The Hunter Biden Texts

Please stop

We don’t often see the movement of the political power clockwork, but every once in a while a little gap in the curtain opens and you get a rare glimpse. 

Child Abuse DrugTexts Details
Image 1: Full text thread of one conversation between Hunter Biden and a family member discussing various topics such as alleged inappropriate conduct with a family minor (Click on image to zoom)

Hunter Biden Text -1
Image 2
: Part-1

Hunter Biden Text -2
Image 3
: Part-2

Hunter Biden Text -3
Image 4
: Part-3

Hunter Biden Text -4
Image 5
: Part-4 (see supporting visual in Image 6)

Visual Nerrative
Image 6
: “Walking around naked, watching porn, masturbating (on a live cam), and doing drugs”

Hunter Biden Text -5
Image 7: Part-5

Child Abuse Texts
Image 8
: Sampling of several other text threads between Hunter Biden and family and business associates alleging inappropriate conduct with a family minor (Click on image to zoom in).

Jim and Hunter Biden Profiles
Image 9: Sampling of two authenticated user profiles who participated in the messaging conversations


References and Sourcing
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification

Justine Coleman from The Hill is A Manipulative Media Hack
Hunter Biden Laptop Images Are Authentic
50 former intelligence officials warn NY Post story sounds like Russian disinformation – The Hill
Hunter Biden story is Russian disinfo, dozens of former intel officials say – Politico

Copyright 2020 Yaacov Apelbaum, All Rights Reserved.

Beware of Chinese Bearing Gifts

Lies Beneath

There are a number of images that have been posted on the G-TV site that make false claims about the individuals seen in the Hunter Biden laptop imagery.

One example is a photo showing a naked woman on a bed that suggests that this is Malia, President Obama’s daughter. This identification is false. Despite the fact that the G-TV site often contains genuine content, they frequently misidentify the location, context, and individuals seen in these images and videos. Their reasoning for doing so is unclear, it could potentially be done in order to increase circulation or for some political agenda.

False Identificaotin of Malia Obama
Image 1: A frame from a video posted on the G-TV website misidentifying the woman (POI-1) on the bed as Malia, President Obama’s daughter

Girl September 27 2018 West Hollywood
Image 2: The POI-1 seen in bed in Image 1 was taken in West Hollywood on September 27, 2018.

No match POI-1 and Malia Obama
Image 3
: POI-1 failed to match Malia Obama on face recognition and body geometry 

A note to whomever is posting these false narratives: there is plenty of damning material on the hard drive that speaks for itself, you don’t have to further ‘enhance’ it by making up ludicrous claims, spreading fictitious stories about the rape of under age Chinese girls, or misidentifying individuals as celebrities. By doing so, you are not only compromising your own credibility, you are also tainting the authentic materials you were given.

References and Sourcing
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification

Justine Coleman from The Hill is A Manipulative Media Hack
Hunter Biden Laptop Images Are Authentic
50 former intelligence officials warn NY Post story sounds like Russian disinformation – The Hill
Hunter Biden story is Russian disinfo, dozens of former intel officials say – Politico

Copyright 2020 Yaacov Apelbaum, All Rights Reserved.

No Russians Need Apply

Corrupt Reporter and Former IC Official

On October 19, 2020 in a document entitled “Public Statement on the Hunter Biden Emails”, more than 50 former US intel officials signed a public letter saying they believe the Hunter Biden story has ‘all the classic earmarks of a Russian information operation’.

They stated:

“Our view that the Russians are involved in the Hunter Biden email issue is consistent with two
other significant data points as well. According to the Washington Post, citing four sources,
“U.S. intelligence agencies warned the White House last year that Giuliani was the target of an
influence opera<on by Russian intelligence.”

This letter is a textbook example of what is wrong with many of our former intelligence officers. On the professional front, they are incompetent, they exhibit poor analysis and reporting tradecraft, and show exceedingly poor technical skill. These individuals should never have worked in intelligence in the first place. Morally, the are completely bankrupt. Public statements like that subvert the truth and are meant to deceive the public. 

As Larry Johnson wrote:

“Their inability to grasp basic facts and engage in simple reasoning perhaps explains why the Obama team abandoned American military and intelligence officials at Benghazi in September 2012 and why they considered ISIS as “a junior varsity” team. “

No, dear former intelligence officers, it wasn’t the imaginary Russians again! The repair shop that handled Hunter Biden’s equipment is confirmed to have received the three damaged laptops from Hunter Biden himself. 

He signed on the work order, came back 2 days after the initial visit and picked up two of the three laptops, and on the second visit he dropped off a data recovery USB drive for the third laptop. All the data circulating currently in the news is sourced to the third machine which he legally abandoned.

His signature on the work order and on several other corporate documents including Burisma resolutions, credit cards, payment records, CEFC contracts, and other official documents all show a >95% match on his verified signature.

Signiture validation
Image 1: Hunter Biden’s verified signature on the equipment repair work order

References and Sources
50 former intelligence officials warn NY Post story sounds like Russian disinformation – The Hill
Hunter Biden story is Russian disinfo, dozens of former intel officials say – Politico
Justine Coleman from The Hill is a Manipulative Media Hack

Copyright 2020 Yaacov Apelbaum, All Rights Reserved.

Amy Coney Barrett The Harbinger of Good

ACB shows her notepad

In an era where comets were considered the harbinger of death and wars, 13th century scholar Albertus Magnus wrote:

“Now it must be asked if we can comprehend why comets signify the death of magnates and coming wars, for writers of philosophy say so. The reason is not apparent, since vapor no more rises in a land where a pauper lives than where a rich man resides, whether he be king or someone else. Furthermore, it is evident that a comet has a natural cause not dependent on anything else; so it seems that it has no relation to someone’s death or to war. For if it be said that it does relate to war or someone’s death, either it does so as a cause or effect or sign.”

Amy Coney Barrett the harbinger of good
Image 1: Albertus Magnus  by Joos (Justus) van Gent, Urbino, c. 1475 and ACB 2020

Comets don’t bring death, wars nor pestilence, and neither will Amy Coney Barrett. She is one of the most stable, eloquent, rational, intelligent, and able judges we’ve seen. The fact that she preaches the separation of church and state should clear any remaining doubts about her suitability for office. The arguments that ACB is ‘too Christian’ for the job are similar to the claims made over hundred years ago against admitting the ‘too Jewish’ Louis Brandeis.

During the 1916 confirmation hearings, the opposition to Brandeis was virulent. The press attacked his character and downplayed his qualifications. Harvard’s President A. Lawrence Lowell — who urged establishing quotas for admitting Jews to the school and segregating them in separate dormitories on campus—collected over fifty signatories to a petition objecting to Brandeis’ nomination. The names on his list included leading members of the American Bar Association such as Taft and Elihu Root. More than forty witnesses and known figures from the losing side of cases that Brandeis had prosecuted spoke before the committee against him, disguising their personal animus in rhetoric about dishonorable and unprofessional conduct.

Just like in the Brandeis case, the frenzied attacks and wild howling against ACB are driven by  superstition and bigotry. This display of raw hate also reminds me of another time in history: that of the Malleus Maleficarum, when strong and independent women were charged with witchcraft and burnt at the stake by the tens of thousands.

References and Sources
Separation Between the Garden of the Church and the Wilderness of the World
Roger Williams the 17th century founder of Providence Rhode Island and the founding father of the founding fathers wrote that Church-state separation was essential for the health of both the state and the church. Williams asserted that there should be a “hedge or wall of Separation between the Garden of the Church and the Wilderness of the world.” When that wall or hedge was breached, he argued, it was necessary to rebuild it. Williams’ language is very similar to Jefferson’s metaphor of “a wall of separation between church and state.”

2 Chronicles 19:5-7
”He appointed judges in the land in all the fortified cities of Judah, city by city. He said to the judges, Consider what you are doing, for you do not judge for man but for the Lord who is with you when you render judgment. Now then let the fear of the Lord be upon you; be very careful what you do, for the Lord our God will have no part in unrighteousness or partiality or the taking of a bribe.”

https://jewishstandard.timesofisrael.com/anti-semitism-on-the-u-s-supreme-court/

Wilson – Scott Berg (pages 400 – 402)

Copyright 2020 Yaacov Apelbaum, All Rights Reserved.

Operation Snort

Operation Snort

There are currently a number of images circulating on social media that purport to depict Hunter Biden snorting cocaine off the backside of a prostitute. 

These images are being falsely attributed to Hunter Biden. The sources of these uploads are several progressive media outlets like Thunder Walks About. This seems to be a part of a wider discreditation operation that aims to attack the credibility of the recently released authentic Hunter Biden images and email. 

Hunter Bided snorting fake
Image 1
: The fake post on Twitter. Within an hour of this post at 4:50 PM it received 636 retweets and 2.3K likes

The concept behind distributing this misinformation is to have these images circulate for a while and wait for some conservative users or media to start sharing them. Once this happens, the fabricators will point out the source of these images and use it to attack the credibility of the individual who referenced it. The end result is that the false information will end up discrediting the people who shared and used it.

Alisson Becker
Image 2: L-R, Image falsely purporting to show Hunter Biden snoring cocaine off the backside of a prostitute and the two images showing the actual source footage.

Smoking Crack
Image 3
: Sampling of authenticated imagery of Hunter Biden smoking crack with various escorts

References and Sourcing
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification

Justine Coleman from The Hill is A Manipulative Media Hack
Hunter Biden Laptop Images Are Authentic
Need a Nazi for a Project, but Can’t Find One? Here’s How to Make One Up

Down the Discreditation Rabbit Hole

Copyright 2020 Yaacov Apelbaum, All Rights Reserved.

Justine Coleman from The Hill is A Manipulative Media Hack

Justine Coleman is an media hack

On October 15, 2020 at 9:20 PM, Justin Coleman, a breaking news reporter with The Hill, published a ±640 word piece entitled

Intelligence officials warned Trump that Giuliani was target of Russian influence campaign

On the same day at 11:05 PM (105 minutes later), she rushed to publish a second ±880 word piece entitled:

Feds investigating if alleged Hunter Biden emails connected to foreign intelligence operation

In the first article, Coleman claimed that four former US intelligence officials that were ‘familiar with the matter’ said that the Hunter Biden emails and images published by the New Your Post are part of an influence operation by Russian intelligence. In the second article, she repeated the same claim and added that the materials are not being published by Twitter and Facebook because they violated their “hacked materials policy”.

Ignoring for a second the unfounded claim that these documents were obtained by Russian intelligence when they hacked Burisma. Coleman’s allegations about the inability to authenticate the emails and that the images are fabricated seem legitimate…that is, until you evaluate her credentials to make these statements, her articles, and her sources. Running Coleman through various analytics shows the following:

  1. She is a new hire at The Hill. According to her resume and bio, she has no commercial writing experience beyond a few fluffy internships.
  2. She lifted the articles from an NBC News piece by Ken Dilanian (the prince of impeachment) and a WaPo piece written by Ellen Nakashima (the queen of Russian collusion).
  3. She was instructed by her editor to publish the piece ‘as is’ with no independent verification of sources or their claims.
  4. The pieces were published by The Hill to help ‘amplify’ Dilanian’s NBC and Nakashima’s WaPo articles.
  5. All of Coleman’s, Dilanian’s, and Nakashima’s work is completely circular. None of these articles have even one substantiated piece of evidence.

 Justin Coleman LinkedIn Justin Coleman Resume
Image 1: The illustrious journalistic credentials of the highly trustworthy Justine Coleman

What about Justine Coleman’s expertise writing about national security and intelligence? Don’t bother looking for them, they are non existent. Her largest on-line footprint for original investigative work is her 8th grade science project. In this article, her ”Key to Awesomeness” is described as:

“Her science fair experiment was to determine how detergents, and the temperature of the water, affected stain removal.  “My experiment, basically, consisted of staining cotton pieces, washing them with different detergents and in different temperatures of water, and measuring the results,” said Justine.

To summarize it in a non-scientific language, she discovered that some of the stains came out, while others remained on the fabric, and that water temperature does, in fact, affect stain removal.

This basically concludes the listing of Justine Coleman’s professional qualifications to opine on any national security or intelligence issue or the authenticity of Hunter Biden’s images and emails.

Justine Coleman
Image 2
: Justine Coleman The national security and intelligence expert reporter who also discovered that water temperature and detergent type effects stain removal

Justine Coleman Student
Video 1
: October 2019, the George Washington University’s School of Media journalism student Justine Coleman expressing her disbelief that something that she wrote was worthy of publication by WaPo

Clearly, Coleman is somebody’s worn out sock puppet. It didn’t take much to figure out that Ellen Nakashima was the brain behind this little manipulative enterprise. So what’s the deal with Nakashima? If you are not familiar with this journalistic seraph, she is the reigning queen of the Russian DNC hack narrative. In May-June 2016, she actively colluded with Crowdstrike and the DNC’s senior leadership to develop the Russian source of the DNC hack claim. She then published that story on June 14, 2016. Then as now, she argued that the damaging DNC emails (the ones that describe how the DNC torpedoed Bernie Sanders) couldn’t be authenticated. On December 22, 2016, Nakashima again knowingly published and pimped another false article that promoted the Crowdstrike debunked claim that the Russians hacked the Ukrainian artillery using the same techniques they allegedly used on the DNC. 

What about the identify of the four anonymous former US intelligence officials that provided Nakashima with this information? It turns out that they are not anonymous at all. Just like the four blind mice, they are mere literary devices, they don’t exist! As with the DNC hack fiction, Nakashima completely made them up.

Bottom line is that the Hunter Biden images published by the New York Post have already been proven authentic. The same applies to his video, images, texts, emails, and other digital content that came from his laptop.

References and Sources
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification Hunter Biden Laptop Images Are Authentic – Forensic evaluation of two of Hunter Biden’s images
Who Done it?  – A deep dive into the alleged DNC email hack
The 4 Most Damaging Emails From the DNC WikiLeaks Dump

A Sampling from Ellen Nakashima’s Russian Collusion Repertoire
White House was warned Giuliani was target of Russian intelligence operation to feed misinformation to Trump – Oct 15, 2020

Microsoft seeks to disrupt Russian criminal botnet it fears could seek to sow confusion in the presidential election – Oct 12, 2020

Russia trying to stoke societal tensions and white supremacy is the most lethal threat to the United States, new DHS report says  – Oct 6, 2020

Mueller report highlights scope of election security challenge – April 20, 2019

Through email leaks and propaganda, Russians sought to elect Trump – April 18, 2019

Copyright 2020 Yaacov Apelbaum, All Rights Reserved.

Hunter Biden Laptop Images Are Authentic

Authentic

The following composite shows the results of a image authentication and evaluation tests performed on two images from the ‘Hunter Biden laptop’ collection. The Biden campaign and various MSM apologists claims that they are fakes. The results of the image analysis beg to differ:

  1. The two images match Hunter Biden on face recognition within a 98% certainty (using a validated image as the reference) 
  2. The object in Hunter Biden’s mouth matched a glass crack pipe within a 93% certainty 
  3. Both images came back as negative on a wide range of tampering and deepfake manipulations

Conclusion, these are authentic images within a probability >90%.

Hunter Biden Laptop Images
Image 1:
Authentication and validation of two images from the ‘Hunter Biden laptop’ collection

If you are not getting the relevance of Vadym Pozharskyi, the top Burisma adviser emailing Hunter asking for “advice on how you could use your influence”, the following composite may be of some help. Seen below is Vadym Pozharskyi in situ at an Atlantic Council event with former senior state department officials in the Obama administration including: Evelyn Farkas, Ambassador John Herbst, and Ambassador Roman Popadiuk. All hard at work unselfishly promoting the interests of Burisma. Why do you ask?  Because they are just nice like that.

AC John Herbst and Farkas

References and Sources
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification

Sampling of the Tests Performed on Imagery
Based AI based face recognition and deepfake detection. I’ve also performed a battery of forensic image analysis tests that included functions such as:

Double Quantization – These types of inconsistencies occur when a foreign object is inserted in a JPEG image. When the new image is saved, the untampered part of the image will have been compressed twice, while the inserted region only once. In this case, the tampered area should appear red while the rest of the image blue. If other colors are present (green, yellow) then no conclusion can be made.

Error Level Analysis –  These types of inconsistencies are produced by recompressing the image as a JPEG of quality 75 and subtracting the new image from the old. The resulting image of differences is then enhanced and displayed. Areas of interest are those with higher values than other similar parts of the image. Only similar regions should be compared, i.e. edges should be compared to edges, textures to textures, and uniform regions to uniform regions. Color discrepancies (commonly blue regions) are also generally suspicious.

Median Noise Residuals – These type of inconsistencies are based on isolating the almost-invisible image noise through median filtering. When interpreting the results, areas of interest are those that return higher (i.e. brighter) values than other similar parts of the image. Only similar regions are compared, i.e. edges are compared to edges, textures to textures, and uniform regions to uniform regions.

Compression anomalies 1 – JPEG compression operates in an 8-by-8 grid, which is near-invisible but detectable. Adding or moving an object on an image may locally disrupt this grid. The GRIDS algorithm seeks such discrepancies, and highlights them locally. The algorithm produces local red/orange “blobs” where it detects grid discrepancies. Generally, the GRIDS algorithm is less distracted by textures in the image, and focuses on grid disturbances.

Compression anomalies 2 – JPEG compression operates in an 8-by-8 grid, which is near-invisible but detectable. Adding or moving an object on an image may locally disrupt this grid. The GRIDS-Inverse algorithm is complementary to GRIDS in seeking such discrepancies. The algorithm produces local blue “blobs” where it detects grid discrepancies. Generally, the GRIDS algorithm is less distracted by textures in the image, and focuses on grid disturbances. However, it should mostly be interpreted in combination with other algorithm outputs that highlight the same regions.

Compression anomalies 3 – JPEG compression operates in an 8-by-8 grid, which is near-invisible but detectable. Adding or moving an object on an image may locally disrupt this grid. The BLOCK algorithm detects the image grid and looks for local discrepancies. Any coherent region with different color to its surroundings may correspond to tampering, although reds and yellows against a blue background are the most typical indication of tampering.

Compression anomalies 4 – The JPEG Ghosts algorithm is based on recompressing the image in multiple different qualities and subtracting each of them from the original. The resulting difference images are post-processed to highlight regions that stand out and are likely to originate from a different JPEG image. Then, the images most likely to contain interesting findings are selected (i.e. those that feature localized inconsistencies). Consistent yellow regions against a blue background may correspond to traces of tampering, especially if they do not correspond to edges, but to entire regions.

Noise anomalies – Each image carries invisible, high-frequency noise that is the result of the capturing process as well as the compression. The Discrete Wavelet Noise algorithm filters the image and calculates the local noise distribution at each part of the image. Regions that differ from the rest of the image are highlighted in strong red, and are likely to originate from other images.

Copyright 2020 Yaacov Apelbaum, All Rights Reserved.

Murder for Ratings

Stop media corruption

“The righteous man perishes, and no one lays it to heart; devout men are taken away, while no one understands… But you, draw near, sons of the sorceress, offspring of the adulterer and the loose woman. Whom are you mocking? Against whom do you open your mouth wide and stick out your tongue? Are you not children of transgression, the offspring of deceit, you who burn with lust among the oaks, under every green tree, who slaughter your children in the valleys, under the clefts of the rocks?”  Isaiah 57:1-21

Another public gathering and another Antifa-BLM-Green Alliance murder. It turns out that what appears to the naked eye in the edited news product as random violence are in fact carefully orchestrated progressive media events. In the case of the Denver murder this week, it shows clear evidence of a coordination between media outlets and well known Antifa-BLM-PSL agitators. As can be seen from the composites below, a professional agitator, named Jeremiah Elliott, baited and assaulted multiple peaceful demonstrators while his Denver Post camera wing lady, Helen Richards, was busy capturing the fictitious ‘right wing extremists’ in action.

This agitprop campaign joined by Zack Newman, a Denver 9News produce, and it was clearly aimed at generating progressive propaganda. Unfortunately, just as in any revolutionary activity, the business of manufacturing violent news is riddled with potential casualties. This event was no exception. Richards’ and Newman’s little Pulitzer prize initiative ended abruptly when Matthew Dolloff, another Antifa-BLM-Green activist and Zack Newman’s paid muscle, murdered Lee Keltner, all while Newman watched on and Richards captured the murder on her camera a few feet away.

Jeremiah Elliott Denver Antifa Orgenizer
Image 1:  Sampling of the coordinated media activity between Jeremiah Elliott, a violent Denver  Antifa-BLM-PSL activist, and his wing woman, Denver Post photographer Helen Richards. During Elliott’s multiple assaults on peaceful demonstrators, Richards was always right next to him capturing the action

Helen Richardson Crisis Photographer
Image 2: Helen Richardson, The Denver Post’s ‘crisis photographer’ in action and Matt Dolloff, the Denver NBC-affiliated 9News hired muscle staging a scene for the 9News producer Zack Newman.

Matthew Dolloff political activity
Image 3: The political footprint of Matt Dolloff includes anti-Trump, anti-Israel, pro-Islamist, anti-police, and anti-US military posts and activity

Newman Dolloff Elliott Keltner
Image 4
: Zack Newman from 9News, his muscle, Matt Dolloff, and Jeremiah Elliott, the Antifa agitator, stalking their victim Lee Keltner (image was enhanced and reconstructed from the original by Richard Randall)

Jeremiah Elliott Fight
Video 1
: February 17, 2020,  Jeremiah Elliott assaulting an individual at a Bernie Sanders speech 

Jeremiah Elliott Social Network
Image 5:
Jeremiah Elliott Antifa network includes practicing Satanists and Wiccans

Jeremiah Elliott BLM FTP Event
Image 6
: July-August 2020, Jeremiah Elliott leading BLM Antifa riots and attacks against the police in Aurora Colorado

References and Sources
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification

Dolloff Warrant
Image 7: The affidavit and arrest warrant for Matthew Doloff [sic]

Copyright 2020 Yaacov Apelbaum, All Rights Reserved.

Oops He Did it Again

Steve Scully Stolen Twitter Cookies

Evaluating Steve Scully’s Twitter melodrama and hacking claim, one can’t but recall the immortal words of the 4th century Roman poet Brittania Spearus. In her lyric masterpiece “Oops!…I Did It Again” she wrote:

Yeah yeah yeah yeah yeah
Yeah yeah yeah yeah yeah yeah

You see my problem is this
I’m dreaming away
Wishing that heroes, they truly exist
I cry, watching the days
Can’t you see I’m a fool in so many ways
But to lose all my senses
That is just so typically me
Oh baby, oh

Yes, it does seem that life imitates art and Scully, just as in the poem, suffers from multiple reoccurring problems. Beyond his chronic narcissism and pathological dishonesty, he:

  1. Doesn’t understand the fine nuances of Twitter’s DMs vs. public posts
  2. Has an established pattern of posting inflammatory content and then attributing it to hackers
  3. Fails to grasp even the basics of what hacking is and how it’s done
  4. doesn’t understand that each tweet is traceable to the device posting it: the device’s IP address, it’s carrier, its MAC address, its IMEI and MEID #, and its phone number

Steve Scully Narcissus
Image 1: Typical social media comments on Steve Scully’s postings: “What are you eating? You’re looking younger by the minute.”, “He doesn’t age.”, “Looking sharp”, “You’re so handsome.”, “Dorian Gray!”

Scully’s assertion that his Twitter account was hacked doesn’t jibe with any of the evidence. For someone else to have tweeted from his phone would have been exceedingly difficult because such an exploit would have kicked him off his device and he’d likely notice it. Furthermore, to hack his phone and control it remotely would require significant resources, skills, and risk, and it would be easy to trace. The attacker would first have to bypass the device login security, gain full interactive control over the phone, launch the Twitter app, log in, compose the message, and tweet it.

Why go through all of this trouble when it’s faster/safer to just post the tweet from the alleged attacker’s own device? In typical phone hacks, the attackers look to conduct surveillance on the device (voice/video) and/or retrieve files and information such as an address book, images, and texts. Hence, a hacker taking over Scully’s device for the sole purpose of an ‘ambiguous’ tweet is by far the poorest return on hacking investment in recorded history. 

Steve Scully false hacking claim
Image 2
: Steve Scully’s ongoing 8 year Twitter hacking victim melodrama

Scully’s past pattern of behavior is consistent with a few other Twitter ‘work accidents’ and his excuses of having been hacked. Twice before, in 2012 and 2013, Scully claimed that his Twitter account was broken into; each incident occurred after he posted ‘regrettable’ tweets.

The fact that he deleted his Twitter account, then reactivated it, then went private, then deleted the post in question are also strong indicators that Scully is, as Brittania Spearus observed in her poem is a “a fool in so many ways”.

If Scully really wanted to, he could quickly put this debate to rest by asking Twitter to publish the event logs for his account activity. But he won’t, because these logs will unequivocally show that the source IP addresses, device type, and date/time of the logins to his Twitter account matched his iPhone. The cell phone logs in turn, will further validate that he was using his iPhone before during, and after the post was tweeted.

For those who are still trying to figure out if Scully is an unbiased reporter, a quick examination of his linkages shows that he is connected professionally and socially to a large number of hard core anti-Trumpers. One such friend is Mark Zaid, the attorney for Eric Ciaramella from the Ukrainian impeachment drama.

References and Sources
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification

*** Update 10/15/2020 ***

C-SPAN’s Scully on leave admitting lying about Trump tweet, Twitter account being hacked

Scully said:

“…Out of frustration, I sent a brief tweet addressed to Anthony Scaramucci. The next morning when I saw that this tweet had created a controversy, I falsely claimed that my Twitter account had been hacked. These were both errors in judgment for which I am totally responsible. I apologize,”

Copyright 2020 Yaacov Apelbaum, All Rights Reserved.