Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

DOJ Russian Indictments; BITCOIN; GUCCIFER 2.0; FUSION GPS: Imran Awan; and Servers.
Many Sources | July 18, 20148

Posted on 07/18/2018 5:30:39 AM PDT by Yosemitest



TOPICS: Crime/Corruption; Extended News; Government; Politics/Elections
KEYWORDS: alperovitch; assange; bitcoin; bolton; crowdstrike; democratoperative; dnc; dnchack; dncserver; dws; fusiongps; gru; guccifer; guccifer20; hillaryserver; imranawan; itgate; jasonbuttrill; nsa; plagiarism; russianindictments; seanbridges; seanhenry; shawnbridges; silkroad; silkroadtaskforce; vanity; wikileaks
Navigation: use the links below to view more comments.
first 1-2021-22 next last
Here are the six separate investigations discussed in that transcript:
1 posted on 07/18/2018 5:30:39 AM PDT by Yosemitest
[ Post Reply | Private Reply | View Replies]

To: Yosemitest

Indictment


2 posted on 07/18/2018 5:39:23 AM PDT by stonehouse01
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yosemitest

Bitcoin transactions are obscured, not anonymous.


3 posted on 07/18/2018 5:43:12 AM PDT by taxcontrol (Stupid should hurt)
[ Post Reply | Private Reply | To 1 | View Replies]

To: taxcontrol
I did the transcript myself from a video.
And I've been working on this all night.
It's time to get some sleep.
4 posted on 07/18/2018 5:48:19 AM PDT by Yosemitest (It's SIMPLE ! ... Fight, ... or Die !)
[ Post Reply | Private Reply | To 3 | View Replies]

To: stonehouse01

IF the evidence is real, will the government actually take it to TRIAL, when the defendants demand “Discovery” ?


5 posted on 07/18/2018 5:49:49 AM PDT by Yosemitest (It's SIMPLE ! ... Fight, ... or Die !)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Yosemitest

IMHO Free VPN’s are probably secretly funded by the NSA.

Paid VPN’s were probably Capitalized secretly by the NSA.


6 posted on 07/18/2018 5:51:00 AM PDT by ImJustAnotherOkie (All I know is what I read in the papers.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

I’m hoping somer real experts on the subject, who have the background knowledge, give us some comments to expose all this corruption.


7 posted on 07/18/2018 5:52:45 AM PDT by Yosemitest (It's SIMPLE ! ... Fight, ... or Die !)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Yosemitest

I think this whole thing is BS. It is always amazing to me to see who will step out of the shadows to claim his 15 minutes. It never ends well.


8 posted on 07/18/2018 6:02:43 AM PDT by AndyJackson
[ Post Reply | Private Reply | To 5 | View Replies]

To: Yosemitest

Since “Taken” was cancelled, Kilroy was looking for a job, so they probably hired him to do this.


9 posted on 07/18/2018 6:06:39 AM PDT by Real Cynic No More
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yosemitest

Since “Taken” was cancelled, Kilroy was looking for a job, so they probably hired him to do this.


10 posted on 07/18/2018 6:06:40 AM PDT by Real Cynic No More
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yosemitest; bitt; vette6387; unkus; SkyPilot; ransomnote; Kaslin; ZULU; rodguy911; Liz; ...

http://redstatewatcher.com/article.asp?id=131778

BREAKING:Fmr NSA Exec Tech Dir Has Evidence That Could Debunk Mueller’s Indictments!

“Special Counsel Robert Mueller and his team may have not been totally honest with the American People.

America Restored’s Executive Director Tomi Collins and Bill Binney former Tech Director of the NSA on Saturday, July 7th in Washington DC., discussed the alleged hacking by the Russians.

Binney, who has had 40 years of experience in the intel field, provided scientific data proving Guccifer2 Data is fraud and Russian hackers did not hack the DNC.

Binney said his examination of the alleged DNC hack showed the download rate of 49 mb per a second was too fast for a foreign entity to have. Binney stated the download came from a local source, possibly via a thumb drive.

Famed hacker and programmer, Kim Dotcom agreed with Binney’s findings.

“Must watch: Former NSA technical director debunks Mueller indictment against 12 Russians with scientific evidence. DNC files could not have been transferred over the Internet at a rate of 49mb per second. But a USB thumb drive (inside DNC) could do that,” Dotcom tweeted.

Judging from Binney’s statements, it’s likely the DNC hack was an inside job, not from foreign hackers...”

Demand Seth Rich’s murder be examined with a microscope?


11 posted on 07/18/2018 6:18:27 AM PDT by ExTexasRedhead
[ Post Reply | Private Reply | To 1 | View Replies]

Impossible data rates to be over even a gigabit network for the file transfers to have been from Russia.

The date/time stamps on the files the Rosenstein investigation used to determine it was Russia, Russia, Russia showed a data rate REQUIRED to be over 40 mega BYTES per second (to get those stamps). On a gigbit network maximum data transfer rate is about 6 mega BYTES per second.

However, you can get those transfer rates on a USB 3.0 thumbdrive. Meaning: it was an inside job.

The Guccifer 2 basis narrative to determine it was anybody anywhere in the world using the internet is a 100% fabrication.


12 posted on 07/18/2018 6:19:47 AM PDT by USCG SimTech
[ Post Reply | Private Reply | To 10 | View Replies]

To: Yosemitest

Looking at one aspect which listed is tracking crypto purchases. Let just say I had what was referred to as a cryptographic clearance for the government and was involved with account management. Everyone can basically figure out that cryptocurrencies are really just strings of numbers to a MAC address or a string of numbers/letters that are scrambled in a fashion to remain hidden from the user or prying eyes. It would be hard, but not impossible to decrypt the hash strings. In all likelihood they were able to track the cryptocurrency purchases back to using a device or devices such as your computer or cell phone which everyone knows have tracking IDs, IP addresses, go thru ISPs, etc. Couple these easy to connect to people “registrations” it would make it simple to follow the Users, or the data packets of transmitted data. The reason the government can get away with using cryptographic hash is because we typically dual encrypt the data packets running and run everything thru firewalls and point-to-point devices that are honed or paired and encrypt each data packet once then twice before running back out the firewalls on the recipient network... then you have the limited access (until the Obama Admin decided to use commercial emails to spoof Govt Accountability). So tracking unencrypted devices, even if only using a VPN or two VPNs commercially available would be easy since all the IP traffic runs thru commercial providers whose high level network managers are essentially dual private sector/government employees who attend the latest greatest training and hold clearances. Everything is followed by the government. Apple can tell that lie that they won’t decrypt something for local law enforcement, but even Apple cannot sell a device without providing the Keys to the chips, the crypto, and all things that consumers think protect them to the government before the product is patented or licensed for any sales or use. Car GPS, cell phones, sat phones, are all registered devices that governments allow only after the keys to privacy are given to our intelligence agencies to track and read if necessary simultaneously while in use. Then you have your account numbers, your email addresses, your physical location all point to you. There is a bit or a couple bits more to this but if you understand this and you wanted to be ANON you would have to be off the grid, no credit cards, internet or phone or GPS usage. These folks the USG is inditing via the FBI is literally using the FBI as cover for high level Intelligence Operations by folks in rooms and building without windows who never take a phone into their work enclosure; people who don’t use any social media on USG devices, etc. Our FBI may have liaison Information Systems Officers who work with other agencies, but I doubt the average agent or team would have anything more than the famous Vans that grab information all around them - they literally put in a request to other agencies to have their ISOs or network managers “find” what they can’t get (If every agency had a budget for this equipment or humit resources it would still be confined to singular small footprints to keep it safe and secret). So when Trump tells you it is not just the FBI that is because the FBI is incapable of finding this information on their own - it takes the melding of private sector/govt level operations at the NSA level, but they can and did request it - and those people in those agencies (political appointees are the weak spots coupled with the full time politically corrupt govt employees) with proper requests. The FISA warrant is important, but the Intel Agencies would often go all the way back to the president to release so types of information, or information only available thru certain types of surveillance. IT TAKES A VILLAGE to do what these people did to Trump, or the Russians.


13 posted on 07/18/2018 6:24:15 AM PDT by Jumper
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

Hahaha you know the truth and we are just consumers. Even the new weapons the military is going to release to the infantry will be networked while deployed. Two cups and a string might work as about the VPN available.


14 posted on 07/18/2018 6:31:17 AM PDT by Jumper
[ Post Reply | Private Reply | To 6 | View Replies]

To: ExTexasRedhead

The folks monitoring the DNC server “on our side” would have known everything from server logs. You can’t print a document without it being logged to a specific user, pc, and printer which shows the date and time. You can’t delete anything that has not already been backed up which would also be logged. Even if you delete it from Outlook it is still in the Server’s scrambled metadata and easy to recover. Trust but Verify is essentially built into Microsoft.


15 posted on 07/18/2018 6:38:09 AM PDT by Jumper
[ Post Reply | Private Reply | To 11 | View Replies]

To: Jumper

This is how they know the server wasn’t “hacked” and that the emails were downloaded directly from the server... the timestamps show that the transfer was too short for it to be over the Internet.

Guccifer is willing to testify to this. There is also an FBI agent that is willing to testify that he was approached by a person in DC trying to give him the emails because they contained evidence of crimes.

Neither has been allowed to testify or present their evidence.

Seth Rich was the source of the emails and he was killed.

Hack attempts on the servers occurred after that.. and then someone released the CIA hacking set into the wild via WikiLeaks so they could claim that anyone could have had those tools in case they left a footprint.

This is the timeline as I understand it.


16 posted on 07/18/2018 6:55:34 AM PDT by willyd (I for one welcome our NSA overlords)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Yosemitest

Bkmrk.


17 posted on 07/18/2018 7:53:00 AM PDT by RushIsMyTeddyBear
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yosemitest

All this has me wondering if the dark web / bitcoin were created in order to trap people by finding out who was doing what dirty thing. The Deep State would have used all this to blackmail and control people.

Then, a miracle! Trump is elected. Now all this tech that was put into place for the DS is being used by Trump to STOP the Deep State.

Nice plot twist!


18 posted on 07/18/2018 7:53:54 AM PDT by generally ( Don't be stupid. We have politicians for that.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: willyd

When Congressional or Senate committees bring people before them for questioning, on this attempt to bring down Trump, they already have the evidence. These people are released back into the wild to be monitored in order to roll up the entire opposition - all to be dealt with when the time comes. I believe that after the midterms, maybe before if polling data is bad for Trump, they will arrest and charge these people, first for their lies and evasions to committees and second for treason.


19 posted on 07/19/2018 8:15:22 AM PDT by Jumper
[ Post Reply | Private Reply | To 16 | View Replies]

To: Jumper
I'm not good at reading a block of text, so I'm going to re-format it.
Thanks for that info Jumper, but let me ask another question.
Remember this ? : HOW do we know it was the Russians ?
Why couldn't it be IMRAN AWAN and his co-workers with Debbie Wassermann Schultz, and with the Democratic National Committee who was DOING the hacking and leaving FALSE TRACES of the Russians.
We MUST INVESTIGATE the Democratic National Committee's servers ! ! !
But some of those servers are missing. (How convenient ! )
20 posted on 07/19/2018 12:15:06 PM PDT by Yosemitest (It's SIMPLE ! ... Fight, ... or Die !)
[ Post Reply | Private Reply | To 13 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-22 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson