- Hacked into the emails of the Democratic National Committee (DNC) and Hillary Clinton’s presidential campaign chairman John Podesta, as well as then-Secretary of State Hillary Clinton’s unsecured and unlawful private email server.
- Giving those hacked emails to agents, who in turn,
- Provided them to WikiLeaks to publish online — to damaging effects on Hillary’s campaign.
- NYT openly advocates abandoning objectivity in reporting on Trump
- NYT calls on Google to hide Hillary Clinton’s failing health
- Never investigating Obama, Washington Post unleashes army of 20 to probe ‘every facet’ of Trump’s life
- CNN anchor Chris Cuomo admits media are Hillary Clinton’s bitch
- Dissenting CIA agents say the Washington Post lied about the secret CIA report.
- Both WikiLeaks and a former UK ambassador say Democrat whistleblowers leaked the emails, not Russia.
- Three states — Georgia, Kentucky and West Virginia — say Obama administration’s DHS, not Russia, hacked into their cyber-networks.
DHS-FBI Report on Russian Hacking
“This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.
Previous JARs have not attributed malicious cyber activity to specific countries or threat actors. However, public attribution of these activities to RIS is supported by technical indicators from the U.S. Intelligence Community, DHS, FBI, the private sector, and other entities. This determination expands upon the Joint Statement released October 7, 2016, from the Department of Homeland Security and the Director of National Intelligence on Election Security.
This activity by RIS is part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructurenetworks.
In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This JAR provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government.”
- APT29: “The first actor group, known as Advanced Persistent Threat (APT) 29, entered into the party’s systems in summer 2015″
- APT28: A second Russian hacker(s), “known as APT28, entered in spring 2016.”
“In summer 2015, an APT29 spearphishing campaign directed emails containing a malicious link to over 1,000 recipients, including multiple U.S. Government victims.APT29 used legitimate domains, to include domains associated with U.S. organizations and educational institutions, to host malware and send spearphishing emails. In the course of that campaign, APT29 successfully compromised a U.S. political party. At least one targeted individual activated links to malware hosted on operational infrastructure of opened attachments containing malware. APT29 delivered malware to the political party’s systems, established persistence, escalated privileges, enumerated active directory accounts, and exfiltrated email from several accounts through encrypted connections back through operational infrastructure.
In spring 2016, APT28 compromised the same political party, again via targeted spearphishing. This time, the spearphishing email tricked recipients into changing their passwords through a fake webmail domain hosted on APT28 operational infrastructure. Using the harvested credentials, APT28 was able to gain access and steal content, likely leading to the exfiltration of information from multiple senior party members.“
Reasons why Grizzly Steppe report is not credible
“This report is provided ‘as is’ for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within.“
“When the FBI or when any other agency says the Russians did it or the Chinese did something or the Iranians did something – that’s a fallacy. Any hacker capable of breaking into something is extraordinarily capable of hiding their tracks. If I were the Chinese and I wanted to make it look like the Russians did it I would use Russian language within the code. I would use Russian techniques of breaking into organizations so there is simply no way to assign a source for any attack – this is a fallacy. This is what the FBI and other agencies want us to believe so that they can manipulate our opinions, but I can promise you – if it looks like the Russians did it, then I can guarantee you it was not the Russians.”
“Our government wants to say ‘well we have secrets we must protect’ – there are no secrets anymore. If the US Government believes the Russians, the Chinese, the Iranians do not already have all of our secrets because of their hacking technologies, then our government is deluding itself.”
“I have no privacy and neither do you, Larry. If you think that just because you’re not a political activist or not speaking out against a government agency that they may not be looking into your life – I know that they are. Why? You are an important person, you influence millions of Americans, so of course, they want to know what you’re thinking, what you’re doing, who your friends are and what you’re saying – and I’m not being paranoid – this is just that facts of life as it exists today.”
“I expected to see the IP’s or other signatures of APTs 28/29 [the entities which the U.S. claims hacked the Democratic emails] and where they were located and how/when the data got transferred to them from DNC/HRC [i.e. Hillary Rodham Clinton]/etc. They seem to have been following APT 28/29 since at least 2015, so, where are they?
Further, once we see the data being transferred to them, when and how did they transfer that data to Wikileaks? This would be evidence of trying to influence our election by getting the truth of our corrupt system out. […]
In addition, since Wikileaks is (and has been) a cast iron target for NSA/GCHQ/etc for a number of years there should be no excuse for them missing data going to any one associated with Wikileaks.”
“But this could also just be a cynical ass-covering campaign, by a Democratic Party that has seemed keen to deflect attention from its own electoral failures.
The outgoing Democrats could just be using an over-interpreted intelligence ‘assessment’ to delegitimize the incoming Trump administration [….]
We just don’t know, which is the problem.
[…] Not only do governments lie, they won’t hesitate to burn news agencies. In a desperate moment, they’ll use any sucker they can find to get a point across. […] Which makes it surprising we’re not trying harder to avoid getting fooled again.”
- The DNC was Hillary’s tool and actively sabotaged and undermined Bernie Sanders’ presidential campaign.
- Hillary Clinton’s lies, corruption, venality, and contempt for the “little people” whom she would rule as president.
- John Podesta’s satanic activities.