The Obama Use of FISA-702 as a Domestic Political Surveillance Program….


Now that we have significant research files on the 2015 and 2016 political surveillance program; which includes the trail evident within the Weissmann/Mueller report; in combination with the Obama-era DOJ “secret research project” (their words, not mine); we are able to overlay the entire objective and gain a full understanding of how political surveillance was conducted over a period of approximately four to six years.

Working with a timeline, but also referencing origination material in 2015/2016 – CTH hopes to show how the program operated.  This explains an evolution from The IRS Files in 2010 to the FISA Files in 2016.

The FISA-702 database extraction process, and utilization of the protections within the smaller intelligence community, was the primary process.  We start by reviewing the established record from the 99-page FISC opinion rendered by Presiding Judge Rosemary Collyer on April 26th, 2017; and explain the details within the FISC opinion.

I would strongly urge everyone to read the FISC report (full pdf below) because Judge Collyer outlines how the DOJ, which includes the FBI, had an “institutional lack of candor” in responses to the FISA court.  In essence, they were continually lying to the court about their activity, and the rate of fourth amendment violations for illegal searches and seizures of U.S. persons’ private information for multiple years.

Unfortunately, due to intelligence terminology Judge Collyer’s brief and ruling is not an easy read for anyone unfamiliar with the FISA processes outlined. The complexity also helps the media avoid discussing, and as a result most Americans have no idea the scale and scope of the issues.  So we’ll try to break down the language.

.For the sake of brevity and common understanding CTH will highlight the most pertinent segments showing just how systemic and troublesome the unlawful electronic surveillance was.

Early in 2016 NSA Director Admiral Mike Rogers was alerted of a significant uptick in FISA-702(17) “About” queries using the FBI/NSA database that holds all metadata records on every form of electronic communication.

The NSA compliance officer alerted Admiral Mike Rogers who then initiated a full compliance audit on/around March 9th, 2016, for the period of November 1st, 2015, through May 1st, 2016.

While the audit was ongoing, due to the severity of the results that were identified, Admiral Mike Rogers stopped anyone from using the 702(17) “about query” option, and went to the extraordinary step of blocking all FBI contractor access to the database on April 18, 2016(keep these dates in mind).

Here are some significant segments:

The key takeaway from these first paragraphs is how the search query results were exported from the NSA database to users who were not authorized to see the material.  The FBI contractors were conducting searches and then removing, or ‘exporting’, the results.  Later on, the FBI said all of the exported material was deleted.

Searching the highly classified NSA database is essentially a function of filling out search boxes to identify the user-initiated search parameter and get a return on the search result.

FISA-702(16) is a search of the system returning a U.S. person (“702”); and the “16” is a check box to initiate a search based on “To and From“.   Example, if you put in a date and a phone number and check “16” as the search parameter the user will get the returns on everything “To and From” that identified phone number for the specific date.  Calls, texts, contacts etc.  Including results for the inbound and outbound contacts.

FISA-702(17) is a search of the system returning a U.S. person (702); and the “17” is a check box to initiate a search based on everything “About” the search qualifier.  Example, if you put a date and a phone number and check “17” as the search parameter the user will get the returns of everything about that phone.  Calls, texts, contacts, geolocation (or gps results), account information, user, service provider etc.  As a result, 702(17) can actually be used to locate where the phone (and user) was located on a specific date or sequentially over a specific period of time which is simply a matter of changing the date parameters.

And that’s just from a phone number.

Search an ip address “about” and read all data into that server; put in an email address and gain everything about that account. Or use the electronic address of a GPS enabled vehicle (about) and you can withdraw more electronic data and monitor in real time.  Search a credit card number and get everything about the account including what was purchased, where, when, etc.  Search a bank account number, get everything about transactions and electronic records etc.  Just about anything and everything can be electronically searched; everything has an electronic ‘identifier’.

The search parameter is only limited by the originating field filled out.  Names, places, numbers, addresses, etc. By using the “About” parameter there may be thousands or millions of returns.  Imagine if you put “@realdonaldtrump” into the search parameter? You could extract all following accounts who interacted on Twitter, or Facebook etc.  You are only limited by your imagination and the scale of the electronic connectivity.

As you can see below, on March 9th, 2016, internal auditors noted the FBI was sharing “raw FISA information, including but not limited to Section 702-acquired information”.

In plain English the raw search returns were being shared with unknown entities without any attempt to “minimize” or redact the results.  The person(s) attached to the results were named and obvious.  There was no effort to hide their identity or protect their 4th amendment rights of privacy:

But what’s the scale here?  This is where the story really lies.

Read this next excerpt carefully.

The operators were searching “U.S Persons”.  The review of November 1, 2015,  to May 1, 2016, showed “eighty-five percent of those queries” were unlawful or “non compliant”.

85% !!  “representing [redacted number]”.

We can tell from the space of the redaction the number of searches were between 1,000 and 9,999 [five digits].  If we take the middle number of 5,000 – that means 4,250 unlawful searches out of 5,000.

The [five digit] amount (more than 1,000, less than 10,000), and 85% error rate, was captured in a six month period.

Also notice this very important quote: “many of these non-compliant queries involved the use of the same identifiers over different date ranges.”   So they were searching the same phone number, email address, electronic “identifier”, or people, repeatedly over different dates.  Specific people were being tracked/monitored.

Additionally, notice the last quote: “while the government reports it is unable to provide a reliable estimate of” these non lawful searches “since 2012, there is no apparent reason to believe the November 2015 [to] April 2016 coincided with an unusually high error rate”.

That means the 85% unlawful FISA-702(16)(17) database abuse has likely been happening since 2012.  (Again, remember that date, 2012) Who was FBI Director? Who was his chief-of-staff? Who was CIA Director? ODNI? etc.  Remember, the NSA is inside the Pentagon (Defense Dept) command structure.  Who was Defense Secretary? And finally, who wrote and signed-off-on the January 2017 Intelligence Community Assessment?

Tens of thousands of searches over four years (since 2012), and 85% of them are illegal.  The results were extracted for?…. (I believe this is all political opposition use; and I’ll explain why momentarily.)

OK, that’s the stunning scale; but who was involved?

Private contractors with access to “raw FISA information that went well beyond what was necessary to respond to FBI’s requests“:

And as noted, the contractor access was finally halted on April 18th, 2016.

[Coincidentally (or not), the wife of Fusion-GPS founder Glenn Simpson, Mary Jacoby, goes to the White House the next day on April 19th, 2016.]

None of this is conspiracy theory.

All of this is laid out inside this 99-page opinion from FISC Presiding Judge Rosemary Collyer who also noted that none of this FISA abuse was accidental in a footnote on page 87:  “deliberate decisionmaking“:

Summary of this aspect: The FISA court identified and quantified tens-of-thousands of search queries of the NSA/FBI database using the FISA-702(16)(17) system.  The database was repeatedly used by persons with contractor access who unlawfully searched and extracted the raw results without redacting the information and shared it with an unknown number of entities.

The outlined process certainly points toward a political spying and surveillance operation; and we are not the only one to think that’s what this system is being used for.

Back in 2017 when House Intelligence Committee Chairman Devin Nunes was working to reauthorize the FISA legislation, Nunes wrote a letter to ODNI Dan Coats about this specific issue:

SIDEBAR: To solve the issue, well, actually attempt to ensure it never happened again, NSA Director Admiral Mike Rogers eventually took away the “About” query option permanently in 2017. NSA Director Rogers said the abuse was so inherent there was no way to stop it except to remove the process completely. [SEE HERE]  Additionally, the NSA database operates as a function of the Pentagon, so the Trump administration went one step further.  On his last day as NSA Director Admiral Mike Rogers -together with ODNI Dan Coats- put U.S. cyber-command, the database steward, fully into the U.S. military as a full combatant command. [SEE HERE]

There is little doubt the FISA-702(16)(17) database system was used by Obama-era officials, from 2012 through April 2016, as a way to spy on their political opposition.  Quite simply there is no other intellectually honest explanation for the scale and volume of database abuse that was taking place.

When we reconcile what was taking place and who was involved, then the actions of the exact same principle participants take on a jaw-dropping amount of clarity.

All of the action taken by CIA Director Brennan, FBI Director Comey, ODNI Clapper and Defense Secretary Ashton Carter make sense.  Including their effort to get NSA Director Mike Rogers fired.

Everything after March 9th, 2016, was done to cover up the weaponization of the FISA database. [Explained Here]  Spygate, Russia-Gate, the Steele Dossier, and even the 2017 Intelligence Community Assessment (drawn from the dossier and signed by the above) were needed to create a cover-story and protect themselves from discovery of this four year weaponization, political surveillance and unlawful spying.  Even the appointment of Robert Mueller as special counsel makes sense; he was FBI Director when this began.

The beginning decision to use FISA(702) as a domestic surveillance and political spy mechanism appears to have started in/around 2012. Perhaps sometime shortly before the 2012 presidential election and before John Brennan left the White House and moved to CIA.  However, there was an earlier version of data assembly that preceded this effort.

Political spying 1.0 was actually the weaponization of the IRS.  This is where the term “Secret Research Project” originated as a description from the Obama team.  It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller.  It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks?  Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS.  All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

The IRS scandal was never really about the IRS, it was always about the DOJ asking the IRS for the database of information.  That is why it was transparently a conflict when the same DOJ was tasked with investigating the DOJ/IRS scandal.  Additionally, Obama sent his chief-of-staff Jack Lew to become Treasury Secretary; effectively placing an ally to oversee/cover-up any issues.  As Treasury Secretary Lew did just that.

Lesson Learned – It would appear the Obama administration learned a lesson from attempting to gather a large opposition research database operation inside a functioning organization large enough to have some good people that might blow the whistle.

The timeline reflects a few months after realizing the “Secret Research Project” was now worthless (June 2012), they focused more deliberately on a smaller network within the intelligence apparatus and began weaponizing the FBI/NSA database.

How this all comes together in 2019

Fusion GPS was not hired in April 2016 to research Donald Trump.  As shown in the evidence provided by the FISC, the intelligence community was already doing surveillance and spy operations. The Obama administration already knew everything about the Trump campaign, and were monitoring everything by exploiting the FISA database.

However, after the NSA alerts in/around March 9th, 2016, and particularly after the April 18th shutdown of contractor access, the Obama intelligence community needed Fusion GPS to create a legal albeit ex post facto justification for the pre-existing surveillance and spy operations.  Fusion GPS gave them that justification in the Steele Dossier.

That’s why the FBI small group, which later transitioned into the Mueller team, are so strongly committed to and defending the formation of the Steele Dossier and its dubious content.  The Steele Dossier contains the cover-story and justification for the surveillance operation.

During a rather innocuous podcast discussion panel April 12th, 2019, one of President Trump’s personal lawyers Jay Sekulow mentioned the FBI had three FISA applications denied by the FISA court in 2016. [Podcast Here – Note comment at 25:05]   The denials were always suspected; however, until now no-one in/around the administration has ever confirmed.

If Sekulow is accurate, this adds additional context to the actions of the FBI in the aftermath of Admiral Mike Rogers and an increased urgency in gaining legal justification for surveillance and spy operation unlawfully taking place.  A valid FISA warrant would help the FBI cover-up the surveillance.   The likely targets were Manafort, Flynn and Papadopoulos…. but it appears the DOJ/FBI were rebuked.

These FISC denials would then initiate institutional panic dependent on the election outcome.  An insurance policy would be needed.   The Steele Dossier becomes the investigative virus the FBI wanted inside the system. To get the virus into official status, they used the FISA application as the delivery method and injected it into Carter Page. The FBI already knew Carter Page; essentially Carter Page was irrelevant, what they needed was the FISA warrant and the Dossier in the system {Go Deep}.

Fusion GPS was not hired to research Trump, the intelligence community was already doing surveillance and spy operations. The intelligence community needed Fusion GPS to give them a plausible justification for already existing surveillance and spy operations.

Fusion-GPS gave them the justification they needed for a FISA warrant with the Steele Dossier.  Ultimately that’s why the Steele Dossier is so important; without it, the DOJ and FBI are naked with their FISA-702 abuse as outlined by John Ratcliffe.

.

♦ Prove the July 31st, 2016, Crossfire Hurricane operation originated from fraud by exposing the CIA operation that created the originating “Electronic Communication” memo. Declassify that two-page “EC” document that Brennan gave to Comey.

♦ Release and declassify all of the Comey memos that document the investigative steps taken  by the FBI as an outcome of the operation coordinated by CIA Director John Brennan in early 2016.

♦ Reveal the November 2015 through April 2016 FISA-702 search query abuse by declassifying the April 2017 court opinion written by FISC Presiding Judge Rosemary Collyer. Show the FBI contractors behind the 85% fraudulent search queries. [Crowdstrike? Fusion-GPS? Nellie Ohr?]

♦ Subpoena former DOJ-NSD (National Security Division) head John Carlin, or haul him in front of a grand jury, and get his testimony about why he hid the abuse from the FISA court in October 2016; why the DOJ-NSD rushed the Carter Page application to beat NSA Director Admiral Mike Rogers to the FISA court; and why Carlin quit immediately thereafter. Squeeze this bastard’s nuts in the proverbial legal vice.

♦ Prove the Carter Page FISA application (October 2016) was fraudulent and based on deceptions to the FISA Court. Declassify the entire document, and release the transcripts of those who signed the application(s); and/or depose those who have not yet testified.

♦ Release all of the Lisa Page and Peter Strzok text messages without redactions. Let sunlight pour in on the actual conversation(s) that were taking place when Crossfire Hurricane (July ’16) and the FISA Application (Oct ’16) were taking place.

♦ Release all of Bruce Ohr 302’s, FBI notes from interviews and debriefing sessions, and other relevant documents associated with the interviews of Bruce Ohr and his internal communications. Including exculpatory evidence that Bruce Ohr may have shared with FBI Agent Joseph Pientka. [And get a deposition from this Pientka fella]

♦ Release the August 2nd, 2017, two-page scope memo provided by DAG Rod Rosenstein to special counsel Robert Mueller to advance the fraudulent Trump investigation, and initiate the more purposeful obstruction of justice investigation. Also Release the October 20th, 2017, second scope memo recently discovered.

Dragons, Divine Parents, Heroes and Adversaries: A complete cosmology of being


Published on Jun 16, 2014

SUBSCRIBE 1.9M
This lecture describes the world as a place of action and value (as opposed to a place of objective things), and lays out the manner in which religious thinking is descriptive of that world. It provides a good introduction to Dr. Peterson’s other lectures.

Assange’ “Special Software” was LINUX?


COMMENT: I looked at the indictment for Julian Assange which is freely available and am shocked that in the paragraph numbered 9, it specifically calls a ‘Linux Operating System’ a SPECIAL SOFTWARE for accessing part of a password.

I have always felt a certain amount of skepticism regarding the whole Assange affair and this seems to me to be the seeds of outlawing Linux users like myself. I would not be able to find my own password using a Linux CD.

REPLY: If you look at the allegation of Russian hacking the Democrats, you find it was just a phishing email requesting you reset your password. That was by no means a sophisticated hack by a nation state with huges resources. We all get this phishing email and it is a standard practice of a scammer who uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information – such as account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money or your identity or both.

The government is relying on the fact that the majority of people have no idea what these terms even mean. The allegation against Assange is absurd and it is as bogus as claiming the Democrats were hacked by Russia with a simple phishing email.

USA Wants Britain to Hand over Assange on Pretended Computer Hacking & Will Keep Manning in Prison until She Agrees to Testify Against him


 

In order for the USA to petition a UK court for extradition, the alleged crime MUST be also a crime in the UK. Typically, the charged person will raise that his case is “political” and judges, agents of governments, will usually dismiss it out of hand even when they know it is political. To date, claiming you are politically sought has NEVER carried the day in a court of law because courts just do as the government demands. However, Julian Assange’s case may be the rare one where it finds some traction at least among the population.

The WikiLeaks founder has a real live political prosecution claim against the extradition process on claimed computer hacking. The USA  indictment unsealed immediately after Julian Assange was dragged out of the Ecuadorian Embassy in London by British police shows that this is also a coordinated effort to keep Chelsea Manning in prison again to compel her to ultimately testify against Assange. Manning was charged with 22 offenses, including aiding the enemy, which was the most serious charge and could have resulted in a death sentence. She was ultimately sentenced to 35 years in prison.

Anyone who thinks Assange will only face 5 years should just go work for the government for you obviously believe in propaganda. They will expand Assange’s charges only when he gets to the USA for otherwise the US must put on its case in London to get their hands on him. They will allege that he aided the enemy being Putin to defeat Hillary and seek the death penalty. Their thirst for his blood stems from his publishing the Democrat’s emails that they regard cost them the election.

The extradition treaty provides for an exception – “political offenses.” There’s no clear definition of that term, however, it is known to cover crimes like treason, espionage, and sedition, as well as offenses that are directed in some way against the power of the state.

assange_indictment_(Complete)

The exception for “political offenses” helps explain the narrow nature of the Assange indictment. Assange’s indictment comes in at just six pages and charges him with a single count of conspiracy to commit computer intrusion. They have charged him with conspiracy from 2010 because they do not have proof that he actually hacked any computer. They allege he “helped” Manning to hack it assisting her regarding the password. That means they will need Manning to testify that he did that and if she refuses, some FBI against will swear on the stand that is how she got access.

But as soon as they get their hands on Assange’s neck, they will supersede the indictment and move for the death penalty. The charge of conspiracy to gain access to a government computer is not a political offense but he will have to argue it is really espionage to try to defeat the USA. But the USA will most likely have the judge in their pocket. Even if he were to win, HIGHLY UNLIKELY given the lack of any real rule of law any more, then if he ever left Britain, they would go after him in another country.

The acts alleged are in 2010. Conspiracy is an ongoing offense. Normally, the statute of limitations will prevent Assange from being indicted. But we are not dealing with honest justice or any rule of law that a rational person would believe.  Under conspiracy, your burden is to PROVE you “withdrew” from a conspiracy and that is when the statute of limitations will begin to run. They will most likely argue that he never withdrew. They will re-indict him and seek the death penalty as they did with Chelsea Manning or life in prison until he dies.

The only escape from such ruthless tyranny is indeed death. These people will never stop.

Corruption Of The US Temperature Record


Published on Apr 10, 2019

SUBSCRIBE 19K
In this video I explain the corruption of the US temperature record by NOAA and NASA – and show that their justifications for data tampering are not scientifically valid. Blog post with links here : https://realclimatescience.com/2019/0…

AOC’s Green New Deal: Debunking the Climate Alarmism Behind Bringing Full Socialism to America


Published on Mar 15, 2019

SUBSCRIBE 13K
The Heartland Institute’s panel on the Green New Deal at CPAC 2019. Full session with no editing and slides (those to come later on HeartlandTube channel). Speakers: James Taylor, senior fellow at The Heartland Institute; Paul Blair of Americans for Tax Reform; Justin Haskins, Executive Editor at The Heartland Institute and author of “Socialism is Evil.”

Shocking Use of FISA by Obama’s FBI to Spy on Trump Campaign – Exclusive with Tony Shaffer


SUBSCRIBE
Events in the 2016 elections were unprecedented. Top FBI officials knowingly used information paid for by the campaign of Hillary Clinton to obtain a #FISA #spy warrant on a member of the #TrumpCampaign. Meanwhile, top Obama administration officials also spied on the campaign, using so-called unmasking requests. Those same FBI agents, however, chose to look the other way when it came to the risks posed by Clinton’s use of a private email server. We now know that emails she send as Secretary of State through that server were automatically copied to an unknown foreign entity. Looking ahead of the 2020 elections, the question is whether the FBI has been reformed enough to make sure political bias don’t influence investigations. Today we sit down with Tony Shaffer, acting president of the London Center for Policy Research. He served as a Lieutenant Colonel in U.S. Army, where he was a senior intelligence officer. Today he’s also an advising producer for National Geographic and a member of the Trump 2020 advisory board.

 

Eyewitness to a Massacre


Published on Mar 21, 2019

SUBSCRIBED 122K

Watching the New Zealand massacre through the eyes of the shooter gave Firewall host Bill Whittle a look into the abyss that exists between offhanded tweets and the actual insanity of mass murder.

Mueller’s Report Confirms there was No Russian Hack to Begin With


Mueller’s Report is what was expected. The report does conclude that the Trump campaign did not conspire with Russia during the 2016 election, according to the letter from Barr to Congress. It notes that Mueller’s investigation found the campaign was given “multiple offers from Russian-affiliated individuals to assist the Trump campaign” but no one within the campaign or “anyone associated with it” conspired with Russia.

Essentially, Mueller’s report marked the end of an investigation that was launched in secret months before Trump was even elected by the Democrats. The FBI began gathering clues that made them suspicious of aides to Trump’s campaign under the direction of the Obama Administration which even calls into question Comey’s entire integrity given his white-wash of Hillary’s emails and selling influence via the now-defunct Clinton Foundation.

The FBI probe fueled by Hillary’s dossier she paid to go after Trump mushroomed to include allegations that began with Hillary whether the campaign coordinated with Russian efforts to interfere in the 2016 election. She furthered the idea that Trump himself attempted to obstruct her victory. There was bad blood between Hillary and Putin, to begin with. Putin accused Hillary of inciting a political protest in Russia back in 2011.

Interestingly enough, how do we know the server was hacked since the Democrats refused to turn it over to the FBI? Where is it now? The Democrats seem to have refused to cooperate with the FBI on Russia’s Supposed hacking, and intentionally destroyed the physical evidence of Russian Hacking if it ever existed. Where are the servers, and shouldn’t some Democrats be charged with Obstruction of Justice and aiding espionage for not cooperating in the investigation and destroying evidence? The Democrats (DNC) claimed to have been hacked by Russians ahead of the 2016 presidential election.

However, the timeline rarely is ever looked at in detail and the fact that there was no professional hacking of anyone’s computers. The entire access was simply gained by a fake email saying reset your password known as a phishing email. John Podesta simply did what the fake email said. We all get these and they are not something unique to high-level Russian intelligence, CIA, NSA or any government agency. Teenage kids in their basement try this sort of thing.

The New York Times reported in detail, the FBI discovered that a hacking group linked to the Russian government had gained access to at least one computer at the DNC. However, when the FBI contacted the DNC in September 2015 to let them know, the organization’s tech-support contractor didn’t do much with the information beyond performing “a cursory search of the DNC computer system logs to look for hints of such a cyberintrusion.”

If we assume that there was a professional hack underway, the DNC was notified and did nothing. Indeed, it actually took nine months before DNC officials even held a formal meeting with the FBI about the alleged hack. By that time, it was too little, too late if there was a professional hack, to begin with. The hackers, whoever they were, ultimately had access to the DNC’s network for seven months before top DNC officials ever knew about the attack or hired anyone to combat it. During that time, the hackers stole countless emails and documents, later releasing them to the public.

TIMELINE:

  1. September 2015 – The FBI contacts the DNC’s IT department warning that at least one computer has been compromised by Russian hackers. A technician scans the system and does not find anything suspicious.
  2. November 2015 – The FBI reaches out again to the DNC this time warning them that one of their computers is transmitting information back to Russia. DNC later admitted that IT technicians failed to pass along the message that the system had been breached in typical government worker fashion.
  3. March 19, 2016 – Clinton campaign chairman John Podesta received a phishing email masked as an alert from Google that another user had tried to access his account. This is not a high-level hack but a very common way to get into anyone’s computer. It contains a link to a page where Podesta can change his password and he shared the email with a staffer from the campaign’s help desk. The staffer replies with a typo – instead of typing “This is an illegitimate email,” the staffer types “This is a legitimate email.” Podesta follows the instructions and types a new password, allowing hackers to access all his emails. This was clearly NOT a major sophisticated hack that one would associate with Russia, CIA, or NSA tactic with unlimited resources.
  4. June 12, 2016 – In an interview on British television, WikiLeaks founder Julian Assange says that the website has obtained and will publish a batch of Clinton emails.
  5. June 14, 2016 – The Washington Post reports hackers working for the Russian government accessed the DNC’s computer system. They stated that oppositional research on Donald Trump was taken along with staffers’ emails and chat exchanges. The Kremlin came out and denied that the Russian government was linked to the hack. A US official then told CNN that investigators did not yet conclude that there was a cyberattack directed by the Russian government. This was clearly just a phishing email and not even a high-level cyberattack, which we all get from time to time by people trying to into our accounts.
  6. June 15, 2016 – A cybersecurity firm hired by the DNC posts a public notice on its website describing an attack on the political committee’s computer network by two groups associated with Russian intelligence. According to the post, two Russian-backed groups called “Cozy Bear” and “Fancy Bear” tunneled into the committee’s computer system. In response, a blogger called Guccifer 2.0 claims that he alone conducted the hack, not the Russians. As proof, he posts internal DNC memos and opposition research on Trump. Furthermore, Guccifer 2.0 claims to have passed along thousands of files to WikiLeaks. This was by no means a real hack to even begin with just a low-level phishing email that even a teenager often does and got lucky. Guccifer 2.0 claims were certainly far more credible than the pretend claims by the DNC that this linked back to Russia to start with.
  7. July 22, 2016 – A few days before the DNC convention, WikiLeaks published nearly 20,000 emails hacked from the DNC server. The documents include notes in which DNC chair Debbie Wasserman Schultz insults staffers from the Bernie Sanders campaign and messages that infer the DNC wants Hillary and not Bernie. Wasserman Schultz resigns in the aftermath of that leak.
  8. July 25, 2016 – The FBI announced it was launching an investigation into the DNC “hack” when it was clearly just a phishing email, to begin with, and not a cyberattack at all. Although the statement doesn’t indicate that the agency had a particular suspect in mind, the FBI was pointing the finger at Russia.
  9. July 27, 2016 – During a press conference, Trump talks about Clinton’s use of a private email server while she was secretary of state and calls on hackers to find the 30,000 deleted emails as a joke.
  10. August 12, 2016 – Hackers publish cell phone numbers and personal email addresses for Nancy Pelosi and other members of the Democratic Congressional Campaign Committee.
  11. September 1, 2016 – Putin in an interview with Bloomberg News, said that he and the Russian government have no ties to the hackers. He said that the identity of the culprit or culprits is not as important as the content of the leaks, and ultimately the hackers revealed important information for voters. That much I would have to agree since nothing was fake or altered.
  12. September 22, 2016 – Then Dianne Feinstein and Adam Schiff, the ranking Democratic members of the Senate and House Intelligence Committees, issued a joint statement declaring that based on information they received during congressional briefings, they believe that Russian intelligence agencies carried out a plan to interfere with the election without any hard evidence whatsoever.
  13. September 26, 2016 – During a presidential debate with Clinton, Trump questions whether the DNC cyberattack was carried out by a state-sponsored group or a lone hacker. “It could be Russia, but it could also be China. It could also be lots of other people. It also could be somebody sitting on their bed that weighs 400 pounds.” Indeed, there simply was NO sophisticated cyberattack – just a childish phishing email.
  14. October-November 2016 – Over the course of a month, WikiLeaks published more than 58,000 messages simply taken from the account of John Podesta, Clinton’s campaign chairman because he gave them the password.
  15. October 6, 2016 – DCLeaks, a self-described collective of “hacktivists” seeking to expose the influence of special interests on elected officials, published a batch of documents stolen from Clinton ally Capricia Marshall. DCLeaks is later also claimed to have links to the Russian military intelligence.
  16. October 7, 2016 – The Department of Homeland Security and the Office of National Intelligence on Election Security issued a joint statement declaring that the intelligence community is “confident that the Russian Government directed the recent compromises of emails from US persons and institutions.” According to their statement which is not genuine, they claimed that the document releases on websites WikiLeaks and DCLeaks mirror the methods and motivations of past Russian-directed cyberattacks. But this was not even a cyberattack. It was a low-level phishing email that would not identify a high-level national-level intelligence hacking operation.
  17. November 29, 2016 – Then, after the election, a group of Democratic senators sent a letter to President Obama demanding he declassifies information about “the Russian Government and the US election” intelligence hacking. The Obama Administration then said publicly that they shared with lawmakers that intelligence claiming Russia’s purpose for meddling in the election was to sway voters towards Trump, rather than broadly undermining confidence in the system.

Phishing Email (Fake Email to Get you to Put in Your Password)

What’s less clear is that there was no sophisticated hacking of the DNC servers. This was simply a low-level phishing email that we all get. This is NOT the hallmark of Russian Intelligence, CIA, NSA or any other major government with all their sophistication. It is truly amazing how people have called this “hacking” which means in the computer world someone breaks into your system – not that you give them your password.

Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”

The official definition of Hacking – Cyber-Laws.COM

This simple phishing email has produced a cascade of other criminal investigations targeting people around Trump. The investigation led to the indictment of 34 people and three companies on scores of charges that were never related to the subject matter, to begin with. Dozens of Russian nationals were charged with hacking Democratic computers and spreading disinformation during the campaign. Several Trump aides were convicted of lying to Congress or investigators, or for campaign-finance violations or for tax and bank fraud. All of this for something that was NEVER an actual hack of anyone’s computers.

Thomas Sowell on Intellectuals and Society


Published on Dec 16, 2009

SUBSCRIBE 114K
The author of more than a dozen books, Dr. Sowell is now a senior fellow at the Hoover Institution. In his newest work, Intellectuals and Society, he will discuss why so many disasters of our time have been committed by experts or intellectuals. You may remember FDRs Brain Trust which according to later studies is a prolonged the depression by several years. The wiz kids at the pentagon under McNamara who managed to mess up the Vietnam War, you can run through an impressive list of things, of disasters brought about by people with very high IQ