LogFAQs > #905154448

LurkerFAQs, Active DB, DB1, DB2, Database 3 ( 02.21.2018-07.23.2018 ), DB4, DB5, DB6, DB7, DB8, DB9, DB10, DB11, DB12, Clear
Topic List
Page List: 1
TopicTrump officials demand Mueller return thousands of emails II: No Take Backs!
Doctor Foxx
07/16/18 12:58:55 AM
#267:


Let's go over exactly what the indictments mean and how that ties in to the administration

Article 1 of the indictment states that the Russian government actively set up multiple intelligence units (known as the GRU) with the sole aim of interfering with the 2016 election. Two of these units, 26165, and 74455, were specifically tasked with acquiring and releasing stolen documents via hacking.

Article 2 specifically calls this a "conspiracy" and states that the 12 indicted Russians had contacts with "persons known and unknown to the Grand Jury."

Article 3: The aforementioned Russian intelligence units deliberately targeted the Clinton campaign.

Article 4: They deliberately targeted the DNC as a whole.

Article 6: In June of 2016, they released TENS OF THOUSANDS of hacked documents using fictitious online personas.

Article 10: One of the intelligence officers, Boris Antonov, oversaw a department within 26165 tasked with hacking the U.S. military, governmental (i.e., political) and non-governmental organizations. [i.e., they were spying on every level of our gov't].

Articles 12-18: The Russian hackers often used various online aliases, both male and female, such as (but not limited to) "Kate Milton," "James McMorgans," and "Karen Millen." Sergey Morgachev, another Russian hacker, was a Lt. Colonel in the Russian military. He created the hacking malware used by dept. 26165, known as "X-Agent." Another hacker named in the indictment, Nikolay Kozachek, was a Lt. Captain in the Russian military. Artem Malyshev (also named in the indictment) was a Second Lieutenant in the Russian military. Aleksandr Osadchuk (also named in the indictment) is a Colonel in the Russian Military. He oversaw the creation and dissemination of anti-Clinton material online.

Article 19: Russian Military Officer Aleksey Potemkin, assigned to 74455, supervised the creation of fake social media accounts used (among other things) in the release of DNC documents.

Article 21: Over 300 individuals affiliated with the DNC were SUCCESSFULLY targeted. (Article 21 is lengthy, and includes a detailed, play-by-play account of how 26165 and 74455 achieved their aims. Spoiler alert: It's crazy).

Article 24, subsection B: The Russian's hacking of the DNC was so advanced that they were able to monitor individual computers in real time. Subsection C states that their malware sent actual screenshots of DNC computer activity to a server in Arizona that the Russians had access to. They were also able to capture keystrokes entered by DCCC employees.

Article 24, subsection D: They monitored individual DNC / DCCC employees for hours on end, and obtained information about DNC fundraising plans and even banking information (as well as other personal information).

Cont.
---
Never write off the Doctor!
... Copied to Clipboard!
Topic List
Page List: 1