• Cataphract
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    3 months ago

    what constitutes as hiding? Here is CNBC asking Biden about Hunter during the debate with Trump on Oct 22, 2020. From what I’ve read the main hurdle was Rudy Giuliani himself (link)

    the Wall Street Journal and Fox News — among the only news organizations that have been given access to key documents — found that the emails and other records don’t make that case. Leaving aside the many questions about their provenance, the materials offered no evidence that Joe Biden played any role in his son’s dealings in China, let alone profited from them, both news organizations concluded.

    The lack of major new revelations is perhaps the biggest reason the story has not gotten traction, but not the only one. Among others: Most mainstream news organizations, including NBC News, have not been granted access to the documents. NBC News asked by email, text, phone call and certified mail, and was ultimately denied.

    The first story about the Hunter Biden laptop appeared in the New York Post, a conservative tabloid. One of the bylines was that of a former producer for Fox News pundit Sean Hannity… The Times also reported that the Trump campaign initially shopped the story to the Wall Street Journal, hoping that a mainstream news organization would validate their assertions that the documents hinted at corruption.

    An NBC News correspondent asked Bobulinski for an interview and for copies of documents in his possession, but he declined. “All of your questions will be answered on Tucker Carlson tonight,” Bobulinski wrote on Oct. 27… NBC News has sought to obtain the documents on the alleged Hunter Biden laptop, but has been rebuffed. An NBC News correspondent sent a letter two weeks ago to Giuliani, seeking copies of the materials. His lawyer, Robert Costello, granted the correspondent the opportunity to review some Hunter Biden emails and other materials in person. The materials included copies of Hunter Biden identification documents that appeared to be genuine. But without taking possession of the copies, it was not possible to conduct the sort of forensic analysis that might help authenticate the emails and documents.

    I know it’s weird for twitter to take it down, but remember this was a time when they only allowed verified information.