentic materials you were given.
On October 19, 2020 in a document entitled “Public Statement on the Hunter Biden Emails”, more than 50 former US intel officials signed a public letter saying they believe the Hunter Biden story has ‘all the classic earmarks of a Russian information operation’.
“Our view that the Russians are involved in the Hunter Biden email issue is consistent with two other significant data points as well. According to the Washington Post, citing four sources, “U.S. intelligence agencies warned the White House last year that Giuliani was the target of an influence opera<on by Russian intelligence.”
This letter is a textbook example of what is wrong with many of our former intelligence officers. On the professional front, they are incompetent, they exhibit poor analysis and reporting tradecraft, and show exceedingly poor technical skill. These individuals should never have worked in intelligence in the first place. Morally, the are completely bankrupt. Public statements like that subvert the truth and are meant to deceive the public.
“Their inability to grasp basic facts and engage in simple reasoning perhaps explains why the Obama team abandoned American military and intelligence officials at Benghazi in September 2012 and why they considered ISIS as “a junior varsity” team. “
No, dear former intelligence officers, it wasn’t the imaginary Russians again! The repair shop that handled Hunter Biden’s equipment is confirmed to have received the three damaged laptops from Hunter Biden himself.
He signed on the work order, came back 2 days after the initial visit and picked up two of the three laptops, and on the second visit he dropped off a data recovery USB drive for the third laptop. All the data circulating currently in the news is sourced to the third machine which he legally abandoned.
His signature on the work order and on several other corporate documents including Burisma resolutions, credit cards, payment records, CEFC contracts, and other official documents all show a >95% match on his verified signature.
Image 1: Hunter Biden’s verified signature on the equipment repair work order
In an era where comets were considered the harbinger of death and wars, 13th century scholar Albertus Magnus wrote:
“Now it must be asked if we can comprehend why comets signify the death of magnates and coming wars, for writers of philosophy say so. The reason is not apparent, since vapor no more rises in a land where a pauper lives than where a rich man resides, whether he be king or someone else. Furthermore, it is evident that a comet has a natural cause not dependent on anything else; so it seems that it has no relation to someone’s death or to war. For if it be said that it does relate to war or someone’s death, either it does so as a cause or effect or sign.”
Comets don’t bring death, wars nor pestilence, and neither will Amy Coney Barrett. She is one of the most stable, eloquent, rational, intelligent, and able judges we’ve seen. The fact that she preaches the separation of church and state should clear any remaining doubts about her suitability for office. The arguments that ACB is ‘too Christian’ for the job are similar to the claims made over hundred years ago against admitting the ‘too Jewish’ Louis Brandeis.
During the 1916 confirmation hearings, the opposition to Brandeis was virulent. The press attacked his character and downplayed his qualifications. Harvard’s President A. Lawrence Lowell — who urged establishing quotas for admitting Jews to the school and segregating them in separate dormitories on campus—collected over fifty signatories to a petition objecting to Brandeis’ nomination. The names on his list included leading members of the American Bar Association such as Taft and Elihu Root. More than forty witnesses and known figures from the losing side of cases that Brandeis had prosecuted spoke before the committee against him, disguising their personal animus in rhetoric about dishonorable and unprofessional conduct.
Just like in the Brandeis case, the frenzied attacks and wild howling against ACB are driven by superstition and bigotry. This display of raw hate also reminds me of another time in history: that of the Malleus Maleficarum, when strong and independent women were charged with witchcraft and burnt at the stake by the tens of thousands.
References and Sources Separation Between the Garden of the Church and the Wilderness of the World Roger Williams the 17th century founder of Providence Rhode Island and the founding father of the founding fathers wrote that Church-state separation was essential for the health of both the state and the church. Williams asserted that there should be a “hedge or wall of Separation between the Garden of the Church and the Wilderness of the world.” When that wall or hedge was breached, he argued, it was necessary to rebuild it. Williams’ language is very similar to Jefferson’s metaphor of “a wall of separation between church and state.”
2 Chronicles 19:5-7 ”He appointed judges in the land in all the fortified cities of Judah, city by city. He said to the judges, Consider what you are doing, for you do not judge for man but for the Lord who is with you when you render judgment. Now then let the fear of the Lord be upon you; be very careful what you do, for the Lord our God will have no part in unrighteousness or partiality or the taking of a bribe.”
There are currently a number of images circulating on social media that purport to depict Hunter Biden snorting cocaine off the backside of a prostitute.
These images are being falsely attributed to Hunter Biden. The sources of these uploads are several progressive media outlets like Thunder Walks About. This seems to be a part of a wider discreditation operation that aims to attack the credibility of the recently released authentic Hunter Biden images and email.
Image 1: The fake post on Twitter. Within an hour of this post at 4:50 PM it received 636 retweets and 2.3K likes
The concept behind distributing this misinformation is to have these images circulate for a while and wait for some conservative users or media to start sharing them. Once this happens, the fabricators will point out the source of these images and use it to attack the credibility of the individual who referenced it. The end result is that the false information will end up discrediting the people who shared and used it.
Image 2: L-R, Image falsely purporting to show Hunter Biden snoring cocaine off the backside of a prostitute and the two images showing the actual source footage.
Image 3: Sampling of authenticated imagery of Hunter Biden smoking crack with various escorts
In the first article, Coleman claimed that four former US intelligence officials that were ‘familiar with the matter’ said that the Hunter Biden emails and images published by the New Your Post are part of an influence operation by Russian intelligence. In the second article, she repeated the same claim and added that the materials are not being published by Twitter and Facebook because they violated their “hacked materials policy”.
Ignoring for a second the unfounded claim that these documents were obtained by Russian intelligence when they hacked Burisma. Coleman’s allegations about the inability to authenticate the emails and that the images are fabricated seem legitimate…that is, until you evaluate her credentials to make these statements, her articles, and her sources. Running Coleman through various analytics shows the following:
She is a new hire at The Hill. According to her resume and bio, she has no commercial writing experience beyond a few fluffy internships.
She lifted the articles from an NBC News piece by Ken Dilanian (the prince of impeachment) and a WaPo piece written by Ellen Nakashima (the queen of Russian collusion).
She was instructed by her editor to publish the piece ‘as is’ with no independent verification of sources or their claims.
The pieces were published by The Hill to help ‘amplify’ Dilanian’s NBC and Nakashima’s WaPo articles.
All of Coleman’s, Dilanian’s, and Nakashima’s work is completely circular. None of these articles have even one substantiated piece of evidence.
Image 1: The illustrious journalistic credentials of the highly trustworthy Justine Coleman
What about Justine Coleman’s expertise writing about national security and intelligence? Don’t bother looking for them, they are non existent. Her largest on-line footprint for original investigative work is her 8th grade science project. In this article, her ”Key to Awesomeness” is described as:
“Her science fair experiment was to determine how detergents, and the temperature of the water, affected stain removal. “My experiment, basically, consisted of staining cotton pieces, washing them with different detergents and in different temperatures of water, and measuring the results,” said Justine.
To summarize it in a non-scientific language, she discovered that some of the stains came out, while others remained on the fabric, and that water temperature does, in fact, affect stain removal.
This basically concludes the listing of Justine Coleman’s professional qualifications to opine on any national security or intelligence issue or the authenticity of Hunter Biden’s images and emails.
Image 2: Justine Coleman The national security and intelligence expert reporter who also discovered that water temperature and detergent type effects stain removal
Video 1: October 2019, the George Washington University’s School of Media journalism student Justine Coleman expressing her disbelief that something that she wrote was worthy of publication by WaPo
Clearly, Coleman is somebody’s worn out sock puppet. It didn’t take much to figure out that Ellen Nakashima was the brain behind this little manipulative enterprise. So what’s the deal with Nakashima? If you are not familiar with this journalistic seraph, she is the reigning queen of the Russian DNC hack narrative. In May-June 2016, she actively colluded with Crowdstrike and the DNC’s senior leadership to develop the Russian source of the DNC hack claim. She then published that story on June 14, 2016. Then as now, she argued that the damaging DNC emails (the ones that describe how the DNC torpedoed Bernie Sanders) couldn’t be authenticated. On December 22, 2016, Nakashima again knowingly published and pimped another false article that promoted the Crowdstrike debunked claim that the Russians hacked the Ukrainian artillery using the same techniques they allegedly used on the DNC.
What about the identify of the four anonymous former US intelligence officials that provided Nakashima with this information? It turns out that they are not anonymous at all. Just like the four blind mice, they are mere literary devices, they don’t exist! As with the DNC hack fiction, Nakashima completely made them up.
Bottom line is that the Hunter Biden images published by the New York Post have already been proven authentic. The same applies to his video, images, texts, emails, and other digital content that came from his laptop.
The following composite shows the results of a image authentication and evaluation tests performed on two images from the ‘Hunter Biden laptop’ collection. The Biden campaign and various MSM apologists claims that they are fakes. The results of the image analysis beg to differ:
The two images match Hunter Biden on face recognition within a 98% certainty (using a validated image as the reference)
The object in Hunter Biden’s mouth matched a glass crack pipe within a 93% certainty
Both images came back as negative on a wide range of tampering and deepfake manipulations
Conclusion, these are authentic images within a probability >90%.
Image 1: Authentication and validation of two images from the ‘Hunter Biden laptop’ collection
If you are not getting the relevance of Vadym Pozharskyi, the top Burisma adviser emailing Hunter asking for “advice on how you could use your influence”, the following composite may be of some help. Seen below is Vadym Pozharskyi in situ at an Atlantic Council event with former senior state department officials in the Obama administration including: Evelyn Farkas, Ambassador John Herbst, and Ambassador Roman Popadiuk. All hard at work unselfishly promoting the interests of Burisma. Why do you ask? Because they are just nice like that.
Sampling of the Tests Performed on Imagery Based AI based face recognition and deepfake detection. I’ve also performed a battery of forensic image analysis tests that included functions such as:
Double Quantization – These types of inconsistencies occur when a foreign object is inserted in a JPEG image. When the new image is saved, the untampered part of the image will have been compressed twice, while the inserted region only once. In this case, the tampered area should appear red while the rest of the image blue. If other colors are present (green, yellow) then no conclusion can be made.
Error Level Analysis – These types of inconsistencies are produced by recompressing the image as a JPEG of quality 75 and subtracting the new image from the old. The resulting image of differences is then enhanced and displayed. Areas of interest are those with higher values than other similar parts of the image. Only similar regions should be compared, i.e. edges should be compared to edges, textures to textures, and uniform regions to uniform regions. Color discrepancies (commonly blue regions) are also generally suspicious.
Median Noise Residuals – These type of inconsistencies are based on isolating the almost-invisible image noise through median filtering. When interpreting the results, areas of interest are those that return higher (i.e. brighter) values than other similar parts of the image. Only similar regions are compared, i.e. edges are compared to edges, textures to textures, and uniform regions to uniform regions.
Compression anomalies 1 – JPEG compression operates in an 8-by-8 grid, which is near-invisible but detectable. Adding or moving an object on an image may locally disrupt this grid. The GRIDS algorithm seeks such discrepancies, and highlights them locally. The algorithm produces local red/orange “blobs” where it detects grid discrepancies. Generally, the GRIDS algorithm is less distracted by textures in the image, and focuses on grid disturbances.
Compression anomalies 2 – JPEG compression operates in an 8-by-8 grid, which is near-invisible but detectable. Adding or moving an object on an image may locally disrupt this grid. The GRIDS-Inverse algorithm is complementary to GRIDS in seeking such discrepancies. The algorithm produces local blue “blobs” where it detects grid discrepancies. Generally, the GRIDS algorithm is less distracted by textures in the image, and focuses on grid disturbances. However, it should mostly be interpreted in combination with other algorithm outputs that highlight the same regions.
Compression anomalies 3 – JPEG compression operates in an 8-by-8 grid, which is near-invisible but detectable. Adding or moving an object on an image may locally disrupt this grid. The BLOCK algorithm detects the image grid and looks for local discrepancies. Any coherent region with different color to its surroundings may correspond to tampering, although reds and yellows against a blue background are the most typical indication of tampering.
Compression anomalies 4 – The JPEG Ghosts algorithm is based on recompressing the image in multiple different qualities and subtracting each of them from the original. The resulting difference images are post-processed to highlight regions that stand out and are likely to originate from a different JPEG image. Then, the images most likely to contain interesting findings are selected (i.e. those that feature localized inconsistencies). Consistent yellow regions against a blue background may correspond to traces of tampering, especially if they do not correspond to edges, but to entire regions.
Noise anomalies – Each image carries invisible, high-frequency noise that is the result of the capturing process as well as the compression. The Discrete Wavelet Noise algorithm filters the image and calculates the local noise distribution at each part of the image. Regions that differ from the rest of the image are highlighted in strong red, and are likely to originate from other images.
Copyright 2020 Yaacov Apelbaum, All Rights Reserved.
“The righteous man perishes, and no one lays it to heart; devout men are taken away, while no one understands… But you, draw near, sons of the sorceress, offspring of the adulterer and the loose woman. Whom are you mocking? Against whom do you open your mouth wide and stick out your tongue? Are you not children of transgression, the offspring of deceit, you who burn with lust among the oaks, under every green tree, who slaughter your children in the valleys, under the clefts of the rocks?”Isaiah 57:1-21
Another public gathering and another Antifa-BLM-Green Alliance murder. It turns out that what appears to the naked eye in the edited news product as random violence are in fact carefully orchestrated progressive media events. In the case of the Denver murder this week, it shows clear evidence of a coordination between media outlets and well known Antifa-BLM-PSL agitators. As can be seen from the composites below, a professional agitator, named Jeremiah Elliott, baited and assaulted multiple peaceful demonstrators while his Denver Post camera wing lady, Helen Richards, was busy capturing the fictitious ‘right wing extremists’ in action.
This agitprop campaign joined by Zack Newman, a Denver 9News produce, and it was clearly aimed at generating progressive propaganda. Unfortunately, just as in any revolutionary activity, the business of manufacturing violent news is riddled with potential casualties. This event was no exception. Richards’ and Newman’s little Pulitzer prize initiative ended abruptly when Matthew Dolloff, another Antifa-BLM-Green activist and Zack Newman’s paid muscle, murdered Lee Keltner, all while Newman watched on and Richards captured the murder on her camera a few feet away.
Image 1: Sampling of the coordinated media activity between Jeremiah Elliott, a violent Denver Antifa-BLM-PSL activist, and his wing woman, Denver Post photographer Helen Richards. During Elliott’s multiple assaults on peaceful demonstrators, Richards was always right next to him capturing the action
Image 2: Helen Richardson, The Denver Post’s ‘crisis photographer’ in action and Matt Dolloff, the Denver NBC-affiliated 9News hired muscle staging a scene for the 9News producer Zack Newman.
Image 3: The political footprint of Matt Dolloff includes anti-Trump, anti-Israel, pro-Islamist, anti-police, and anti-US military posts and activity
Image 4: Zack Newman from 9News, his muscle, Matt Dolloff, and Jeremiah Elliott, the Antifa agitator, stalking their victim Lee Keltner (image was enhanced and reconstructed from the original by Richard Randall)
Video 1: February 17, 2020, Jeremiah Elliott assaulting an individual at a Bernie Sanders speech
Image 5: Jeremiah Elliott Antifa network includes practicing Satanists and Wiccans
Image 6: July-August 2020, Jeremiah Elliott leading BLM Antifa riots and attacks against the police in Aurora Colorado
Evaluating Steve Scully’s Twitter melodrama and hacking claim, one can’t but recall the immortal words of the 4th century Roman poet Brittania Spearus. In her lyric masterpiece “Oops!…I Did It Again” she wrote:
You see my problem is this I’m dreaming away Wishing that heroes, they truly exist I cry, watching the days Can’t you see I’m a fool in so many ways But to lose all my senses That is just so typically me Oh baby, oh
Yes, it does seem that life imitates art and Scully, just as in the poem, suffers from multiple reoccurring problems. Beyond his chronic narcissism and pathological dishonesty, he:
Doesn’t understand the fine nuances of Twitter’s DMs vs. public posts
Has an established pattern of posting inflammatory content and then attributing it to hackers
Fails to grasp even the basics of what hacking is and how it’s done
doesn’t understand that each tweet is traceable to the device posting it: the device’s IP address, it’s carrier, its MAC address, its IMEI and MEID #, and its phone number
Image 1: Typical social media comments on Steve Scully’s postings: “What are you eating? You’re looking younger by the minute.”, “He doesn’t age.”, “Looking sharp”, “You’re so handsome.”, “Dorian Gray!”
Scully’s assertion that his Twitter account was hacked doesn’t jibe with any of the evidence. For someone else to have tweeted from his phone would have been exceedingly difficult because such an exploit would have kicked him off his device and he’d likely notice it. Furthermore, to hack his phone and control it remotely would require significant resources, skills, and risk, and it would be easy to trace. The attacker would first have to bypass the device login security, gain full interactive control over the phone, launch the Twitter app, log in, compose the message, and tweet it.
Why go through all of this trouble when it’s faster/safer to just post the tweet from the alleged attacker’s own device? In typical phone hacks, the attackers look to conduct surveillance on the device (voice/video) and/or retrieve files and information such as an address book, images, and texts. Hence, a hacker taking over Scully’s device for the sole purpose of an ‘ambiguous’ tweet is by far the poorest return on hacking investment in recorded history.
Image 2: Steve Scully’s ongoing 8 year Twitter hacking victim melodrama
Scully’s past pattern of behavior is consistent with a few other Twitter ‘work accidents’ and his excuses of having been hacked. Twice before, in 2012 and 2013, Scully claimed that his Twitter account was broken into; each incident occurred after he posted ‘regrettable’ tweets.
The fact that he deleted his Twitter account, then reactivated it, then went private, then deleted the post in question are also strong indicators that Scully is, as Brittania Spearus observed in her poem is a “a fool in so many ways”.
If Scully really wanted to, he could quickly put this debate to rest by asking Twitter to publish the event logs for his account activity. But he won’t, because these logs will unequivocally show that the source IP addresses, device type, and date/time of the logins to his Twitter account matched his iPhone. The cell phone logs in turn, will further validate that he was using his iPhone before during, and after the post was tweeted.
For those who are still trying to figure out if Scully is an unbiased reporter, a quick examination of his linkages shows that he is connected professionally and socially to a large number of hard core anti-Trumpers. One such friend is Mark Zaid, the attorney for Eric Ciaramella from the Ukrainian impeachment drama.
“…Out of frustration, I sent a brief tweet addressed to Anthony Scaramucci. The next morning when I saw that this tweet had created a controversy, I falsely claimed that my Twitter account had been hacked. These were both errors in judgment for which I am totally responsible. I apologize,”
Copyright 2020 Yaacov Apelbaum, All Rights Reserved.
James O’Keefe III from Project Veritas has released a second video exposing voter fraud and ballot harvesting by Ilhan Omar connected political operatives in Minneapolis, Minnesota. Shortly afterwards, President Trump Tweeted it as well.
At min 1:59-2:06, the video references one of Ilhan Omar’s largest donors, the mysterious Basim Omar Sabri. If you would like to learn more about this outstanding human being and gain some insight into the type of individuals who float her and finance the 2020 armed insurrection, read on.
Ah, Salaam and Good Day/Evening to You, Worthy Friend Welcome to the Minneapolis caliphate. Our story of prince Basim begins on a dark night, where a dark man waits, with a dark purpose…
To the uninitiated to the shadowy characters of the bazar, Basim can be best described as the spiritus animus corpus of the sorcerer Jafar from One Thousand and One Nights. He is a convicted felon and a career criminal. In 2005, he was sentenced to 33 months in federal prison for three counts of bribing a Minneapolis council member Brian Herron. Basim’s illicit repertoire is not limited to old fashioned middle eastern baksheesh (bribery), it also includes other fine feats such as:
An Abridged Bio Born in 1959, Basim Sabri is a Palestinian Arab who immigrated with his family to the US in 1979. In 1981-84 he attended the University of Minnesota majoring in political science. After graduation, he founded Sabri Properties. The company expanded overnight, building a massive real estate portfolio in Minneapolis. Sabri Properties rent revenues in 2015 alone were about $6,900,000. He owns multiple apartment buildings, commercial spaces, malls, private houses, and businesses. He is notorious for keeping his properties in unsafe and dilapidated condition and being in violation of building code standards. The city regularly cites his properties with infractions (182 times since January 2010).
Sabri owns a 13K square foot mansion in a Minneapolis suburb, an oceanfront condo in South Beach, Miami, and 10 acres of land in Miami. Sabri’s wife, Sahar Hamdan, runs several businesses under her maiden name and both have over 50 family members that live in the Minneapolis area. Sabri is considered the king maker in Minneapolis and is the second leading donor of Ilhan Omar and backer of several other progressive politicians including former senator Al Franken. In the past, Sabri has raised funds for the terrorist organization Hamas through a variety of charity events including one entitled “Medical supplies for the children of the massacre in Gaza”.
What Are the Odds? In what can only be explained as a 1 in a billion chance, Sabri (under the name “Omar”) happens to own the Latino restaurant, El Nuevo Rodeo, on Lake Street & 27th in Minneapolis. This was the club where George Floyd and Derek Chauvin worked together as security guards. If that is not statistically significant enough, Basri also owns 15 properties on Lake Street, within the bustling commercial corridor that was wiped out in ‘a series of unfortunate events’ during the May riots.
Image 2: The life and work of Basim Omar Sabri
The Wretched Refuse In 1883, Emma Lazarus published The New Colossus in response to the plight of Jews fleeing from religious persecution in Russia. This poem (as well as the whole statue of liberty cult) has unjustifiably become the battle cry of the open borders and free immigration movements. A favorite among the soy latte sipping proletariat is the last stanza:
“Give me your tired, your poor, Your huddled masses yearning to breathe free, The wretched refuse of your teeming shore. Send these, the homeless, tempest-tost to me, I lift my lamp beside the golden door!”
Even if we follow the faulty Marxist interpretation of these lines, it looks like between Ilhan Omar and Basim Sabri we have already reached the quota for accepting humanity’s refuse and wretches. I know that this might sound outlandish, but moving forward, how about if we just avoid importing more characters from Alibaba and the forty thieves and instead limit the immigrants to the mentally stable, hard working, and law abiding individuals?
Being grateful for the privilege of living in this great country is not mandatory but it would be nice.
Image 3: Eighteen of Alibaba’s forty thieves who are still awaiting US refugee visas
Image 4: Frederic Auguste Bartholdi’s 1867 Egyptian peasant women statue originaly titled “Egypt Bringing Light to Asia”, was meant to stand at Port Said, at the northern entrance to the Suez Canal. The Egyptian Khedive, Isma’il Pasha, rejected Batholdi’s project because it was too expensive. Batholdi shrewdly repackaged it as ‘Lady Liberty’ and sold it to the US.
The New Colossus by Emma Lazarus – November 2, 1883 Not like the brazen giant of Greek fame, With conquering limbs astride from land to land; Here at our sea-washed, sunset gates shall stand A mighty woman with a torch, whose flame Is the imprisoned lightning, and her name Mother of Exiles. From her beacon-hand Glows world-wide welcome; her mild eyes command The air-bridged harbor that twin cities frame. “Keep, ancient lands, your storied pomp!” cries she With silent lips. “Give me your tired, your poor, Your huddled masses yearning to breathe free, The wretched refuse of your teeming shore. Send these, the homeless, tempest-tost to me, I lift my lamp beside the golden door!” Prince Basim’s Menagerie He has many progressive white monkeys in his palace And to view them perform a riot he charges no fee He’s got Somali slaves, servants, and flunkies Ilhan and the local media are so proud to work for him
Copyright 2020 Yaacov Apelbaum, All Rights Reserved.