@paulsperry_ The claim in the Mueller indictment was that the GRU hackers of "Fancy Bear" were so freaking stupid that they keylogged their own keystrokes to a server they leased inside the US, which the FBI seized. That is, supposedly, plus reports from Dutch Intelligence, their evidence.
@paulsperry_ Where I have trouble with the whole story is:
1. Why would Putin send GRU into the DNC network in March 2016 when Putin already had the SVR team, "Cozy Bear," inside the DNC network since JULY 2015? "Cozy Bear" had access to about everything on the network.
@paulsperry_ FBI told Yared Tamene, one of the DNC's security consultants, who found no evidence of any hackers on teh DNC network, that Cozy Bear transmitted data to Moscow in November 2015. DNC people couldn't find any hackers to remove, and the FBI refused to force entry into the..
@paulsperry_ ..DNC network, so the Russians were able to caper and prance around in there for an entire year unmolested. Comey was not alarmed at all that Russian spies were camping out in the network of a major political party.
@paulsperry_ 2. Comey's lack of concern is weird for two reasons:
A. In May 2014, John Brennan presented alleged intelligence to President Obama that Russia planned to interfere in the elections of other nations, including the US. Obama told Putin not to interfere in the UKRAINIAN...
@paulsperry_ ...election of 2014, but apparently was unconcerned that Russians were lounging around in the network of his own party. The 2014 report by Brennan made the presence of Russian spies in that network a NATIONAL SECURITY MATTER. No one in the Obama Administration did...
@paulsperry_ ...anything of substance to expel the "Cozy Bear" SVR hackers.
2. For years leading up to the 2015-2016 "Cozy Bear" hack of the DNC, Comey became controversial for his use of NATIONAL SECURITY LETTERS (NSL) rather than using search warrants that required a judge's signature.
@paulsperry_ Comey issued thousands of NSLs over his tenure. If someone's cat got stuck up a tree, it might warrant an NSL to drag the cat out of the tree, but, for some reason, Comey passed on doing that, or anything else, about "Cozy Bear."
@paulsperry_ So, you're Vladimir Putin, the real life "Dr. Evil," and you have a hacking group so skilled they are, in reality, USERS OF THE DNC NETWORK AND MOST OF ITS ASSETS. At least one of the Cozy Bear boys has some kind of Administrative Privileges.
You put the B team into the DNC network, GRU's bunch that gets caught most of the time they do anything like this.
Try to hack the Anti-Doping organization of the Olympics? They get caught. They also get photographed at the airport.
@paulsperry_ Try to hack the OPCW, the UN body investigating use of chemical weapons in Syria at their headquarters in The Hague?
They get caught in an automobile crammed with electronics by Dutch intelligence. They are photographed again.
@paulsperry_ Yes, after Putin has a hacking group on the DNC network for an entire year, with the run of the place, and no evidence anyone knows the hackers are in there, your first instinct is to send another hacking group in there that behaves this way, in the words of Donna Brazile:
@paulsperry_ "Fancy Bear (the GRU team) showed up in April 2016. Fancy Bear, the one our IT Department detected, was loud and did not seem concerned about being found out...Fancy Bear smashed in the front window and raged around grabbing whatever was at hand..." (Brazile, Donna:HACKS, Pg.138
@paulsperry_ The more is discovered about this story, the stupider it gets. On top of all of this, Fancy Bear didn't steal the emails as alleged until May 23 and May 25, after two months of letting everyone know their presence on the network. Crowdstrike was hired on May 5, 2016 to stop...
@paulsperry_ ...the alleged Russian hacks. The only way to do this was disconnect from the Internet under the guise of upgrading the system. Crowdstrike was not allowed to do this. As related by Donna Brazile in her book HACKS:
@paulsperry_ "In May, when Crowdstrike recommended that we take down our system and rebuild it, the DNC told them to wait a month, because the state primaries for the presidential election were still underway."
The emails were exfiltrated on May 23 and May 25, 2016. Now, I used to think...
@paulsperry_ ...Crowdstrike could see the emails being stolen, because that was what was reported at the time. Shawn Henry, in charge of the Incident Response for Crowdstrike told Congress in classified testimony that Crowdstrike could not see documents being exfiltrated. That month cost...
@paulsperry_ ...the DNC 44,000 stolen emails. No one is sure what all Cozy Bear stole while operating as users of the DNC network, but there was at least one transmission to Moscow in 2015, according to the FBI.
@McAdooGordon They don't do their homework and cannot read statutes properly. Three of the four counts in Smith's indictment on the J6 case are not applicable to what Smith wrote in the main body of the indictment. Judges should have checked the elements of the statutes, 18 USC 241,,,
@McAdooGordon ...and 18 USC 1512 have no elements that apply to any of that case.
Trump did not perform any acts of physical violence on anyone, and certainly did not do such things while wearing a disguise. Lawyers keep reading the Title of the Statute, "Conspiracy Against Rights," and....
@McAdooGordon ...just charge someone with 18 USC 241, the anti-KKK statute from the 1870s. The title means nothing. The elements of the statute are what determine if someone is chargeable. Smith was actually accusing Trump of violating 18 USC 1346, "Scheme or Artifice to Defraud,"...
With the passage of amendments to the Electoral Count Act, the Vice President, as President of the Senate, can no longer make unilateral decisions of this kind, but is only there for ceremonial duties. These measures were passed in 2022 to make sure such decisions cannot be...
...made by the President of the Senate.
I don't they could after the Hayes-Tilden contested election that included "Alternate Electors'" certificates of votes along with the "Certificates of Ascertainment" submitted by the governors of some former Confederate States in 1877.
@pitch4kdemocrat@marklevinshow@MarcSeeks Ask yourself why there are only 30+ counts in the indictment when 337 total documents were involved in the investigation. Let's take a look back to see what happened to the rest of them.
@pitch4kdemocrat@marklevinshow@MarcSeeks The First 197 documents with classification markings were inside 14 of the 15 boxes that were sent by Trump to NARA. It was THOSE documents with classification markings that were sent to the National Security Division (NSD) of the DOJ for Jay Bratt, the chief of NSD for...
@EdKrassen According to the US v Miller (1939) the maintenance of a "Well Regulated Militia" means that those firearms most like those used by the military are the protected arms under 2d Amendment.
@EdKrassen "In the absence of any evidence tending to show that possession or use of a "shotgun having a barrel of less than eighteen inches in length" at this time has some reasonable relationship to the preservation or efficiency of a well regulated militia,
@EdKrassen "we cannot say that the Second Amendment guarantees the right to keep and bear such an instrument. Certainly it is not within judicial notice that this weapon is any part of the ordinary military equipment,
@Chris_D_Steele So, we can be confident that Putin had compromising information about BOTH of the candidates of the two major parties since you reported as much in the dossier, starting in the first memorandum.
@Chris_D_Steele "Asked about the Kremlin’s reported intelligence feed to TRUMP over recent years and rumours about a Russian dossier of ‘kornpromat’ on Hillary CLINTON (being circulated), Source B confirmed the file’s existence. S/he confided in a trusted compatriot that it had been collated by
@Chris_D_Steele "Department K of the FSB for many years, dating back to her husband Bill’s presidency, and comprised mainly eavesdropped conversations of various sorts rather than details/evidence of unorthodox or embarrassing behavior. Some of the conversations were from bugged comments..
@emeriticus Not a thing odd about semi-covert CIA connections in situations like this. Here's some more:
In their book, THE ESPIONAGE ESTABLISHMENT, David Wise and Thomas Ross discuss the findings of the Church Committee about how CIA used charitable foundations as money laundries.
@emeriticus One man running the MD Anderson Foundation of Houston, Texas as a "conduit" for CIA money was LEON JAWORSKI, the Special Counsel investigating Watergate.
@emeriticus On Twitter today, we find another example: