Ok right off the bat, I see a major issue here:
Quote:Quote:
Defendants
9. Defendant VIKTOR BORISOVICH NETYKSHO (Нетыкшо Виктор Борисович) was
the Russian military officer in command of Unit 26165, located at 20 Komsomolskiy Prospekt,
Moscow, Russia. Unit 26165 had primary responsibility for hacking the DCCC and DNC, as well
as the email accounts of individuals affiliated with the Clinton Campaign.
Notice there it says "WAS"? What the fuck are they Russian agents or not? The others listed in the indictment are referred to in past tense ("was") as well.
Is it that they used to be Russian intelligence, but are now freelance hackers? Or did Putin actually direct their work as military members? Doesn't read like that at all.
Why the misdirection here? You cannot lie on a legal indictment, but you get on TV to hold a news conference and frame the entire thing as if Putin or the Kremlin directed the whole affair? The average American is not going to read this and make this technical distinction.
We do not have legal extradition treaties with Russia, why not just simply request Trump to ask Putin to arrest those people instead or make a trade for Russian criminals we have?
Anyway moving on....
Quote:Quote:
LUKASHEV used the account to mask a link contained in the spearphishing email,
which directed the recipient to a GRU-created website. LUKASHEV altered the
appearance of the sender email address in order to make it look like the email was
a security notification from Google (a technique known as “spoofing”), instructing
the user to change his password by clicking the embedded link.
How did they know that the spearphish website was GRU created? If they listed all the defendants as past employees how are they using resources they technically should not have access to? A real lawyer would carve this up.
Quote:Quote:
Hacking into the DCCC Network
23. Beginning in or around March 2016, the Conspirators, in addition to their spearphishing
efforts, researched the DCCC and DNC computer networks to identify technical specifications and
vulnerabilities.
a. For example, beginning on or about March 15, 2016, YERMAKOV ran a technical
query for the DNC’s internet protocol configurations to identify connected devices.
b. On or about the same day, YERMAKOV searched for open-source information
about the DNC network, the Democratic Party, and Hillary Clinton.
c. On or about April 7, 2016, YERMAKOV ran a technical query for the DCCC’s
internet protocol configurations to identify connected devices.
24. By in or around April 2016, within days of YERMAKOV’s searches regarding the DCCC,
the Conspirators hacked into the DCCC computer network. Once they gained access, they
installed and managed different types of malware to explore the DCCC network and steal data.
a. On or about April 12, 2016, the Conspirators used the stolen credentials of a DCCC
Employee (“DCCC Employee 1”) to access the DCCC network. DCCC
Employee 1 had received a spearphishing email from the Conspirators on or about
April 6, 2016, and entered her password after clicking on the link.
b. Between in or around April 2016 and June 2016, the Conspirators installed multiple
versions of their X-Agent malware on at least ten DCCC computers, which allowed
them to monitor individual employees’ computer activity, steal passwords, and
maintain access to the DCCC network.
Case 1:18-cr-00215-ABJ Document 1 Filed 07/13/18 Page 8 of 29
9
c. X-Agent malware implanted on the DCCC network transmitted information from
the victims’ computers to a GRU-leased server located in Arizona. The
Conspirators referred to this server as their “AMS” panel. KOZACHEK,
MALYSHEV, and their co-conspirators logged into the AMS panel to use
X-Agent’s keylog and screenshot functions in the course of monitoring and
surveilling activity on the DCCC computers. The keylog function allowed the
Conspirators to capture keystrokes entered by DCCC employees. The screenshot
function allowed the Conspirators to take pictures of the DCCC employees’
computer screens.
d. For example, on or about April 14, 2016, the Conspirators repeatedly activated
X-Agent’s keylog and screenshot functions to surveil DCCC Employee 1’s
computer activity over the course of eight hours. During that time, the Conspirators
captured DCCC Employee 1’s communications with co-workers and the passwords
she entered while working on fundraising and voter outreach projects. Similarly,
on or about April 22, 2016, the Conspirators activated X-Agent’s keylog and
screenshot functions to capture the discussions of another DCCC Employee
(“DCCC Employee 2”) about the DCCC’s finances, as well as her individual
banking information and other personal topics.
There are no technical details here. Just a summary rundown of the alleged actions they are accused of. I guess the old adage "A Grand Jury would indict a ham sandwich, is appropriate here." A technical breakdown could only occur in court and we know that isn't happening, so we are forced to take their word for it.
Quote:Quote:
To enable them to steal a large number of documents at once without detection, the
Conspirators used a publicly available tool to gather and compress multiple documents on the
DCCC and DNC networks. The Conspirators then used other GRU malware, known as
“X-Tunnel,” to move the stolen documents outside the DCCC and DNC networks through
encrypted channels.
a. For example, on or about April 22, 2016, the Conspirators compressed gigabytes
of data from DNC computers, including opposition research. The Conspirators
later moved the compressed DNC data using X-Tunnel to a GRU-leased computer
located in Illinois.
b. On or about April 28, 2016, the Conspirators connected to and tested the same
computer located in Illinois. Later that day, the Conspirators used X-Tunnel to
connect to that computer to steal additional documents from the DCCC network.
Here is more GRU stuff.
X-Tunnel is old. Comes from China, not Russia. Why are they giving out misleading information about an old open source malware of Chinese origin as state sponsored Russian tools?
GRU leased computer based in Illinois? How? What kind of computer? Hosting company?
Quote:Quote:
Efforts to Remain on the DCCC and DNC Networks
32. Despite the Conspirators’ efforts to hide their activity, beginning in or around May 2016,
both the DCCC and DNC became aware that they had been hacked and hired a security company
(“Company 1”) to identify the extent of the intrusions. By in or around June 2016, Company 1
took steps to exclude intruders from the networks. Despite these efforts, a Linux-based version of
X-Agent, programmed to communicate with the GRU-registered domain linuxkrnl.net, remained
on the DNC network until in or around October 2016.
Isn't Company 1, Crowdstrike that liberal ran IT security company known for being caught in lies multiple times? They also work alot of government contracts thanks to their Obama admin hookups.
Quote:Quote:
On or about May 31, 2016, YERMAKOV searched for open-source information
about Company 1 and its reporting on X-Agent and X-Tunnel. On or about June
1, 2016, the Conspirators attempted to delete traces of their presence on the DCCC
network using the computer program CCleaner.
CC Cleaner?!!!
![[Image: lol.gif]](https://rooshvforum.network/images/smilies/new/lol.gif)
To clean up their tracks?! Oh man that's hilarious! We keep going from elite Russian government hackers to 3 Stooges one page after another.
Quote:Quote:
Later that day, at 7:02 PM Moscow Standard Time, the online persona Guccifer 2.0
published its first post on a blog site created through WordPress. Titled “DNC’s servers hacked
by a lone hacker,” the post used numerous English words and phrases that the Conspirators had
searched for earlier that day (bolded below):
Worldwide known cyber security company [Company 1] announced that
the Democratic National Committee (DNC) servers had been hacked by
“sophisticated” hacker groups.
I’m very pleased the company appreciated my skills so highly))) [. . .]
Here are just a few docs from many thousands I extracted when hacking
into DNC’s network. [. . .]
Some hundred sheets! This’s a serious case, isn’t it? [. . .]
I guess [Company 1] customers should think twice about company’s
competence.
F[***] the Illuminati and their conspiracies!!!!!!!!! F[***]
[Company 1]!!!!!!!!!
Looks like Rod Rosenstein and team should have left this part out of the indictment. It basically provides proof that their hacking was not ordered by Putin or the Kremlin, but that they were mere Hacktivists instead. Being former military does not make that a military action. This possibly explains why Obama refused to do more than kick out the Russian ambassadors. This isn't worth starting a war over at all. Congress was the ones that did the sanctions. Do they lack critical reading skills? Seems like it.
Quote:Quote:
Use of Organization 1
47. In order to expand their interference in the 2016 U.S. presidential election, the Conspirators
transferred many of the documents they stole from the DNC and the chairman of the Clinton
Campaign to Organization 1. The Conspirators, posing as Guccifer 2.0, discussed the release of
the stolen documents and the timing of those releases with Organization 1 to heighten their impact
on the 2016 U.S. presidential election.
a. On or about June 22, 2016, Organization 1 sent a private message to Guccifer 2.0
to “[s]end any new material [stolen from the DNC] here for us to review and it will
Case 1:18-cr-00215-ABJ Document 1 Filed 07/13/18 Page 17 of 29
18
have a much higher impact than what you are doing.” On or about July 6, 2016,
Organization 1 added, “if you have anything hillary related we want it in the next
tweo [sic] days prefable [sic] because the DNC [Democratic National Convention]
is approaching and she will solidify bernie supporters behind her after.” The
Conspirators responded, “ok . . . i see.” Organization 1 explained, “we think trump
has only a 25% chance of winning against hillary . . . so conflict between bernie
and hillary is interesting.”
b. After failed attempts to transfer the stolen documents starting in late June 2016, on
or about July 14, 2016, the Conspirators, posing as Guccifer 2.0, sent
Organization 1 an email with an attachment titled “wk dnc link1.txt.gpg.” The
Conspirators explained to Organization 1 that the encrypted file contained
instructions on how to access an online archive of stolen DNC documents. On or
about July 18, 2016, Organization 1 confirmed it had “the 1Gb or so archive” and
would make a release of the stolen documents “this week.”
Organization 1 = Wikileaks
Well this blows the theory out of the water that Wikileaks was working for the Trump campaign!
The article writer wrote this:
Quote:Quote:
Two and a half weeks after publishing the DNC emails, while being interviewed on a Dutch television show, WikiLeaks editor Julian Assange encouraged a conspiracy theory that DNC staffer Seth Rich, who had just recently been killed in what the D.C. police say was a botched robbery, was his source for the DNC emails. After stating WikiLeaks sources face danger, Assange alluded to Rich’s shooting, and again alluded to the risks faced by WikiLeaks sources, before stating “we don’t comment on who our sources are.”
“Whistleblowers go to significant efforts to get us material, and often very significant risks,” Assange said. “There’s a 27-year-old, works for the DNC, who was shot in the back, murdered, just a few weeks ago, for unknown reasons as he was walking down the street in Washington.”
WikiLeaks did not respond to a request for comment.
Seth is not mentioned in the indictment FYI. That is the article writer injecting that biased part.
Some things that makes no sense to me:
1. Why is it that, Wikileaks told these alleged Russian hackers, posing as DCLeaks, to give them all the emails and documents because they are not good enough to host them well enough on their own, if these guys are smart enough to hack into mail accounts with spear phishing? Script kiddies? Don't know how to host a website well?
2. These Russians were certainly bored and so broke they needed to mine the bitcoin to register the domains they needed to work with. Doesn't sound state sponsored to me, but I am sure there are spies (Russian and American) that are given no money and told to produce results... Now it makes sense why they gave their stuff to Wikileaks. They were too broke to do it right themselves.
3. Didn't Julian state that he had multiple sources for the DNC emails at one point? Could it be possible, Guccifer 2.0 as well as Seth Rich gave them emails and docs? Guccifer 2.0 said on social media that he worked with Seth, but that could be a lie but not unlikely. He claimed that Seth helped him keep a backdoor. If Crowdstrike cleaned up the network, how did they keep a backdoor so easily? Let's be real Crowdstrike is not a premier Red Team Security remediation company. There are a couple handfuls of great ones, but they are not one of them. An Insider Threat could very well evade them (Seth Rich) who allegedly did IT work inside the DNC and had an admin account. I wonder if if was Seth Rich that used the CC Cleaner program to erase evidence! LOL!
They better hope Seth's killers are not caught or that witness got whacked, otherwise this flimsy indictment will end up looking like generic CNN sponsored Fake News.
Dating Guide for Mainland China Datasheet
TravelerKai's Martial Arts Datasheet
1 John 4:20 - If anyone says, I love God, and hates (detests, abominates) his brother [in Christ], he is a liar; for he who does not love his brother, whom he has seen, cannot love God, Whom he has not seen.