The Follow-Up: The Rachinger Posts

In continuing from my previous post: The Rachinger Posts, the following post considers parts 8-11. The allegations effectively revolve around Slater and friends paying hackers to obtain information that can be subsequently used to embarrass opposition MP’s and force them to resign. 

In Part 8, [Information removed  as [person] has instructed his Lawyer to issue a letter denying Rachinger’s assertions  that (a) he was recently involved in illegal hacking and (b) that he is the Tomas involved in the online conversations with Rachinger. [Person] has requested the information be removed as he considers it defamatoy.] Desleigh Jameson (GM, Instra) co-ordinated Rachinger’s meeting with Lentino and the job offer to work with a person called “Tomas(?)”. The role was to be ambiguously called Tony’s Apprentice.

In Part 9, [information redacted for reason noted above]. He also claims that at this time, the identity of the Dirty Politics hacker – Rawshark was circulating in the Press Gallery. It was at this time that Rachinger tweeted “I am Rawshark” as a show of solidarity. Following this, the Instra connection died off, Jameson claims the role never existed and Rachinger receives no further contact.

It’s unclear why Instra shut him out.

Sidenote: Lentino, is the ex-Mega CEO who also spotted money for the Dotcom’s following the raid and asset freeze in January 2013. I am wondering if this will become relevant in later posts. Because there are some unanswered questions:

  • Was Lentino working with Dotcom against Slater
  • Was he working with Slater against Dotcom
  • Is all this purely coincidental
  • Did Lentino simply decide he didn’t want to work with Rachinger

FURTHER INFORMATION (Post publishing this post): (4/5/2015)

On the information above, it appears that Lentino was most likely working with Slater following a fall out with Dotcom. 

In Part 10, Rachinger alleges that in private conversations, Slater makes clear his dislike of Lynne Prentice, author at The Standard.

Weak evidence: It can probably be ascertained from public record that Slater hates Prentice. After all, The Standard and Whale Oil Beef Hooked blogs are polar opposites [left vs right] and it’s likely the authors behind both sites are too. However, unlike previous posts where Rachinger provides screenshots to confirm many of the views Slater held, in this case, he has not. That could be for various reasons. If the conversation were spoken it would have required Rachinger to have taken audio recordings or for there to be another witness. Why does it matter? It could provide evidence of motive.

FURTHER INFORMATION (Post publishing this post): (3/5/2015)

Rachinger then provides a screen grab and email header involving Slater, David Farrar, and Matthew Hooten. The subject of that email involves whether someone can extract information on the authors at The Standard without hacking. Rachinger (somewhat facetiously) posits why he as a hacker was sent that email.

In Part 11, Rachinger makes the unequivocal statement that he was approached by Slater and offered $5,000 to hack The Standard and leave a backdoor to the server for ongoing access.

He claims to have received a $1,000 down payment from Slater and has provided screenshots of his bank statement to support this claim. He states that he never carried out the attack on The Standard.

FURTHER INFORMATION (Post publishing this post): (3/5/2015) further confirmation that the hacking was to be funded. 

See also (4/5/2015)

Weak evidence: The evidence provided by Rachinger, that he was approached to hack The Standard is circumstantial i.e. his assertion that Slater dislikes Prentice, a forwarded email (involving Slater, Farrar and Hooten) identifying a potential interest in obtaining unauthorised information, a down payment from Slater, and Rachinger’s testimony

This allows us to draw strong inferences but is not conclusive proof.

One problem is that the evidence trail is inconsistent with the email trail of previous job offers involving both Slater and Rachinger. However, given the nature of the job, there is the question as to whether email is an appropriate communication platform when organising a hacking operation? However, one might assume Threema would be used given its high level encryption. So the question is why Rachinger does not provide direct evidence explicitly showing Slater soliciting his services for hacking and leaving a backdoor in the Standard system, or more precisely, does he have evidence to that conclusively proves this?

FURTHER INFORMATION (Post publishing this post): (3/5/2015)

Rachinger also alleges there were monetary incentives if the information achieved certain outcomes e.g. embarrassment or resignation of opposition MP’s. But he doesn’t provide evidence to substantiate that claim.

Rachinger claims that he was concerned about how ‘deep’ he was in the Whale Oil machine so he went to the Police and was interviewed and questioned without a Lawyer present. His devices were cloned for evidence and although the evidence sheet is not included in his post, he has made it available via his twitter:

He makes further allegations that Slater owns firearms and is connected to organised crime gangs and has powerful funders/backers.

It appears that Rachinger is ‘framing his case’ to illustrate how dangerous he believes Slater and friends to be. This is unsurprising if the allegations that he and his family have received death threats are true.

Weak evidence: Rachinger would probably need to furnish a copy of the firearms licensed to Slater to prove this claim, and. I doubt he has access to that information. Regarding the gang connection, in an earlier post, Rachinger provides a screen shot of a conversation that implies Slater is connected enough to know that the Headhunters gang assaulted Matt Blomfield due to monies Blomfield owed the gang.  This is not proof of Slater’s actual connection, since that information could come about via the kumara vine. It also is not evidence that this gang is somehow involved in the immediate issue. But the cumulative effect of that information does speak to the harm that Rachinger appears to believe that Slater through whomever his connections, is capable of inflicting.

FURTHER INFORMATION (Post publishing this post): (3/5/2015) on Slater’s admission to owning firearms. Additionally, apparently this is well known for readers of his blog and those who recall from the Dirty Politics book.

Conclusion

In conclusion, it appears that the Whale Oil machine continues to churn despite the revelations and media interest in Hager’s Dirty Politics. I don’t think that is exactly surprising to anyone. But just because it’s not surprising it’s also not an excuse to turn a blind eye either. That these operations allegedly involve the transfer of money and financial incentives to operatives to illegally extract information for corrupt political ends certainly adds a new and disturbing angle to this rancid behaviour. Additionally, the extent that the threats and operations sought to poison the blogosphere by targeting people behind the two largest left wing political blog sites in Aotearoa is also a real concern for democracy.  If it is true that Slater and friends will attempt to destroy any person and undermine every inch of democracy that threatens to expose the machine and disrupt their political agenda then we might want to consider the extent to which the claims made by Rachinger can be substantiated.

Note: It has been suggested to me that I tread very cautiously and very sceptically in dealing with the Rachinger posts. The purpose of writing these summaries was to identify the strengths and weaknesses of the claims made. The analysis is by no means perfect. But I am interested in what readers think, so feel free to leave a (non-abusive, non-threatening) comment.

The Hacker and All the PM’s Men continued:

Part 8: [link removed as requested by [Person] through his Lawyer]

Part 9: [link removed as requested by [Person] through his Lawyer]

Part 10: https://medium.com/@benrachinger/the-hacker-and-all-the-pms-men-part-ten-be7aa6d1839f

Part 11: https://medium.com/@benrachinger/the-hacker-and-all-the-pms-men-part-eleven-2f3322a0b22a

Advertisements

5 comments

  1. Well done on working your way through all this, it is not something I care to do as it just so complicated but I do wonder if Ben is as clever as he thinks he is it would be child’s play to fake this stuff

    On the whole you are very even handed in your conclusions

    A couple of points, a NZ firearms license doesn’t list the firearms owned but in reading Whaleblog Slater has owned at least a rifle and a shotgun, worth remembering that with his self proclaimed mental problems the faintest indication of threat would see them removed

    I also think like Ben, Slater overstates his ability to make change

    It is also worth remembering that when it comes to “Dirty Politics ” and hacking the two big hits ( Don Brash & Slater) have been against the Right to the benefit of Mr Hager and of course all of us
    So, well done and good work

    Liked by 1 person

  2. Pretty good summaries.

    It is starting to look to me like I should look at laying complaints under one or more of sections 66, possibly 70(2), 72, maybe 240, and 249,250,252 of the Crimes Act 1961 and amendments.

    It is pretty clear that Cameron Slater and some of his cohort have formed a criminal conspiracy to attack my computer systems. Despite basic law of criminal conspiracy having long been removed from our law books (with good reason), there are some pretty clear legal remedies against people having the intent to commit unlawful acts against others.

    Bearing in mind how useless the police tend to be in political cases when they don’t have John Key pushing them on in behalf of himself or his mates, I’d have to consider making this a private prosecution rather than going through the police.

    Liked by 1 person

Comments are closed.