LogFAQs > #905154497

LurkerFAQs, Active DB, DB1, DB2, Database 3 ( 02.21.2018-07.23.2018 ), DB4, DB5, DB6, DB7, DB8, DB9, DB10, DB11, DB12, Clear
Topic List
Page List: 1
TopicTrump officials demand Mueller return thousands of emails II: No Take Backs!
Doctor Foxx
07/16/18 1:00:08 AM
#268:


Article 26 subsection A: By June 2016 the Russians had complete access to 33 DNC computers, totally and completely.

Article 27: The GRU gained access to information regarding DNC opposition research, field operation plans, and the Benghazi operation.

Article 28, subsection B: Aside from the server in Arizona, the GRU also stored data to a server in Illinois, to which they filtered large gigabytes of stolen information via a program they developed known as "X-Tunnel."

Article 32: The DNC became aware of Russian attempts to hack their servers and hired a security firm to identify the extent of the intrusions. The security firm (identified in the indictment only as "company 1") also put in place measures to halt GRU access to DNC computers, but, despite this, the GRU was so efficient that they continued to maintain access via "X-Agent" well through October of 2016.

Article 33: The GRU immediately became aware of "company 1's" (referring here to the security firm that the DNC hired) efforts, and took countermeasures in response. This included investigating / hacking "company 1" itself, and later, apparently as a retaliatory measure against the DNC, setting up a wesbsite that redirected from a DNC online political donations website, to another website set up by the GRU (in other words, the GRU took funds from DNC donors, using the pretext of a false DNC donations website).

Articles 35-36: The GRU set up another website, the sole purpose of which was to release stolen DNC documents. They created fake social media accounts that falsely attributed this website's creation to a group of "American hacktivists." It received over 1 million hits.

Article 37: The GRU has also released stolen documents dating back to 2015 (i.e., they've been up to this for quite a while).

Article 40: The notion of a "lone Romanian hacker" being responsible for the DNC leaks was a fiction deliberately created by the GRU and disseminated via fake social media accounts.

Article 42: Using a popular blogging site, the GRU set up a blog that used the most "searched for" keywords by conspiracy theorists, (e.g., "Illuminati," "Worldwide," "Conspiracy," et. al.), -and used this website to further disseminate the "lone Romanian hacker" conspiracy theory. (Article 46 of the indictment further states that later entries on this blog site posted articles positing that the released, stolen documents had "nothing to do with Russia.")

Cont.
---
Never write off the Doctor!
... Copied to Clipboard!
Topic List
Page List: 1