In June 2016, CIA Director John Brennan should have known better than to believe the DNC/CrowdStrike story of the DNC hacking having been ordered by the Russian government. Brennan was pwned by a 15-years old British boy in October 2015: “A 15-year-old gained access to plans for intelligence operations in Afghanistan and Iran by pretending to be the head of the CIA to gain access to his computers, a court has heard.” Continue reading Pwned Brennan & the DNC Leaks
2019-08-13 update: an NBC article from July 11, 2016:
“Worst nightmare,” Rich’s mother, Mary Rich, said by phone. … “There had been a struggle. His hands were bruised, his knees are bruised, his face is bruised, and yet he had two shots to his back, and yet they never took anything,” she said. “They took his life for literally no reason. They didn’t finish robbing him, they just took his life,” Mary Rich continued.
Continue reading Seth Rich!
Somebody updated DCLeaks.com registration data on April 28, 2016. The DNC alleged it started to suspect a network breach on that date, although it knew about its network breaches from the FBI for long time. Somehow, this change was reflected only in July 2017. This is important, because the official narrative is that the last update was on April 18, when the alleged Russian hackers allegedly broke into the DNC network. Continue reading Was DCleaks.com affiliated with DNC?
2019-06-21 update: crooked DC prosecutors in Roger Stone’s case wrote:
Stone asserts that the government did not “collect any evidence of the DNC breach directly” or “independently verify” the findings of Company 1 about Russia’s involvement in the hack of DNC computer systems. … That statement is incorrect.
Company 1 is assumed to be CrowdStrike (CRWD). The FBI Response to Intelligence Committee shows that that statement is correct. The FBI has not only taken the CrowdStrike’s word in place of the evidence, but uncritically adopted its methodology and even terminology! And even there they made mistakes – Fancy Bear and Cozy Bear became FancyBear and CozyBear! Also, see a different rebuttal by Adam Carter.
CrowdStrike was first hired by the DNC in December 2015 to investigate disagreement about access to NGP VAN by Sanders staffers. Then Barack Obama appointed CrowdStrike’s general counsel Steven Chabinsky, former assistant director to the FBI Director Robert Mueller, to the Commission on Enhancing National Cybersecurity. Then the DNC hired CrowdStrike to investigate (or to pretend investigating) its network breach. Then the Obama administration used the DNC/CrowdStrike allegations to spy on and to sabotage the Trump campaign. CrowdStrike and Steele (Fusion GPS) reports have been coordinated by the DNC through its law firm Perkins Coie. Continue reading FBI Warned the DNC about Hacking 30 Times
One of the key allegations in the Russian hoax is that the DNC has been hacked by a Russian government hacking groups, such as a “group” named Fancy Bear by Crowdstrike and APT28 by FireEye. I fell for this trick, and have been using notation like Fancy Bear / APT28. Fancy Bear and APT28 are the same only in one sense – they don’t exist as groups of people or organizations. If the names are used as names of malware families and/or intrusion scenarios (“what we call collectively APT28,” in the words of Guillaume Poupard, the head French cyber security agency ANSSI), they refer to different things, not necessarily well defined. Continue reading MISDepartment was aware of “APT28”
Mueller investigation was extremely effective in silencing Trump supporters, Republicans, and conservative political activists. See ‘Scorched Earth’: After Mueller Comes Up Empty, His Targets Speak Out: Continue reading Mueller harassed Republican woman smeared by Democratic Strategist
Useful sources of technical information and analysis: Continue reading Hillary’s Trampoline, Sources and Quotes
The latest analysis of the WikiLeaks DNC emails by TheForensicator tends to confirm the opinion that at least the emails, published by WikiLeaks in July 2016, were leaked by a DNC insider who was an unhappy Bernie supporter.
- The emails were apparently extracted from a Microsoft Exchange email server on May 23-25. This was the time when Hillary’s victory became obvious, and the Bernie supporters were angry at the DNC for supposed cheating. (Sample media reporting: https://www.latimes.com/politics/la-na-clinton-sanders-democrats-20160516-snap-story.html)
- Only emails from seven accounts were extracted and transferred to WikiLeaks. Five out of seven were finance directors’. That suggests that the leaker was not only a DNC insider, but a high placed insider with confident knowledge of the DNC’s internal workings.
If the FBI had suspected that certain Trump campaign associates were Russian agents, it had to tell him their names in defensive briefings that presidential candidates regularly received. The FBI and ODNI failed to tell Trump about any concerns regarding his campaign staffers, as noticed by Lindsey Graham.
Thus, either the FBI didn’t really suspect Trump campaign staffers and just used those names as an excuse to spy on Trump, or it intentionally kept Trump in the dark about suspected Russian spies nearby. Either way, the FBI, Brennan, and Clapper didn’t just spy on candidate Donald Trump but attempted to sabotage him and the whole Republican party in the elections.
Generic information like “potential interference by foreign actors, including Russia,” or an allegation that the “Russian government was trying to meddle in the election” (http://archive.is/UkuDq) cannot be considered a warning or notice. If defensive intelligence briefings have any purpose, this purpose is to let the candidate know about the specific threat.
At least three versions of the “Steele dossier” were floating around Washington just before the elections:
- what the FBI was receiving directly from Steele — a liar, a charlatan, and a contractor with Fusion GPS working for the DNC
- a version introduced by Nellie (Fusion GPS) and Bruce Ohr (DOJ) to the FBI
- a version that James A. Baker accepted from Mother Jones’ journalist David Corn
This post expands my article “Russian Interference” Didn’t Happen in the American Thinker.
The DNC Used its Hack to Entrap Trump
The DNC and CrowdStrike Destroyed Evidence in June 2016
The Support for the “Russian Hacking” Theory Came from EU Intel
Steele was Known to the State Department as an Unreliable Source
The DNC, Hillary’s Campaign & FBI Colluded with Ukraine against Trump
The DNC, Hillary’s Campaign & the Obama administration attempted to Collude with Russia
The Obama Administration Hid its “Russian” Activities from Congressional Republicans
The Democratic Party is the party of obscurantism. But the following example of cyber-security ignorance is hilarious (WikiLeaks, http://archive.is/K3153):
“From: Palermo, Rachel Sent: Friday, April 29, 2016 2:07 PM To: Regional Press Subject: Factivists was hacked. Here is our new password Importance: High We have been compromised! But it's all ok. Here is our new password: HHQTevgHQ@z&8b6 It will now change every few weeks so prevent future issues. So as it is re-set, I will forward it along.”
This short fragment shows ignorance of basic computer security rules:
- Every user must have a separate account and password.
- Passwords are never emailed.
- If one decides to violate rules 1 and 2, at least don’t email the password to a list!
It is likely they were hacked many times in 2016, and most of these hacks were detected.
Update 2019-02-13: Finally, Trump’s former attorney John Dowd calls the conduct of the FBI brass and Mueller a coup:
““Little did I know that it appears that they were all in it together,” Dowd said. “I mean Rosenstein, Comey, Mueller, McCabe, the whole crowd and they were out to get this president no matter what. I don’t think they sincerely believed anything about Russia.””
““This is our worst nightmare that someone with that kind of power would then decide to go after the President. I mean it’s a coup,” Dowd said. “That’s what it is an attempted coup by Comey and his crowd. And the evidence is all over there. I take the New York Times article as an admission of their bad behavior.”” Continue reading Robert Mueller – More Conflicts of Interest
“McKew is a former Podesta Group “specialist” and the CEO of Fianna Strategies. Up until the election of Donald Trump, she served as a registered foreign agent for opposition parties in Georgia and Moldova.
Having lost her foreign clients after the 2016 election, she has since refashioned herself as a Russian disinformation expert and a go-to source for media on Trump-Russia conspiracy theories. McKew has even testified before a congressional committee.
Yet like an amateur, she was just duped by a Twitter bot on a politically charged incident.”
Jan 23, 2019
An article in the New Yorker, promoting the “Russian interference” conspiracy theory, referred to the first week of December 2016 as the time “when Obama was intent on an orderly transfer of power.” The real meaning of this phrase is that Obama has failed to orderly transfer power to the elected administration – for the first time in more than 200 years! On December 9, two day after Trump selected “climate denier” Scott Pruitt as the future EPA head, the Washington Post published a putative leak, falsely alleging that “Intelligence agencies have identified individuals with connections to the Russian government who provided WikiLeaks with thousands of hacked emails from the Democratic National Committee and others” and other lies. It also falsely claimed “that’s the consensus view” of the Intelligence Community. On the same day, Obama ordered a “full review” of the alleged Russian hacking, to be led by James Clapper, and delivered before January the 20th. But the “full review” has been completed much faster, on January the 5th. Miraculously, it took only one day to prepare an unclassified version of it! Of course, miracles don’t happen. Brennan and Clapper made a forgery, and released it in the morning of January the 6th before certification of the Presidential election by Congress! Continue reading Summary of the Brennan-Clapper Hoax
Jeffrey Carr is a cyber-security expert, and one of few open skeptics of the narrative that the leaked DNC and/or DCCC internal documents came from hacking by Russia. Few remarkable quotes from his posts, mostly from 2016-2017.
“Here’s my nightmare. Every time a claim of attribution is made — right or wrong — it becomes part of a permanent record; an un-verifiable provenance that is built upon by the next security researcher or startup who wants to grab a headline, and by the one after him, and the one after her. The most sensational of those claims are almost assured of international media attention, and if they align with U.S. policy interests, they rapidly move from unverified theory to fact.
Because each headline is informed by a report, and because indicators of compromise and other technical details are shared between vendors worldwide, any State or non-State actor in the world will soon have the ability to imitate an APT group with State attribution, launch an attack against another State, and generate sufficient harmful effects to trigger an international incident. All because some commercial cybersecurity companies are compelled to chase headlines with sensational claims of attribution that cannot be verified.”
“There’s a cost to being too critical. One infosec company threatened to sue a researcher if he didn’t make substantive changes to a published paper that was critical of their report. Many employers don’t allow their employees to express controversial opinions that could hurt the company’s business or reputation. And if the company or organization that you’re critical of has influential connections in Washington D.C., your professional reputation may suffer as well.” Continue reading Jeffrey Carr, the “Russian Hacking” Skeptic
Maria Butina is totally innocent.
Butina has been prosecuted by Obama holdovers and accused of spying without any evidence, only because she met Trump once or twice and shares the views of the National Rifle Association (NRA). She has been in prison since July, and pleaded guilty under duress. Continue reading Maria Butina is an Innocent Victim of the Rigged Witch Hunt
The GRIZZLY STEPPE – Russian Malicious Cyber Activity released jointly by FBI and DHS on December 29, 2016 was an update on another propaganda piece — the Joint Statement from DHS and ODNI on Election Security, published by the Obama administration on October 7 to aid Hillary and other fellow democrats in the elections.
GRIZZLY STEPPE was so incompetent that even convinced partisans laughed it off. Continue reading FBI/DHS Report GRIZZLY STEPPE was Junk
The social media component of the alleged “Russian activities in the 2016 elections” was non-existent. The IRA, a.k.a. the “troll farm” in Russia, allegedly bought ads for about $100k; this is chump change and not even worthy of a government operation. Most of it has been spent on Facebook, and most ads ran AFTER the 2016 elections. Continue reading Imaginary Social Media Component of Imaginary Russian Meddling
It’s almost funny that the so-called Intelligence Community Assessment (January 6, 2017, Assessing Russian Activities and Intentions in Recent US Elections) claimed that the Russian interference had been against Hillary and in favor of Trump, although most of the evidence in it demonstrated the opposite. RT (Russia Today TV) and IRA (Internet Research Agency, a “troll farm” in Saint Petersburg) agitated in favor of Hillary and the policies of the Democratic Party, and against Trump and the policies of the Republican Party.
RT was anti-Trump in the 2016 elections (from The Nation)
The Nation is far from being pro-Trump. I think it might be called an Old New Left. This is what it says on the subject, with the links to the RT footage. The following are long quotes from The Nation.
The problem with the claim that RT America is pro-Trump is that it is simply false. Many of the channel’s biggest names were either ardently anti-Trump or highly skeptical of what a Trump presidency might mean for America. Continue reading Russian Activities in 2016 Elections were anti-Trump
Hillary presidential campaign chairwoman Donna Brazile’s book Hacks: The Inside Story of the Break-ins and Breakdowns That Put Donald Trump in the White House can be retold in one sentence:
The Russians have hacked the elections and poisoned my dog Chip.
Nevertheless, the book reveals some information concealed by Hillary and the DNC loyalists in FBI.
- In August, seeing CrowdStrike’s helplessness, the DNC invited real cyber security people to form a competent network security team that the book calls the Hacker House, or HH. This contradicts the DNC official story that CrowdStrike was doing a fabulous job.
- HH found out that the DNC network was unprotected, and that anybody could have hacked into it
- HH informed DNC and Hillary’s campaign leadership of this fact and spent most of its time training DNC networking administrators
- HH was asked, but refused to support allegations that the DNC network had been penetrated by “Russians.” HH also had run-ins with CrowdStrike.
- The DNC, Hillary, and the Obama administration disregarded and suppressed this information. They continued their electoral campaign strategy: worsening relations with Russia, accusing Trump of collusion with Putin, and using the FBI, CIA, DHS, and ODNI to sabotage Trump’s campaign. During the transition period, John Brennan and other Obama/Clinton loyalists used false allegations of the “Russian hacking” to attempt something like a coup d’état. The coup was not a complete failure – the angry Democrats have nearly wrestled control of the DOJ away from the elected president.
2018-10-03 update: I have just noticed that the declassified ICA text was published only a few hours before the joint session of Congress that certified Trump as the next president. James Clapper spent the previous day falsely alleging that the Assessment had been done by the U.S. Intelligence Community, pushed an exaggerated version of its conclusions, and leaked parts of it to the media. In his testimony before the Senate Armed Services Committee, Clapper made repeated assaults on the president-elect. When referring to Trump’s sober reaction to the alleged assessment, Clapper uttered the following: “I’ve received many expressions of concern from foreign counterparts of what has been interpreted as disparagement of the intelligence community.” The Assessment and even the published-the-next-day ICA text were still classified and hidden from the president-elect! Now that seems like a last ditch effort to prevent Trump’s inauguration. BTW, who were his ‘foreign counterparts’ and why was he so concerned about their opinions?
Attached is a review of the declassified version of the notorious Intelligence Community Assessment, published on 01/06/2017. The declassified ICA text (“the ICA text” or “the text”, referring to the public version of the alleged assessment) regurgitates the Democratic talking points and allegations that Putin ordered interference in the 2016 elections, including claims that the alleged interference was directed against electing Hillary and in favor of electing Trump as president. The latter statement was supported only by the FBI and CIA, not by the NSA. The ICA demonstrated an extreme partisan bias in favor of Hillary Clinton and the Democratic Party. The ICA text contains no declassified information. It repeats the same allegations over and over either without evidence, or with evidence refuting them. A quarter of the text is devoted to proving the obvious: that RT is controlled or directed by the Russian government.
The Official Attribution of Network Breaches is Based on Conspiracy Theories
The DNC has not been hacked by the Russian hacking groups Fancy Bear (APT28) or Cozy Bear (APT29) for one simple reason: neither of these groups exists or existed at any time.
APT (Advanced Persistent Threat) was a code name for Chinese Espionage. There were attempts to detect specific groups under the broad umbrella of the APT. Then Mandiant (later acquired by FireEye) attempted to generalize the definition to include putative state-sponsored hacker groups from other countries. But such generalization cannot work. The attribution of cyber-security incidents to state backed sophisticated hacker groups worked only for China because it was a cyber-fortress surrounded by the Great Firewall of China. Continue reading Voodoo Attributions in Cyber Security
The full quote:
“This classified intelligence was a problem. … These DoD/IC teams wanted to help, but couldn’t disclose classified information. They came up with a compromise: sharing indicators and information without disclosing the actual actor behind it. Specifically APT, supposedly coined by Colonel Greg Rattray, was a couple groups of actors primarily operating out of mainland China and believed to be members of the People’s Liberation Army. We now know these groups today as APT1, Anchor Panda, and Elderwood, as well as other private designations.
APT is a term to refer to Chinese espionage without saying Chinese espionage. Full stop.”
The “assessment” that the Russian government hacked the DNC and leaked its emails was wrong. It’s almost impossible to attribute a network breach to a sophisticated hackers group.
When #CrowdStrike and FireEye started making the fraudulent attribution on cyber security events, many other companies followed. The Obama regime has corrupted and dumbed down the DHS, DNI, and FBI. They bought this fraud, and then added some.
In 2016, Hillary and the DNC were deceived by CrowdStrike into believing that Russia was behind the leaks of their emails that shouldn’t have been written in the first place. Together with Obama they forced that deception on the FBI and intelligence. Then they blamed Russia for their election defeat!
Most successful network security breaches are conducted by criminal hackers, many of whom are based or originate from Russia and Eastern Europe. Most unsuccessful attempts are conducted by amateurs. Organizations should protect their networks, rather than blame nation states.
Read Jeffrey Carr, FBI/DHS Joint Analysis Report: A Fatally Flawed Effort or Robert Graham, Dear Obama, From Infosec – both are (or were) anti-Trump.
What a tangled web we weave …
Update: Steele might have learnt what the DNC wanted him to write about Trump directly from the DNC, rather than indirectly through MSM. DOJ official Bruce Ohr reportedly communicated with Steele in the time when his wife Nellie Ohr worked for Fusion GPS that hired and worked with Steele.
The leaked “opposition research” (mostly smear) on Trump consisted of 230 pages. Only one short paragraph was devoted to allegations about Trump’s relations and attitudes towards Russia. Thus, neither the DNC nor Hillary campaign believed around May 2016 that there was even a small impropriety in Trump’s connections with Russia. The opposition research file was apparently dated December 2015, but the DNC allowed it to leak between late April to early June of 2016 (likely on June 12-14), then advertised it in the WaPo article on June 14, 2016.
The liberal media attitude toward Putin changed from lukewarm to hostile almost overnight between July 16 and July 21, simultaneously with the creation and adoption of the Trump-Putin conspiracy theory as a major part of the Democratic Party line. Continue reading All “Evidence” of “Russian Meddling” Came from the DNC
Since the misattribution of a suspected breach into the DNC network in early 2016 to Russia, CrowdStrike has been boosted by:
- DNC loyalists in the FBI, CIA, DHS, and DNI
- the fawning coverage by mainstream media
- NBC News employing Shawn Henry, a CrowdStrike top officer and former executive assistant to FBI Director Robert Mueller, as a cyber security consultant
- $300M investments by Google and Silicon Valley VCs
The conservative media keeps tripping itself over lies invented by the left-stream media. I cannot blame it. People know the left-stream media lies, but still read it and take in much of what is written there. This time, conservatives fell for the fake news that Guccifer 2.0 (who took credit for release of the damning internal DNC documents) revealed as a GRU officer.
On or around March 21, 2018, The Daily Beast, a leftist tabloid on the lower end of the spectrum, published an “exclusive”: “‘Lone DNC Hacker’ Guccifer 2.0 Slipped Up and Revealed He Was a Russian Intelligence Officer.” Continue reading Why has FBI Accepted DNC’s “Russian Hacking” Claims?