Russian Hacking

Dmitry
Our little Q Tree has grown and the talents of various members continue to pleasantly surprise us all. Collecting and sharing info about the Mueller report, yesterday, as we have done so many times before, was a group effort. I’m asking for your help, again.
Within this thread, please DUMP everything you know about Crowdstrike, whether or not the Russians did hack the DNC/Podesta. The info I’ve added is long, technical, and includes many links. Take it in sections if needed, or disregard it altogether.

Since the release of the Mueller report, the DNC + MSM is attempting to establish a narrative. It goes something like this: Okay – So, Trump and his team did not specifically collude with Russia (or we don’t have a smoking gun that he did – but Adam Schiff has secret info), but Russia meddled in the election…. we (the legacy media) were right about it…. and so were our precious 17 intel agencies. If not for Russian meddling…. Hillary would have won. This “SPIN” will save the media’s credibility, DNC politicians, and the Deep State. 

For the following reasons, we cannot allow this narrative, “The Russians Swung the Election”, to survive.

  1. Such a narrative will continue to make our President appear as illegitimate.
  2. The narrative diminishes and demoralizes Trump supporters massive turnout and effort to get Trump elected…. and elected for 2020.
  3. Establishment of such a narrative allows the Obama team, FBI and other intel officials from the 17 agencies, to escape without questions or prosecution.
  4. If members of the old Obama team + MSM, can successfully sell, “Russians hacked”, then the premise for their investigation is legitimate in the eyes of the public – and the “institutions” remain protected. The Deep State blends back into the shadows and will not be deterred from acting again.
  5. The Special Counsel accepted the results of “17 Intel Agencies” and did not delve into an investigation of whether or not the findings of the intel agencies was valid.
  6. We’re being asked to accept, verbatim, Crowdstrike findings and frankly, we’re not sure they are true……. and neither is Crowdstrike. Their findings never rise above the word “possibility” of the Russians being the hackers.

 
Let’s try to create a Timeline: I’ll start off and plug in more details as others contribute.
June 12th, 2016Julian Assange announces he has Hillary emails.
June 14th, 2016: Crowdstrike announcement in WaPost about DNC hacks. (For those who pay WaPost for a subscription, in the search bar, please type in Washington Post, June 14 2016 Alperovitch, and the article will come up.) For those of us who do not pay for a WaPost subscription, synopsis found here: Link

“…..its forensic analysis of the DNC server had determined malware had been injected into the server — and it had been done by Russians. Not just any Russians, mind you, but agents of Vladimir Putin. Alperovitch and CrowdStrike’s Shawn Henry (a former FBI executive under Director Robert Mueller and President Obama) told the Post that their investigation revealed the DNC server had been hacked by the cyber-espionage groups known as “Fancy Bear,” allegedly associated with the Russian GRU (military intelligence) and “Cozy Bear,” allegedly associated with the FSB (the successor to the infamous Soviet KGB).”

June 15, 2016: Guccifer 2.0 published a single WordPress blog (Link herereinforcing the “Russian hacking” narrative. Details of Guccifer 2.0 statement and details can be found at a Snopes on June 17, 2016. Link: Snopes Link HereSnopes Link Here Guccifer 2.0 ALSO published a smattering of DNC emails he claimed were obtained in the hack. The Snopes link is RICH with detailed references and other links – also noting Shaun King, from NY Daily News, who immediately became interested and followed the Seth Rich story. 
June 21, 2016: By June 21, Guccifer 2.0 gave an interview with VOX, admitting he was Hungarian, not Russian, and released docs from Clinton Foundation on his WordPress Blog: Link Here
July 28, 2016: By now, the DNC convention is in full swing, and we’ve had over a month to investigate potential hacking. We get the following article from BBC: Link Here The BBC article is REVEALING because the “Doubts about Guccifer 2.0” section is almost identical to the report from 17 Intel Agencies we received in January of 2017, right before President Trump took office. Did Clapper and Brennan copy and paste?

Why are many sceptical about the identity of Guccifer 2.0?

For three main reasons:

  • Detailed analysis of the attack on the DNC by US security firm CrowdStrike suggests the organisation was actually penetrated twice – both times by hacking groups, dubbed Cozy Bear and Fancy Bear, known to have links to the Russian state. These groups have successfully penetrated US federal organisations in other hack attacks. (We later learn the logic of Crowdstrike assessment falls apart on this primary point. See below for theory on targeting software for D-30 Howitzers)
  • Forensic examination of metadata in copies of documents distributed by Guccifer 2.0 suggest they were edited on a machine set up for a Russian language user. (We later learn the same hardware is available in Brooklyn for about $14 – it’s a Russian language keyboard)
  • Technical information including IP addresses extracted from messages sent by Guccifer 2.0 to journalists show a link to the Russian cyber-underground – even though many of the conversations were routed through a French VPN firm. In the past, some of the same infrastructure was used to send junk spam on behalf of Russian crime groups. (Should we be surprised Guccifer 2.0 communicates with underground Russian cyber groups? Or that Russian cyber crime groups sent out spam? How is this proof the GRU or FSB, specifically connected to Putin, hacked Hillary, Podesta, or the DNC?) 

The BBC article (linked above) even concludes this is NOT proof of Russian hacking.

Does this prove that Russia is involved?

No. Attribution, the experts say, is always difficult. Translated, this means nobody knows who to blame. One of the first lessons that any competent hacker or hacktivist learns is how to cover their tracks and how to use proxies, encryption and other techniques to obscure who they are and from where they are operating.

January 3, 2017: Important article, examining issue from all aspects, from George Eliason, worth reading. Link here

How does Crowdstrike’s story part with reality? First is the admission that it is probably, maybe, could be Russia hacking the DNC.  “Intelligence agencies do not have specific intelligence showing officials in the Kremlin ‘directing’ the identified individuals to pass the Democratic emails to Wiki Leaks.”

The Intel Community Report on Russian Hacking, the JA Report

January 6, 2017: Two weeks before the inauguration of President Trump and at the same time President Elect Trump was shown part of the Discredited Dossier, the Intel Community (Obama’s IC) comes out with a “definitive” report on who hacked the DNC. Please follow the NYTimes link for the full 25 page report, Link here  Please read it. The IC Report on Russian hacking is 25 pages of boilerplate and obviously bad logic.
Pages 1-6 tell us why the Intel communities are spectacular and we should trust them. The IC will tell us what to think and their conclusions, but because of “sources and methods” cannot reveal any proof to the public. At the bottom of page 6, the report reveals they are relying on old methods, because we know how Kremlin works.
By Page 7, we get to the meat of the matter in “Key Judgements” = Undermine the public faith in the democratic process, hurt Hillary’s chances at election or her Presidency, because Russia concluded she was the likely winner. We are offered no proof of Russian preference for Hillary and at the bottom of page 7, we see the “Kremlin” targeted both campaigns with social media trolls. And here is the kicker, “High degree of confidence, the GRU used the persona of Guccifer 2.0 and DCLeaks to release US Victim data obtained in cyber operations publicly and in exclusives to media outlets and relayed material to Wikileaks.”    
Page 8: details an old story about Russians looking at publicly available information on voters in state and local boards, as if it’s somehow secret or related.
Page 11: FBI and CIA think Putin and Russia want to discredit Hillary and help Trump. NSA has “moderate confidence. It’s the first time we see the NSA break from the others. Here, on page 11, we see the weakest possible explanation for Putin preference of Trump over Hillary. Page 11 is a must see.   Because Putin “most likely” held a grudge against Hillary from 2011? Did a third grader write this report?  We see words like “probably” and “most likely”, which is a persuasive argument, not fact-based. We also see an argument from IC that Trump/Russia could work together on ISIS and welcomed more friendly relations. No proof, just poorly written persuasion.
Page 12: Accusation Russian intel gained access to DNC in July, 2015, and maintained access until June of 2016. Hard and fast accusation. Proof? Further, GRU “probably” began targeting both sides in March, 2016……. no proof, just speculation. Bottom of page, important, the report claims Guccifer 2.0 and DC Leaks info, as attributed to Russia, was publicly available…., info gleaned from various journalists, info not received as a result of anything the intel community did. .. except for an accusation DCLeaks published emails stolen by GRU in March, 2016 (page 13).
Page 13: Accusation the GRU fed information to Wikileaks (high confidence) but reasoning is weak – because the head of RT visited Assange at Ecuadorian Embassy? Or because RT and Sputnik are pro-Russia? Or more friendly to Trump and cooperation between USA and Russia?
Page 14: Or better yet, because RT/Sputnik noticed American media was often unfair to Trump? (page 14) And cast Trump’s victory as a win against globalism, an outsider unfairly targeted by establishment media…. versus Hillary…. islamic extremist, poor health, and corrupt. And the important point: Russia as the likely financier of, The IRA, Internet Research Agency, St Petersburg, group of internet trolls. By the time we got to the Mueller Report, “likely” became assumed fact — AND Mueller indicted them.
Page 15: History of Cold War = Russia bad. The effort to interfere in 2016 = “boldest yet”.
Page 16-22: Dramatic focus on RT America TV, which was allowed in 2012 into the US, had two shows the IC claimed sowed discord. I believe Mueller’s Special Counsel charged RT with FARA violation. Another show, anti Occupy Wall Street, more accusation of RT America being pro-Russian and claims of Putin/Kremlin tight control over RT. More details on RT Arabia. No discussion of Washington Post printing propaganda directly from China.
In summary, the IC Report on Russian Hacking of DNC/Hillary?/Podesta is alarmingly weak. We have one claim of entry to DNC in July, 2015-June, 2016, with no proof or public explanation. Did the Intel community make the assessment or did it come from Crowdstrike? We have an accusation of GRU entry of DNC in March, 2016, again, no explanation. Was it the IC or Crowdstrike? We KNOW the FBI never looked at the DNC servers. Finally, we see the IC relying on public reporting for an accusation against Guccifer 2.0 and DCLeaks. Pages 1-6 were boilerplate, pages 7-15 were, at most, 6th grade persuasive writing, and pages 16-22 were a copy and paste of someone’s report on RT TV in America.
The Intel Community Report does not leave the reader with a “high degree of confidence”, especially when we consider the TIMING of it’s release, 2 weeks before the inauguration of President Trump.

Crowdstrike + Cozy Bear and Fancy Bear + IISS

Among the many authoritative refutations of CrowdStrike claims are an early analysis by former top IBM executive Skip Folden, entitled “Non-Existent Foundation for Russian Hacking Charge”  — which has since been deleted from WordPress. In fact, one by one, MANY tech experts offering detailed analysis have had their articles removed or taken down. Odd, eh? Binney and other veterans also attacked the findings but have been ignored by both, Haspel and Pompeo at CIA. Binney’s “Memorandum for the President” can still be found here: Link to Binney Memorandum
In other groups, we closely followed the CrowdStrike story from the interview of Dmitri Alperovitch on PBS, December 22, 2016. Senators and Congressmen confirmed CrowdStrike as the originator of the Russian Hacking story. Let’s not forget, the DNC and Hillary were the ones who hired CrowdStrike, just as they hired Fusion GPS.
CrowdStrike based their theory of Russian hacking on, 1. the Russian keyboard, 2. the targeting software for Ukrainian D-30 Howitzers, and 3. Historical behavior of Russia.
The following is a personal post I made on March 23, 2017, and thus, PURE opinion. Several of the links included are no longer active, yet, I described the material within the links. It may help give us all a closer look at CrowdStrike.
March 23, 2017: Daughn’s personal opinion post – NOT legacy media.
On March 22, I found an article from VOA and others and summed up the article in a post as follows: 
In a nutshell, Crowdstrike asserts that Ukrainian D-30 howitzers had an “app” that was hacked by the Russians during the Crimea incursion. Crowdstrike points to a report by IISS (English think tank which counts the sizes of armies and armaments available to various countries around the world) which claims significant loss of D-30 howitzers as evidence the Russians were successful in targeting this artillery.
But CrowdStrike’s argument falls apart, here:
1. IISS was never contacted about it’s report or conclusions and the creator of the “app” was never contacted by Crowdstrike. IISS claims they were reordering the estimates of global arms forces and were, in fact, making a correction for howitzer counts two years prior to the Crimea incursion.
2. Sherstyuk, maker of the Ukrainian military app in question, called the company’s report “delusional” in a Facebook post. CrowdStrike never contacted him before or after its report was published, he told VOA.
3. Jeffrey Carr, a cyberwarfare consultant who has lectured at the U.S. Army War College, the Defense Intelligence Agency, and other government agencies calls the evidence “flimsy” and goes further ….. “He (Carr) told VOA in an interview that CrowdStrike mistakenly assumed that the X-Agent malware employed in the hacks was a reliable fingerprint for Russian actors.
“We now know that’s false,” he said, “and that the source code has been obtained by others outside of Russia.””
4. Pavlo Narozhny, a technical adviser to Ukraine’s military, told VOA that while it was theoretically possible the howitzer app could have been compromised, any infection would have been spotted. “I personally know hundreds of gunmen in the war zone,” Narozhny told VOA in December. “None of them told me of D-30 losses caused by hacking or any other reason.”
Remember, CrowdStrike is the ONLY ONE who actually analyzed the DNC servers. FBI access to the physical servers (for examination) was denied. Strangely, instead of merely performing analysis for the DNC and issuing a report, the co-founder of Crowdstrike ALSO made appearances and gave interviews to PUSH the “Russian hacking” story.
That’s odd.
Why would Dmitri Alperovitch, co-founder of Crowdstrike, Russian ex-pat and senior fellow at the Atlantic Council policy research center in Washington, give interviews to the Washington Post and appear on PBS News Hour on December 22 of 2016, ONE WEEK prior to Obama’s actions against 35 Russian diplomats? 
It gets better. 
During these interviews, Alperovitch speculates the only person/entity who would gain from Russian hacking of an app to control D-30 Ukrainian howitzers AND the DNC would have been Vladimir Putin.
No kidding.
Understand, the world-wide media had been consumed by a story of Russian hacking and the only entity with the servers is Crowdstrike. NO ONE has questioned their results. Why?
Crowdstrike refused to answer questions from VOA and cancelled a March 15th interview. Why?
CrowdStrike said it was long familiar with the methods used by Fancy Bear and another group with ties to Russian intelligence nicknamed Cozy Bear. Soon after, U.S. cybersecurity firms Fidelis and Mandiant endorsed CrowdStrike’s conclusions. THUS, the media claims SEVERAL experts in cyber-security have confirmed the results of Crowdstrike.
Their spokesperson, spokeswoman Ilina Dimitrova defended the company’s conclusions. “It is indisputable that the [Ukraine artillery] app has been hacked by Fancy Bear malware,” Dimitrova wrote. “We have published the indicators to it, and they have been confirmed by others in the cybersecurity community.” Do you see what happened there?
To claim the D-30 howitzers “app” was hacked, with no other corroborating evidence, is a fundamentally invalid claim on its surface.
To tie an alleged D-30 howitzer hack (unproven and now contested) to an obscure report of worldwide armament loss (when you never called the guy who made the report on howitzer loss for verification) is tortured logic. To claim these two events are related….. and furthermore tied to a hack at the DNC………. in a conspiracy by Vladimir Putin……… is a bridge too far.
May 22, 2017: Daughn’s Personal post/opinion, NOT legacy media. This is an update and a compilation of new info about CrowdStrike, their walk-back of the D-30 software targeting claim, and twisted logic from their spox, who claimed – paraphrasing, even though they were wrong, the 17 Intel Agencies back up their findings….. but what if the IC was depending on the info from CrowdStrike (as is clearly stated Link here )to reach their conclusions? 
Bombshell: 
Yep, the whole DNC/MSM Russian hacking story is unraveling before our eyes.
CrowdStrike, the ONLY company allowed access to the DNC servers and the ONLY ones, with any authority, to claim “Russia hacked the DNC”, has now changed its original report, questioning their theory about the Ukrainian howitzers. 
Well, if the theory about the app hacking of Ukrainian howitzers is no longer valid —– then Russian hacking of DNC is no longer valid.
PLUS – Evelyn Farkas, Obama holdover, went on MSNBC and actually admitted their were targeting Trump AND leaking. OMG. She is either stupid, the scapegoat, or it’s a headfake.
Are you sitting down?
Evelyn Farkas is a high ranking “fellow” with The Atlantic Council. And guess who else is a senior fellow of the Atlantic Council? Dmitri Alperovitch – the founder and CTO of CrowdStrike! Alperovitch is head of the Atlantic Council’s “Cyber Statecraft Initiative”. The Atlantic Council is funded in part by the US State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk. The Atlantic Council has been among the loudest voices calling for a new Cold War with Russia.
Hmmmmmm
Here is an overview from Treehouse which includes the Varkas interview/confession of conspiracy on MSNBC. 
https://theconservativetreehouse.com/…/oh-…/comment-page-4/…
Here is the link to the article talking about CrowdStrike’s changing theory – walk back of claims. 
http://www.voanews.com/a/cyber-firm-rewrites-p…/3781411.html
Here is the link to the original VOA article from March 22 questioning CrowdStrike’s theory and claims plus my summation below:http://www.voanews.com/a/crowdstrike-comey-rus…/3776067.html
Remember the DNC did NOT allow the FBI access to the DNC servers, despite many requests at different levels of authority.
One more important tidbit. We always try to look for coordination between the DNC/Hillary/Deep State/Obama holdovers and the news media. We found one primary link which fed the Crowdstrike information and narrative into NBC: Link Here

Crowdstrike insists that it’s Russia behind both Clinton’s and the Ukrainian losses. NBC carried the story because one of the partners in Crowdstrike is also a consultant for NBC. According to NBC the story reads like this.”The company, Crowdstrike, was hired by the DNC to investigate the hack and issued a report publicly attributing it to Russian intelligence. One of Crowdstrike’s senior executives is Shawn Henry, a former senior FBI official who consults for NBC News.

This represents everything I have for CrowdStrike and Russian Hacking of DNC/Hillary?/Podesta. PLEASE, add to it at will. ALL info is welcome. We need to flush out the theory and help our President.
End ~~~~ for now.

0 0 votes
Article Rating
Subscribe
Notify of
guest
70 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Gudthots

Timing is everything…comment image

rayzorbak

New Drop:
3316
New: Title TBD
Q
!!mG7VJxZNCI
19 Apr 2019 – 2:41:40 PM
https://radio.foxnews.com/2019/04/19/john-dowd-rod-rosenstein-has-to-answer-for-appointing-robert-mueller-as-special-council

[Pg 11] Previously CLAS ‘scope’ > [RR] to [MUELLER]
The scope memo [highlighted w/in Mueller report] confirms the ‘dossier’ was the ‘tool’ used by [RR] to justify SC and was the primary ‘vehicle’ to which [RR] tasked MUELLER.
If the dossier was known to be unverified and fake, how then was an investigation started to begin with?
At what point did MUELLER determine there was no collusion?
[18-months ago?]
Was the investigation kept ongoing as a ‘talking point’ to rig the midterm elections?
Was the investigation kept ongoing to retain the ‘BLOCKADE’ to essentially restrict POTUS from unmasking and informing the public as to the TRUTH about what really happened?
Was the investigation kept ongoing to PROTECT THOSE WHO ‘KNOWINGLY’ COMMITTED TREASON/SEDITION?
NO BLOCKADE = GAME OVER
Q

pgroup

Russia is NOT involved. Russia did NOT try to hack any political orgs’ servers. Russia cannot deny it was involved because to do so would necessarily reveal sources and methods of the Russian Federation, thereby giving a serious advantage to other states’ spy agencies.
Do not forget the ‘laying on of hands’ on The Orb in Saudi Arabia. DJT announced to the world that the real intel is routed through another source than Five Eyes. In essence, Five Eyes has been put in a sandbox (nerds will recognize the reference) and they have no idea how to get out or even if they are making progress escaping the sandbox. It looks so real to them AND they are still doing what they’ve always done.
“So maybe we’re not in a sandbox at all.” Comforting words, like reading bedtime stories to each other. Go to sleep now, little ones.
Meanwhile EVERYTHING of any value to spy agencies of the Orb member countries goes through the Orb network which is completely isolated from the Deep State. Sort of like a VPN.
Putin may or may not be a silent limited partner in the Orb. I do know that his spies are sophisticated enough to recognize that DJT is planting false info all over the place, including into America’s spy agencies. Putin is a former spook and I guarantee that he has read Art of the Deal and Art of War. Flynn was one of the best when he was working and I would be shocked that he doesn’t have back channels throughout the world. Same with Rogers.
DJT is going to fling a dump truck of pig poo into a wind tunnel while the slugs are in there. Pass the popcorn.

ozzytrumpster

OT. Anonymous conservative on the site mentioned in prev drop is important. Even if you discount the surveillance of the google car as paranoia. What is happening at that site?

Sylvia Avery

I can’t decipher your comment. What site? Who is anonymous conservative? A twittererererer that I should know? What google car?

ozzytrumpster

Anonymous conservative is a person who writes on the net. The q posts the other day may not refer to football but an address. There are some suspicious circumstances about this address which tie into another q post. Watch the water. If you search anonymous conservative you should find his site. He wrote a book called evolutionary psychology or rK. He sounds very much like our wolf re mk and surveillance. He pulls lots of interesting stuff from lots of places

Sylvia Avery

Thanks!

ozzytrumpster

Hope you found him. Interesting stuff again this am. Similar format to fleps news roundups with odd nuggets from all over. Need to step back to see patterns sometimes

pgroup

WordPress is sodomizing me again. Grrrrrrrrrr
Russia is NOT involved. Russia did NOT try to hack any political orgs’ servers. Russia cannot deny it was involved because to do so would necessarily reveal sources and methods of the Russian Federation, thereby giving a serious advantage to other states’ spy agencies.
Do not forget the ‘laying on of hands’ on The Orb in Saudi Arabia. DJT announced to the world that the real intel is routed through another source than Five Eyes. In essence, Five Eyes has been put in a sandbox (nerds will recognize the reference) and they have no idea how to get out or even if they are making progress escaping the sandbox. It looks so real to them AND they are still doing what they’ve always done.
“So maybe we’re not in a sandbox at all.” Comforting words, like reading bedtime stories to each other. Go to sleep now, little ones.
Meanwhile EVERYTHING of any value to spy agencies of the Orb member countries goes through the Orb network which is completely isolated from the Deep State. Sort of like a VPN.
Putin may or may not be a silent limited partner in the Orb. I do know that his spies are sophisticated enough to recognize that DJT is planting false info all over the place, including into America’s spy agencies. Putin is a former spook and I guarantee that he has read Art of the Deal and Art of War. Flynn was one of the best when he was working and I would be shocked that he doesn’t have back channels throughout the world. Same with Rogers.
DJT is going to fling a dump truck of pig poo into a wind tunnel while the slugs are in there. Pass the popcorn.

GA/FL

IMPORTANT QUESTIONS:
1. What is ‘first mention’ of Russian hacking, collusion, interference, etc. of US election?
A. Before Election Day
B. After Election Day during Transition or
C. After Inauguration
2. What were first FISA application dates?
3. When did Spying (aka Surveillance) on Trump and/or his family, staff, campaign, transition team begin?
IF THIS CAN BE DETERMINED, ONE WOULD LIKELY FIND THAT ØBAMA and his Administration/Agencies were spying on Trump and the Trump organization right after Øbama took office – out of vengeance, spite, anger, pettiness (personality traits of Ø, Hillary, Holder and Jarrett) because of the birth certificate issue.
Øbama was in love with warrantless surveillance and changed the law twice (2013 and 2017) in order to facilitate warrantless surveillance.
85% of Øbama administration warrantless surveillance was illegal: P 82 – https://www.dni.gov/files/documents/icotr/51117/2016_Cert_FISC_Memo_Opin_Order_Apr_2017.pdf
Ø surveilled/spied on anyone and everyone he wanted!
The Press – https://www.washingtonpost.com/blogs/right-turn/wp/2013/05/20/shredding-the-constitution-obamas-attack-on-the-associated-press/?utm_term=.132867cdc4a7
Congress – https://www.redstate.com/streiff/2017/03/05/flashback.-remember-obama-used-nsa-spy-congress/
During the 2015-16 campaign, Ø used his Executive branch agencies to (try to) help Hillary win and after the election to try to remove President Trump and thus extend his own power and agenda past his lawful term. Hence the house down the street from the White House.
Obama spied on Trump campaign – https://threadreaderapp.com/thread/999878016766361600.html
Obama’s Illegal warrantless surveillance was not limited to the Trump campaign, or the press, or congress.
There was a dramatic rise in warrantless surveillance during the O years – so much that it alarmed even the leftist ACLU:comment image
Remember – Øbama/Hillary/DHS hacked state of Georgia election –
https://www.zerohedge.com/news/2016-12-14/georgia-confirms-homeland-security-attempted-hack-election-database-10-separate-time
http://hardnoxandfriends.com/2018/02/08/russia-er-obama-hacked-state-elections-in-2016/
I’m not sure there ever was any actual Russian Hacking.

GA/FL

Remember the supposed hacking of the DNC servers that were never examined?
Remember the 90% negative media coverage of Donald Trump?
Remember the social media (Twitter, Google, etc.) negative bias against Donald Trump?
Remember how Holder sued businesses that did not hire illegals/non-citizens?
Remember how Holder sued states for requiring Voter Photo-IDs?
Remember how leftist agitators and protestors raise heck everywhere because of poor little illegals, but ignore homeless veterans and inner city crime??
Remember how leftists scream about open borders but ignore illegals crime, drugs, awful driving accidents???
Remember how leftists give sanctuary, benefits, housing, medical care, free college tuition to illegals and their kids -but poor working families – no dice???? Even inner city black kids who want help to go to college get less help.
Remember how Democrats voted against repealing Unaffordable Obamacare, tax reductions, and other helpful changes for middle class, unemployed and seniors?????
Remember how the Democrats showed their hineys during President Trump’s State of the Union address and would not even stand for new manufacturing jobs and record low black unemployment??????????
Remember how the Democrats concocted the PP Dossier and the Russian Collusion garbage and the Mueller (Democrat) team to try to remove, impeach our President?
Remember the attempted smears and attacks on Brett Kavanaugh and his family?
Remember the (so far) 567+ acts of harrassment, threats and violence against Trump, his cabinet, staff and supporters by Democrats?
https://www.breitbart.com/big-journalism/2018/07/05/rap-sheet-acts-of-media-approved-violence-and-harassment-against-trump-supporters/
Review of the pre-2016 bias against Donald Trump and the Mueller indictment of Russians without proof of any kind:
https://www.americanthinker.com/articles/2018/07/walk_a_mile_in_trumps_shoes.html
The Mueller report DID SAY:
No collusion of any American with Russia.
No vote change can be proved to be caused by foreign influence, including Russia.
In a sane world, we all know Øbama, the Clintons, Holder, Lynch, Lerner and a whole bunch more would be in jail, if not executed for sedition and treason.

GA/FL

You found it!

Gail Combs

Actually it is CHINA who has been doing most of the hacking. Notice how the Russia Russia Russia chant has HIDDEN the much greater problem of Chinese Hacking not to mention the AWAN BROTHERS Hacking.
As Wolfie says, the Elite LOVE multi-use tools.

grandmaintexas

This. 👆👆👆

GA/FL

Hacking is also going strong in Africa, Malaysia, Indonesia and the Middle Eastern countries.

Covadonga

Especially China-ally Iran.

Gudthots

Excellent.

ozzytrumpster

Gotta start asking the right fucking questions. H/t rusty Cohn

michaelh

Whoa… Daughn it’s Michael… I just got here from the FUTURE…
We’re all talking about this again!!!
https://wqth.wordpress.com/2019/10/19/what-is-crowdstrike-gate/

GA/FL
GA/FL

That comment disappeared!

Gail Combs

GA/FL,
My comment disappeared too.
I guess we are over the target!

grandmaintexas

I can’t get the link to go work. Clicking on it does nothing.

GA/FL

That’s because something triggered QTH moderation or WP naughty list.

grandmaintexas

Ah. Aha. I know nothing about who is behind WP, but I had the same thing happen to me the other night when I tried to link to an article from Drudge about that Bronfman sex cult.

GA/FL

We should put an asterisk at the beginning of the link so it won’t go live and maybe they won’t catch it.

grandmaintexas

I will try that next time.

Wolf Moon | Threat to Demonocracy

Spam engine! I can give a limit of 9 links OK, but Akismet may strike on a lower number of links, or a long post. Long posts with lots of links get nailed as spam.

GA/FL

It was both – long and linky! :8-]

ozzytrumpster

A VERY NAUGHTY WORD CAN DO THAT

Wolf Moon | Threat to Demonocracy

It was Akismet – the “spam engine” – over which I have no control.

Gudthots

I thought you were our spam engine?

Wolf Moon | Threat to Demonocracy

Here is how moderation works, for those who are interested.
There are 4 bins – “Approved”, “Pending” (Moderation), “Spam” and “Trash”.
New posters go straight to “Pending” until I approve ONE POST. After that they go straight to “Approved”. Their prior posts must be individually approved.
Posts that contain the magic phrase on the Contact page go into “Pending”. This does not change a person’s status.
Note that I will not approve a post that gets people BANNED at CTH, so if your first post talks about Sundance, there is no way I can approve it. I refuse to edit posts, too, except to fix spelling occasionally, or remove material like doxxing or something requested by a poster.
I do NOT have anything in the moderation list (a list of character strings that trigger moderation) except the magic phrase. There are no cuss words, etc.
Banned posters get their critical data stuck into the TRASH LIST. After that, their posts go straight into the “Trash”. We have only one banned poster, who may get readmitted later, but for reasons I can’t divulge yet, we can take no chances here. It’s #WAR.
What is SPAM is determined by a company product that WordPress uses. That company is Akismet. Their spam engine completely eliminates most spam, but it lets some slip through into the “Spam” bucket for me to manually check. That is where MOST memes and images from the chans go, if they do not post. Also long posts of a political nature with lots of links are assumed to be spam many times by Akismet software, even for established posters. Gail, GA/FL, and some others get their long posts sent to spam very frequently. FG&C and others get their images sent to spam. It is ALL Akismet’s doing.
I have to go in and empty the buckets by hand. Some stuff is real spam, some is not.
It’s about 50:50. Some moderations (“Pending”) are private messages, rarely, thank goodness. Most are just WordPress thinking things need to be checked, and it’s pretty rare.
A lot of times, a post in “Pending” (moderation) is just a misspelling of the user’s name, and WordPress is generous and assumes it’s a new poster on the same email address, so it treats the user as a new poster for me to approve. I tend to FIX THE NAME and approve the post.
As I always say, I prefer dealings out in the open. Avoid private messages unless it’s really needed.
SOME moderations are WordPress AI’s decision – NOT the moderation list (which is just the magic phrase, b/c muh free speech). Also, I believe certain really nasty cusswords can go into ANY bucket, including TRASH, automatically. Those words are NOT my list – I think Akismet pulls them out due to WordPress having some list in Akismet. If you want to cuss, try it, but if it hangs up, use “grab ’em by the p****” or the like.
I think that does it. Questions are welcome.

Gudthots

Is Akismet a plug-in that could be disabled? If possible, would that reduce or add to your workload?

Wolf Moon | Threat to Demonocracy

Even if I could disable Akismet (which I can’t), it would add terribly to my workload. There is an ENORMOUS amount of spam, and Akismet removes 99.xxx percent of it.
For a while, one particular actor devised a type of spam that was able to “get into the spam bin”, and it looked a lot like a new valid poster. There were tells, but very subtle. I was bombarded with hundreds of these posts, and was having to delete them manually. VERY PAINFUL.

Gail Combs

I have 23 pages of notes I took from the conversation OT about Crowdstrike and the HACK.
This is probably THE MOST IMPORTANT POINT!!!
A top NSA whistleblower has revealed that the DNC emails were leaked internally by somebody working for the Democratic party, and not by hackers.
According to NSA agent Bill Binney, the DNC emails were transferred far too quickly for it to be the work of hackers.

…..
What Is CrowdStrike? Firm Hired By DNC Has Ties To Hillary Clinton, A Ukrainian Billionaire, And Google
https://www.zerohedge.com/news/2017-03-24/what-crowdstrike-firm-hired-dnc-has-ties-hillary-clinton-ukrainian-billionaire-and-g
……
JX says:
July 13, 2018 at 4:38 pm
(12/26/2017) Fancy Bear malware was using a hard-coded IP address that had ceased to be a functioning part of the Fancy Bear infrastructure for almost a year.
You may have noticed in the mainstream press recently, there have been similar stories about Fancy Bear and CrookServers that make specific mention of Pakistan and do so in relation to the DNC “hack”.
The IP address, according to those articles, was disabled in June 2015, eleven months before the DNC emails were acquired – meaning those IP addresses, in reality, had no involvement in the alleged hacking of the DNC.
https://www.thegatewaypundit.com/2017/12/plot-thickensnew-evidence-suggests-crowdstrike-may-planted-malware-dnc-servers/
…..
farrier105 says: May 20, 2018 at 7:30 pm
Crowdstrike admits that they spent 36 days just “monitoring” the ALLEGED “Russian Hackers” while the “hackers” were permitted to steal all the DNC emails? What kind of INCIDENT RESPONSE is this? Why hasn’t anyone asked these clowns this question, since the majority of the damaging emails were not even created until after Crowdstrike became PART OF THE DNC NETWORK behind the firewall on May 5, 2016, with complete surveillance capability and near unlimited access to everything:
“Did Crowdstrike just do nothing for 36 days so that the damaging emails could be created so that they could be stolen and given to Wikileaks?”
This is a more than reasonable question since Crowdstrike admits to doing just that.
http://dailycaller.com/2017/11/07/most-wikileaks-emails-werent-even-written-until-after-dnc-knew-it-was-hacked/
https://climateaudit.org/2017/09/02/email-dates-in-the-wikileaks-dnc-archive/#more-23335
…..
ground zero is the cover story that the DNC emails published by Wikileaks beginning in JULY 22, 2016 (8 DAY BEFORE THE COUNTERINTEL INVESTIGATION BEGAN!) were “hacked” by the Russians. Ergo, the Russians are against Hillary; ergo, the Russians are working to elect Trump; ergo, Trump MUST be colluding with the Russians against Hillary.
Interesting, looking at this (largely fictional IMHO) timeline published in The Hill, the DNC (which we now know was a wholly owned subsidiary of HRC) believed it had been “hacked” by “Russians” in Sept. 2015, and then alleges that “the Russians” were shopping around the fact they had the emails to starting in the spring of 2016. The first items on this fanciful timeline that are known to be true is the April CrowdStrike report, a short 7 MONTHS after the alleged “breach” of the DNC servers.
Most likely, this was the beginning of the coverup for the NSA breaches – which Adm. Rogers cut off in April 2018. Coincidentally, when the DNC suddenly decided it had been “hacked” and hired CrowdStrike to prove it.
http://thehill.com/homenews/administration/357851-timeline-campaign-knew-russia-had-clinton-emails-months-before-trump
HOWEVER…
Also interesting: The WikiLeaks DNC emails were downloaded by an insider in JULY 2016, not hacked in September 2015.
So fascinating:
* April 2016: Adm. Rogers cuts off the unauthorized NSA database access after discovering and reporting the activity; DNC/HRC suddenly become aware of a “hack” and hire CrowdStrike.
July 2016: DNC insider downloads emails and gives to WikiLeaks. WikiLeaks almost immediately begins publishing DNC emails. Shortly after, Brennan/Halper fabricate the predicate for the FBI to open its Counterintel investigation alleging “Russians interference” against Clinton to help Trump. A convenient cover story that not only explains the WikiLeaks and preemptively provides an excuse for the most damaging possible revelations, but also permits the use of intel assets to continue spying on the Trump campaign.
https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/
John Podesta’s gmail account was breached in March 2016; the DNC leak occurred months later, in July. WikiLeaks released the DNC emails first, saving the more explosive Podesta emails for the “October surprise”.
It’s interesting how the DNC/HRC suddenly developed a sense of urgency about the September 2015 attempted hack (which, it is alleged, was a spearfishing attempt that also unsuccessfully targeted the RNC) as soon as Adm. Rogers cut off their access to the database, and REALLY got excited when WikiLeaks began teasing their upcoming releases.
There are 284 files in Wikileaks but the ones to focus on are in the Hacking Team section. The Hacking Team is a Italian surveillance malware vendor.
https://search.wikileaks.org/?query=devlin+barrett&exact_phrase=&any_of=&exclude_words=&document_date_start=&document_date_end=&released_date_start=&released_date_end=&include_external_sources=True&new_search=False&order_by=most_relevant#results
The CIA and Soros are all up in this muh Russia:
From the Panama Papers:
Soros Capital set up an offshore company in the Cayman Islands for the purpose of investing private equity with the Carlyle Group, alongside members of Saudi Arabia’s Bin Laden family. Carlyle’s partners include ex-heads of state and former CIA officials. The private equity partnership specializes in buying and selling weapons manufacturing and intelligence gathering companies with government and military contracts and it also uses secret offshore companies to conduct business.
http://www.foxnews.com/world/2016/05/16/panama-papers-reveal-george-soros-deep-money-ties-to-secretive-weapons-intel-firm.html
This is true because one year ago:
Trump quietly orders Pompeo to sever all CIA ties with George Soros
http://futurefastforward.com/2017/01/27/trump-quietly-orders-pompeo-to-sever-all-cia-ties-with-george-soros/
http://www.businessinsider.com/russian-propaganda-website-tracker-2017-8
TIME LINE
12 June 2016:
Julian Assange, founder of Wikileaks said that the journalist organisation is planning to release upcoming leaks in relation to US presidential hopeful Hillary Clinton.
*http://www.itv.com/news/update/2016-06-12/assange-on-peston-on-sunday-more-clinton-leaks-to-come/
Craig comment: The headline and content are misleading as Assange stated ‘Clinton related emails’ and this would not represent ‘more leaks’. On March 16, 2016 WikiLeaks launched a searchable archive for over 30 thousand emails & email attachments sent to and from Hillary Clinton’s private email server while she was Secretary of State. The 50,547 pages of documents span from 30 June 2010 to 12 August 2014. 7,570 of the documents were sent by Hillary Clinton. The emails were made available in the form of thousands of PDFs by the US State Department as a result of a Freedom of Information Act request.
14 June 2016:
DNC and their representatives immediately react and go on the defensive, call in Washington Post for a hatchet piece. Not sure what Wikileaks have so create a story and match two issues – Russia & Trump incl opposition research. The tell that this is a DNC hatchet job is that the 235 page Trump opposition research document is subsequently released by Guccifer 2.
*https://www.washingtonpost.com/world/national-security/russian-government-hackers-penetrated-dnc-stole-opposition-research-on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html?utm_term=.ec3c1ecf0d89
15 June 2016:
Crowdstrike with ex-FBI folk dutifully publish a blog post ‘Bears in the Midst’ which has since been severely criticised.
*https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
17 June 2016:
Fusion GPS hires Christopher Steele / Orbis Business Intelligence Ltd including associate Sir Andrew Wood GCMG.
media.washtimes.com.s3.amazonaws.com/media/misc/2017/04/26/Steeles_Defence_in_London_Action.pdf
*http://www.theamericanconservative.com/articles/in-the-russian-collusion-debate-whos-fooling-who/
Scott Ritter:
“Mr. Steele was contracted by Fusion GPS sometime after June 17; less than three days later, he was able to produce a report that made use of no fewer than seven named senior sources, as well as making use of a “company ethnic Russian operative” to conduct an investigation inside Russia. This time frame is unrealistically short, suggesting that Steele himself was spoon fed a pre-packaged storyline”
20 June 2016:
Christopher Steele first ‘company intelligence report’ 2016/080 to Fusion GPS with Russia meh.

pgroup

On your first point about the speed of transfer of the DNC files, I knew about that a year ago (maybe longer). I thought nobody cared since it never became a “thing”. Then I started following Q and realized that it could be one of those honeytraps.

Jan Phillips

Thank you so much, Gail!!

Gail Combs

Daughn says: “…One of Crowdstrike’s senior executives is Shawn Henry, a former senior FBI official who consults for NBC News….”
Moar on Shawn Henry:
The head of Crowdstrike is former Deputy FBI Head Shawn Henry who was Muller’s right-hand man.
“Shawn Henry is the president of CrowdStrike Services and CSO and a retired executive assistant director of the FBI. Henry, who served in three field offices and at the bureau’s headquarters, is credited with boosting the FBI’s computer crime and cybersecurity investigative capabilities.”
https://www.crowdstrike.com/about-crowdstrike/executive-team/shawn-henry/
Shawn Henry Named Assistant Director of FBI Cyber Division
Shawn Henry has been named Assistant Director of the FBI’s Cyber Division. Director Robert S. Mueller, III appointed him to this position to replace former AD James Finch, who was recently named Special Agent in Charge of the FBI’s Oklahoma City Division.
https://archives.fbi.gov/archives/news/pressrel/press-releases/shawn-henry-named-assistant-director-of-fbi-cyber-division

…. Rank And File FBI Agents: Mueller’s Indictments Are “100% Fabricated” (Here’s Proof)
August 1, 2018 Sean Adl-Tabatabai News, US 0
FBI whistleblowers say Mueller’s Russian indictments are complete fabrications
A large number of rank and file FBI agents have slammed Robert Mueller’s latest indictment of 12 alleged Russian “operatives”, claiming the evidence has been completely fabricated by Mueller’s team.
According to journalist Thomas Paine, a number of U.S. intelligence agents, including some working within the FBI, have blown the whistle on how Robert Mueller and his team deliberately fabricated evidence in order to pursue the Russia witch hunt.
Truepundit.com reports: Whether you understand IT or not, the evidence Mueller claims points to Russia actually also points to India, Pakistan and of course China. Funny though, Mueller never mentions that in his indictment.
Wonder why?
President Trump has called it a witch hunt. And a number of spooks now are backing that claim. The evidence in Mueller’s indictment DOES NOT check our. Any defense attorney will have a field day with this. If they even care to counter the charges since the defendants are in Russia.
Find Out More >
77,106
Here is a collective breakdown we orchestrated and pieced together proving Mueller’s case is a fabricated hoax.
<b.****Circling the wagons around the Russian HOAX****
In Mueller’s July 13, 2018 Indictment he lists Organization 1, which from here on out we’re going to assume is Crowdstrike.
CrowdStrike is the private 3rd party company that the DNC hired after multiple warnings by FBI that their systems were compromised.
CrowdStrike is the company that did the analysis on the servers. The same servers that the DNC wouldn’t give to the FBI for independent analysis.
CrowdStrike eventually gave the FBI a “system image”, which Comey, for some odd reason, deemed acceptable.

* Windows uses BIOS/EFI for standard system imaging, which is not a forensic backup. BIOS doesn’t allow corrupted information to be saved for recovery.
* Forensic imaging of a hard drive is obtained by using a separate set of controls that bypass safety protocols that BIOS would use during imaging.

Simply put, the system image obtained though BIOS is wholly unacceptable for forensic analysis and would not be considered for analysis, nor would adhere to proper traceability of the original state of the system during the “hacks.”
President of CrowdStrike Services & CSO was and still is Shawn Henry.

* September 15, 2010 FBI Director Robert S. Mueller, III named Shawn Henry Executive Assistant Director of the the FBI’s Criminal, Cyber, Response, and Services Branch (CCRSB).
* March 2012, Shawn Henry named President of CrowdStrike Services & CSO.
* Bloomberg has Shawn Henry listed on the Board of Directors of SignatureLink, Inc. with his “Primary Company” listed as the FBI.

CrowdStrike didn’t only make headlines on the DNC hack, they also came out with a report on December 22, 2016 called “Danger Close.” where they allege Russian’s hacked Ukrainian military android phones that used a D-30 howitzer application for targeting, using Fancy Bear X-Agent; one of the same tools they also reported being used in the DNC, DCCC ‘hacks.’
Needless to say, they did a major rewrite after the Ukrainian Defense Minister called them on their BS analysis and report. VOA shows the HUGE walkback of shame from CrowdStrike.
NOTE: When a cyber tool is used, it NO LONGER can be attributed to whoever claims development of it. Once it’s out, it’s out and ANYONE can do what they want with it, so attributing all attacks using X-Agent to “Fancy Bear” from Russia does not make any sense….

There is a lot more to the above article.

Gudthots

Muledeer, Henry, members in good standing of the cover-up crew.

Gail Combs

Hmmm last comment did not show…
>>>>>>>>>
It occurs to me the Fake News/Commie/DemonRats are in a very good position to trash ANY EVIDENCE they do not like after two years of CONTINUOUS FAKE NEWS.
If the Trump Admin SHOWS Crowdstrike/DNC LIED about the Russian hack and it was probably Seth Rich, they can claim it is LIES by the Trump admin. and everyone KNOWS President Trump LIES and TELLs his ADMIN to BREAK THE LAW!
President Trump’s Lies, the Definitive List
“The list above uses the conservative standard of demonstrably false statements. By that standard, Trump told a public lie on at least 20 of his first 40 days as president.”
https://www.nytimes.com/interactive/2017/06/23/opinion/trumps-lies.html
“President Trump’s Lies: The Definitive List” – NBC News
“The New York Times used a narrow definition of “lie” that discarded many of Trump’s falsehoods and still found 103 in 10 months. Under the same rules, Obama had just 18.”
https://www.msnbc.com/the-last-word/watch/-president-trump-s-lies-the-definitive-list-1117109827608
President Trump’s list of false and misleading claims tops 1,000
“We have been tracking President Trump’s false or misleading claims for more than seven months. Somewhere around Aug. 4 or Aug. 5, he broke 1,000 claims, and the tally now stands at 1,057. “
https://www.washingtonpost.com/news/fact-checker/wp/2017/08/22/president-trumps-list-of-false-and-misleading-claims-tops-1000/
So in the Lo-Info Voter the Fake News has ESTABLISHED that President Trump LIES
>>>>>>>>>>>>
next you have this:

Matt @djmateo2
21h
Replying to @madams527 @WisenbergSol
The president constantly ordered people to break the law. Exact quote from the report.

Unfortunately he did not get that out of thin air.
President Trump Reportedly Told Border Patrol Agents to Break the Law
“The President of the United States Told Law Enforcement to Break the Law… But nobody has shown such outright disdain for the separation of powers outlined in the Constitution as Donald Trump, American president. While Obama issued some borderline-constitutional [EOs] Trump has gone at the law head-on. … Congress has the power of the purse—unless Donald Trump wants some money, “
https://www.esquire.com/news-politics/a27085926/president-trump-border-patrol-asylum-immigration/
Did Trump Break Law by Telling NFL Owners to Fire Players?
“Did Trump Break the Law by Telling NFL Owners to Fire Players? . … Trump and Vice President Mike Pence, though, saw an opportunity to hijack the demonstrations. Last weekend, they orchestrated a publicity stunt, with Pence going to an Indianapolis Colts game, only to deliberately make a spectacle by walking out after players from the visiting 49ers took a knee. “
https://theintercept.com/2017/10/11/donald-trump-nfl-owners-national-anthem-law/
Did Trump Break the Law by Ordering Sessions to End Mueller Investigation?
“… last week, as Paul Manafort’s trial got underway and Trump expressed fear that his son, Donald Trump Jr., may be criminally implicated, the president’s rage boiled over. Was Trump’s tweeted order that Attorney General Jeff Sessions “should stop this Rigged Witch Hunt right now, before it continues to stain our country any further” permissible under the “unitary executive” doctrine, or is it evidence of obstruction of justice by the president?… “
https://truthout.org/articles/did-trump-break-the-law-by-ordering-sessions-to-end-the-mueller-probe/
>>>>>>>>>>
So we are not in the clear yet. This is what the DemonRats have as their new blockade. Only President Trump’s popularity is keeping them from impeachment.

GA/FL

Øbama lied non-stop.
Øbama abused the power of his office.
Øbama weaponized every agency of government against opponents.
Øbama spied on congress, the press, foreign allies and Candidate/President Elect Trump….
Øbama got the tech/social media moguls to help him spy and silence opponents.

Gail Combs

GA/FL,
WE KNOW THAT, but the Fake News refuses to report it and instead trashes President Trump 24/7. WORSE they are now censoring anyone who does not promote their die-information campaign.
I am hoping Nunes and the Covington Catholic teen takes them ALL THE WAY DOWN!

GA/FL

LIST OF 1063 Documented Examples of Barack Obama’s Lying, Lawbreaking, Corruption, Cronyism, Hypocrisy, Waste, Etc.
https://freedomoutpost.com/1063-documented-examples-of-barack-obamas-lying-lawbreaking-corruption-cronyism-hypocrisy-waste-etc/

GA/FL
GA/FL

The Complete List of Barack Obama’s Scandals, Misdeeds, Crimes and Blunders – https://www.investmentwatchblog.com/the-complete-list-of-barack-obamas-scandals-misdeeds-crimes-and-blunders/

GA/FL

THERE’S EVEN A BOOK about Obama’s lies, corruption, cronyism, hypocrisy. (first of many, I’m sure)

GA/FL
Gail Combs

This is the URL that WordUnimpress BOOTED, so it probably is worth reading
*https://newspunch.com/fbi-agents-muellers-indictments-fabricated/

Wolf Moon | Threat to Demonocracy
Wolf Moon | Threat to Demonocracy

I’m admin – obviously it will work for me. Try responding with just the link and NO asterisk and let’s see if Akismet grabs it by the URL alone.

Gail Combs
Gail Combs

Weird. Must have been something from the article that I quoted.
Did you find the original comment? or did it head for outer space.

Wolf Moon | Threat to Demonocracy

They were ALL in the spam bucket!

Sylvia Avery

I have nothing to offer except my admiration for your research and my encouragement. TY all!

A Fortiori

I worry that I ain’t got much to add, but let me toss in a couple of things that may or may not be helpful.
Sometime in late 2015, probably as a result of some work done by the NSA IG, Adm. Mike Rogers became aware of a series of unusual and probably illegal Section 702 searches of NSA data. Section 702 searches are searches involving US persons, and they are illegal because US persons are supposed to live free from government surveillance under the Fourth Amendment. A number of the problematic searches were conducted by outside contractors. We learned later that Fusion GPS was an outside contractor during this timeframe.
Adm. Rogers initiated some administrative changes, and in April, 2016 initiates a full audit. On April 18, 2016, Rogers shuts down contractor access to NSA data. (All 702 searches were shut down later, in June I believe). Mary Jacoby, wife of Fusion GPS’s Glenn Simpson, visits the White House the next day. The Clinton campaign hired Fusion GPS shortly thereafter, and within weeks, Fusion GPS hires Steele. In addition, around this same time Joseph Misfud contacts George Papadopoulos and purportedly tells him that he has “dirt” on the Hildabeast.
In May, PDJT became the presumptive nominee, and Fusion GPS hired Nellie Ohr. On May 6, two US DIA personnel stationed in the London embassy made contact with George Papadopoulos, inquiring about information he may have on the Hildabeast. Later that month, Australia’s Alexander Downer met with George Papadopoulos at a London wine bar. Also in May, Nellie Ohr applied for and received a HAM radio license, which allowed her to communicate in a way that was unlikely to be swept up by the NSA’s normal data collection mechanisms.
In June, Bruce and Nellie Ohr met Steele at the Mayflower Hotel in DC. Also in June, the first FISA application, probably on Carter Page that reportedly mentioned PDJT by name was filed, but was rejected.
The point of this, assuming that knowledge of the DNC server hacks came to light in June, 2016, is:
— The Section 702 searches could not have been impelled by the DNC server hack information;
— The spying on George Papadopoulos could not have been impelled by the DNC server hack information; and
— The Carter Page FISA warrant probably was not impelled by the DNC server hack information.

wheatietoo

Great article, Daughn!
Thank you for taking this on!
If you haven’t seen it, here is an article from Jeff Carlson, who also writes for The Epoch Times.
It’s from May 2018…and has some timelines in it:
“The FBI’s Outside Contractors, DNC Servers & Crowdstrike”
https://themarketswork.com/2018/05/18/the-fbis-outside-contractors-dnc-servers-crowdstrike/
CrowdStrike is a spooky outfit that Eric Schmidt/Google put together and funded.
It masquerades as a ‘cyber security firm’…but that is just a front for their clandestine activities on behalf of the Leftist Cabal.
This stuff makes my head hurt.

Wolf Moon | Threat to Demonocracy

I’ve got some great links. Check out any you have not seen yet.
Here is a STRONG early denial of the “17 agencies” LIE which is now getting serious confirmation:
https://jackmatlock.com/2018/06/musings-ii-the-intellience-community-russian-interference-and-due-diligence/
Here is a recent article showing that the Trump-Alfabank HOAX was the doing of an American Canklebot female IT prof and Fusion GPS.
https://www.thegatewaypundit.com/2019/04/confirmed-bogus-trump-russia-alfa-bank-connections-were-created-by-hillary-supporter-working-with-fusion-gps-and-pushed-by-hillary/
“The Russiagate Hoax in 3 Minutes”:
https://downtrend.com/donn-marten/watch-the-russiagate-hoax-in-three-minutes/
How it was the Dossier, not Russian Hacking, and how Brennan lied about that:
https://www.realclearinvestigations.com/articles/2018/05/14/2_colleagues_contradict_brennan_on_use_of_dossier.html
Finally this, although it’s almost unprovable – the FINANCIAL motives behind Russiagate – why a coalition of Dems, Russia, CIA, Fusion, and everybody else wanted to beat Trump and then, not beating him, to destroy him:
https://lamecherry.blogspot.com/2018/01/yioshi-shimatsu-explains-what.html

holley100

Destroying him. I really think it all comes down to that. He’s not the establishment. He doesn’t care about aligning himself with anyone or any group. So everyone hates him.
That might explain TDS too. So there’s the political and financial motives, but also another aspect of how people interact socially that might add to the pure white hatred of Pres. Trump and his family. He doesn’t need anyone or any group and that makes him a target. Having trouble explaining which is why most of my posts are one liners 🙂

Wolf Moon | Threat to Demonocracy

I think you’re right. He is not controllable by the usual means – and it ANGERS them! People can’t make him do things by improper means, and improper means is how Washington DC gets stuff done in a post-Clinton world.

Sylvia Avery

I found this tiny tidbit in a Diana West article mentioning at the end the “phony
Russian hacking story”:
“It means the Mueller report is more than a prosecutor’s brief, written, as Frank Miehle put it, “by Democrats for Democrats.”
It means it is also more than a political salvo to reshape the anti-Trump battlefield, as discussed here, by surrendering the “Russian collusion” narrative (Mueller likely knew for at least 18 months it was a fake)
while falling back to the phony Russian hacking story as the Deep State’s vital line of defense against exposure of its role in a criminal conspiracy to overturn an election…”
https://www.theepochtimes.com/is-the-mueller-report-the-son-of-the-steele-dossier_2887555.html

Sylvia Avery

She goes on from there to talk about Crowdstrike and the “Russian hacking” as a cover.
But you’ve probably already seen the article by now.

Sylvia Avery

Dan Bongino on the timing of Assange’s arrest and what that means, background on who handled the investigation of Assange, and the importance of Assange’s testimony in proving the Russians didn’t hack the DNC because without that there is no possible predicate for investigating PDJT.
https://youtu.be/kyt7apdF4ns

Sylvia Avery

Julian Assange, Crowdstrike, and the Russian Hack That Wasn’t
https://wordpress.com/read/blogs/132838242/posts/569