An HONEST Wealthy Affiliate Review (WealthyAffiliate.com

Scholarly articles/Studies, Mega-thread #2

You guys seemed to like my last post and I got lots of good feedback so I think Ill turn this into a monthly thing, Special thanks to u/IStandWithMises for his thread on economics, as always please feel free to link any studies/articles to be included next month 😊
Sites to see if studies are valid/other studies they are used in
http://mjl.clarivate.com/
https://www.scijournal.org/
https://www.scimagojr.com/journalrank.php
studies on the brain differences in trans people vs cis gendered people
https://academic.oup.com/jcem/article/85/5/2034/2660626
https://www.ncbi.nlm.nih.gov/pubmed/15724806
https://academic.oup.com/brain/article/131/12/3132/295849
https://www.sciencedirect.com/science/article/pii/S1053811909003176?via%3Dihub
https://www.sciencedirect.com/science/article/pii/S0022395610001585?via%3Dihub
https://eje.bioscientifica.com/view/journals/eje/155/suppl_1/1550107.xml
https://www.jsm.jsexmed.org/article/S1743-6095(15)32399-7/fulltext
https://www.sciencedirect.com/science/article/pii/S0022395610003250?via%3Dihub
https://academic.oup.com/cercoarticle/21/11/2525/275208
https://academic.oup.com/cercoarticle/18/8/1900/285954
https://onlinelibrary.wiley.com/doi/full/10.1111/j.1440-1819.2009.02059.x
General Gender memes
Dsm 5 Definition of Gender dysphoria
https://en.wikipedia.org/wiki/Gender_dysphoria
https://www.merriam-webster.com/dictionary/gender
Clinical Management of Gender Dysphoria in Children and Adolescents
Different types of biological sexes
https://www.joshuakennon.com/the-six-common-biological-sexes-in-humans/
https://www.nature.com/news/sex-redefined-1.1694
rapid onset transgender debunked
http://www.sciencemag.org/news/2018/08/new-paper-ignites-storm-over-whether-teens-experience-rapid-onset-transgender-identity
https://www.reddit.com/Destiny/comments/a8y8dd/heads_up_that_the_rapid_onset_gender_dysphoria/
Suicide in the Transgender community
https://williamsinstitute.law.ucla.edu/wp-content/uploads/AFSP-Williams-Suicide-Report-Final.pdf https://www.erudit.org/en/journals/ss/2013-v59-n1-ss0746/1017478aabstract/ https://www.sciencedirect.com/science/article/pii/S1158136006000491 https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0016885
Economics general
minimum wage
https://boingboing.net/2018/10/28/fight-for-15.html https://aneconomicsense.org/2013/03/06/the-impact-of-increasing-the-minimum-wage-on-unemployment-no-evidence-of-it/ https://www.investopedia.com/articles/personal-finance/013015/how-minimum-wage-impacts-unemployment.asp https://www.policynote.ca/the-problems-with-the-textbook-analysis-of-minimum-wages/
Cost of Living Compare to 20 Years Ago
Whether You Win 1 Million Or Lose A Leg -- It Really Makes No Difference
The gender pay gap situation in the EU
Health care
https://data.oecd.org/healthres/health-spending.htm https://www.healthsystemtracker.org/chart-collection/health-spending-u-s-compare-countries/#item-average-wealthy-countries-spend-half-much-per-person-health-u-s-spends https://www.tandfonline.com/doi/abs/10.1080/15228053.2007.10856117 https://www.commonwealthfund.org/publications/issue-briefs/2015/oct/us-health-care-global-perspective https://stats.oecd.org/Index.aspx?DataSetCode=HEALTH_PROC https://www.jhsph.edu/news/news-releases/2019/us-health-care-spending-highest-among-developed-countries.html https://www.cihi.ca/sites/default/files/document/text-alternative-version-2016-cmwf-en-web.pdf
Domestic violence
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1854883/ https://www.hindawi.com/journals/jcrim/2014/897093/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2968709/?fbclid=IwAR0JH5j_EZ2k9pqNRO-RFfpJP5q1uTNP5mkIJ8ZMNkjkLVsULYNOLW_A3ss http://connect.springerpub.com/content/sgrvv/14/1/55?sigma-login=has-destination&implicit-login=true https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4520416/ http://www.econgeography.org/faculty/dhines/June_2009_LA_Conference_Presentation%20w%20corrections.pdf
General Immigration memes
Destiny’s Debate with Nick Fuentes over Immigration
Immigration’s effect on wages
https://www.cato.org/cato-journal/fall-2017/does-immigration-reduce-wages https://www.politico.com/magazine/story/2016/09/trump-clinton-immigration-economy-unemployment-jobs-214216
Immigrants as Economic Contributors https://immigrationforum.org/article/immigrants-as-economic-contributors-immigrant-tax-contributions-and-spending-powe
https://www.cato.org/blog/immigrants-their-children-use-less-welfare-third-higher-generation-americans https://www150.statcan.gc.ca/n1/pub/11-626-x/11-626-x2015051-eng.htm http://www.un.org/en/development/desa/population/migration/publications/migrationreport/docs/MigrationReport2017_Highlights.pdf
Most-Accepting Countries for Migrants
https://news.gallup.com/poll/216377/new-index-shows-least-accepting-countries-migrants.aspx?g_source=World&g_medium=newsfeed&g_campaign=tiles https://news.gallup.com/poll/233147/migrant-acceptance-canada-follows-political-lines.aspx
Muslim Immigration vs Christian
http://www.people-press.org/2011/08/30/muslim-americans-no-signs-of-growth-in-alienation-or-support-for-extremism/ https://news.gallup.com/poll/148763/Muslim-Americans-No-Justification-Violence.aspx http://www.people-press.org/2011/08/30/section-2-religious-beliefs-and-practices/ https://www.cato.org/blog/muslims-rapidly-adopt-us-social-political-values http://www.pewforum.org/2009/01/15/abortion-views-by-religious-affiliation/ http://apnorc.org/news-media/Pages/News+Media/AP-NORC-Poll-Christian-Muslim-split-on-religious-freedom.aspx http://www.pewforum.org/religious-landscape-study/views-about-abortion/#religious-tradition-trend http://www.pewforum.org/2017/07/26/political-and-social-views/
IQ and race
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3341646/
Transgenerational epigenetic inheritance
”race” is a social construct
https://anthrosource.onlinelibrary.wiley.com/doi/abs/10.1525/tran.2000.9.2.19 https://www.nature.com/articles/ng1439 https://www.americananthro.org/ConnectWithAAA/Content.aspx?ItemNumber=2583 https://psycnet.apa.org/doiLanding?doi=10.1037%2F0003-066X.60.1.46 https://bigthink.com/politics-current-affairs/racial-purity-is-scientifically-meaningless-say-8-000-geneticists?rebelltitem=1#rebelltitem1
Problems with IQ tests
https://psycnet.apa.org/buy/1987-17534-001 https://psycnet.apa.org/record/2007-01670-000 https://www.sciencedirect.com/science/article/pii/S0191886916310984?via%3Dihub
Race vs IQ
https://scholar.harvard.edu/files/fryefiles/testing_for_racial_differences_in_the_mental_ability_of_young_children.pdf https://www.sciencedirect.com/science/article/pii/016028969290028P
Poverty Impedes Cognitive Function
http://science.sciencemag.org/content/341/6149/976 http://www.jneurosci.org/content/early/2018/12/26/JNEUROSCI.1808-18.2018
Cold Winters and the Evolution of Intelligence
Gun violence
Priorities for Research to Reduce the Threat of Firearm-Related Violence
Crime stats in certain countries
https://www.statista.com/statistics/283093/homicide-in-england-and-wales-uk-y-on-y/ https://www.gov.uk/government/statistics/historical-crime-data http://www.crimestats.aic.gov.au/NHMP/1_trends/ https://aic.gov.au/publications/tandi/tandi359 https://www150.statcan.gc.ca/n1/pub/11-630-x/11-630-x2015001-eng.htm https://en.wikipedia.org/wiki/Crime_in_the_United_States
US Mass Shootings, 1982-2019
Climate change
https://climate.nasa.gov/scientific-consensus/ https://www.skepticalscience.com/global-warming-scientific-consensus-intermediate.htm https://iopscience.iop.org/article/10.1088/1748-9326/8/2/024024 http://science.sciencemag.org/content/301/5635/929 https://www.sciencedirect.com/science/article/pii/S0140673606680793 http://science.sciencemag.org/content/277/5325/494 http://science.sciencemag.org/content/299/5615/2005 https://www.sciencedirect.com/science/article/pii/S0033350606000059
Opposing climate change stuff
https://www.forbes.com/sites/uhenergy/2016/12/14/fact-checking-the-97-consensus-on-anthropogenic-climate-change/#5432e2151157 https://www.forbes.com/sites/alexepstein/2015/01/06/97-of-climate-scientists-agree-is-100-wrong/#7a14c0fc3f9f
Race in the Criminal in the Criminal justice system https://www.ussc.gov/sites/default/files/pdf/research-and-publications/research-publications/2017/20171114_Demographics.pdf https://www.nber.org/papers/w25355 https://www.tandfonline.com/doi/abs/10.1198/016214506000001040 https://chicagounbound.uchicago.edu/uclf/vol1994/iss1/4/ https://muse.jhu.edu/article/190680 https://www.annualreviews.org/doi/10.1146/annurev-lawsocsci-102510-105445 https://eric.ed.gov/?id=EJ913052 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5026124/ https://www.tandfonline.com/doi/abs/10.1080/07418825.2012.761721 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2561263/ https://journals.sagepub.com/doi/abs/10.1177/2153368715602932?journalCode=raja https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4843483/
General drug memes
https://psychonautwiki.org/wiki/Psychoactive_substance_index https://dancesafe.org/product/complete-set-of-all-8-testing-kits/
Participate in Research The Sham Of Drug Testing For Benefits
Psychedelic’s and Psychosis or Psychedelic’s Induced Schizophrenia?
https://jamanetwork.com/journals/jamapsychiatry/article-abstract/493118 https://jamanetwork.com/journals/jamapsychiatry/article-abstract/491752 https://journals.sagepub.com/doi/abs/10.3109/00048679509075894
The Psychedelics and the Default mode network https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0118143 https://www.frontiersin.org/articles/10.3389/fnhum.2014.00020/full https://www.gaia.com/article/psychedelic-research-finds-ego-exists-in-the-default-mode-network https://www.pnas.org/content/109/6/2138.short https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3501603/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6085561/
Psychedelic’s for Depression, anxiety, PTSD, and addiction
https://www.webmd.com/mental-health/news/20180918/psychedlic-drugs-to-treat-depression-ptsd https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4342293/ https://www.ncbi.nlm.nih.gov/pubmed/10506904 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4592297/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5603818/ https://www.tandfonline.com/doi/abs/10.1080/02791072.2002.10399952 https://www.ncbi.nlm.nih.gov/pubmed/30471683 http://www.cmaj.ca/content/187/14/1054.short http://www.m.legaliser.nu/sites/default/files/files/Shaping%20the%20renaissance%20of%20psychedelic%20research.pdf https://www.tandfonline.com/doi/abs/10.1080/02791072.2014.877321 https://www.biologicalpsychiatryjournal.com/article/S0006-3223(17)32241-2/abstract http://archie.kumc.edu/handle/2271/1175 http://www.berkeleywellness.com/healthy-mind/mood/article/will-psychedelic-drugs-soon-be-legal https://maps.org/research
Weed
Cannabinoids and psychosis
Cannabinoid receptor agonists upregulate and enhance serotonin 2A (5-HT(2A)) receptor
Science Behind Marijuana And Metabolism
Alcohol and Tolerance
https://pubs.niaaa.nih.gov/publications/aa28.htm https://books.google.ca/books?id=_PshAgAAQBAJ&pg=PT121&lpg=PT121&dq=alcohol+tolerance+speed+of+recovery+from+insobriety&source=bl&ots=2-C5ZQLpWL&sig=pvzF7uKkjEyPrNSwYZCbhLsi_qo&hl=en&sa=X&ved=2ahUKEwjCp8vNhdrfAhUKtIMKHdt2Ah8Q6AEwBHoECAIQAQ#v=onepage&q=alcohol%20tolerance%20speed%20of%20recovery%20from%20insobriety&f=false https://www.oregon.gov/olcc/docs/publications/50_signs_visible_intoxication.pdf
Prescription Stimulants
https://www.drugabuse.gov/publications/drugfacts/prescription-stimulants https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3489818/
Prescription Opioids
https://www.cdc.gov/drugoverdose/data/prescribing.html?CDC_AA_refVal=https%3A%2F%2Fwww.cdc.gov%2Fdrugoverdose%2Fdata%2Foverdose.html https://www.camh.ca/en/health-info/mental-illness-and-addiction-index/prescription-opioids
Hallucinogen persisting perception disorder
https://en.wikipedia.org/wiki/Hallucinogen_persisting_perception_disorder https://link.springer.com/chapte10.1007%2F7854_2016_457
Substance-induced psychosis disorder
https://en.wikipedia.org/wiki/Substance-induced_psychosis https://europepmc.org/abstract/med/18278990 https://jamanetwork.com/journals/jamapsychiatry/fullarticle/208288
Was Hitler a Socialist?
https://youtu.be/hUFvG4RpwJI?t=12 http://www.ub.edu/graap/nazi.pdf https://www.historytoday.com/uwe-osteautobahn-myth https://www.dw.com/en/the-myth-of-hitlers-role-in-building-the-autobahn/a-16144981 https://www.ns-archiv.de/nsdap/sozialisten/sozialisten-verlassen-nsdap.php https://www.snopes.com/news/2017/09/05/were-nazis-socialists/ https://www.snopes.com/fact-check/hitler-nazis-capitalist-system/ https://www.politifact.com/truth-o-metestatements/2018/aug/03/donald-trump-jdid-nazi-platform-echo-democratic-platform-donald-/ https://www.reddit.com/AskHistorians/comments/6uwg20/were_nazis_socialists/ https://www.youtube.com/watch?v=gfHXJRqq-qo
Bill C-16 and JP
https://www.reddit.com/Destiny/comments/9ie1yf/lets_talk_bill_c16_and_jordan_peterson/ (these link are all from my post above)
http://www.ohrc.on.ca/en/questions-and-answers-about-gender-identity-and-pronouns https://laws-lois.justice.gc.ca/eng/Const/page-15.html https://laws-lois.justice.gc.ca/eng/acts/h-6/page-1.html#h-3 http://www.parl.ca/DocumentVieween/42-1/bill/C-16/royal-assent https://laws-lois.justice.gc.ca/eng/acts/C-46/section-319.html https://lop.parl.ca/sites/PublicWebsite/default/en_CA/NotFound?Language=E&ls=c16&Parl=42&Ses=1&source=library_prb https://www.youtube.com/watch?v=KnIAAkSNtqo&t=1s https://en.wikipedia.org/wiki/Hate_speech_laws_in_Canada https://en.wikipedia.org/wiki/Freedom_of_speech_in_Canada https://laws-lois.justice.gc.ca/eng/acts/C-46/section-318.html#h-93 https://www.cba.org/CMSPages/GetFile.aspx?guid=be34d5a4-8850-40a0-beea-432eeb762d7f
trump/Russia memes
https://www.politico.com/interactives/2017/politico-morning-consult-poll/ https://www.washingtonexaminer.com/opinion/russia-used-turning-point-usa-memes-to-wage-a-propaganda-war https://www.sciencedirect.com/science/article/pii/S0191886918306184 https://news.byu.edu/news/does-political-party-trump-ideology https://www.thedailybeast.com/russias-secret-weapon-americas-idiocracy https://www.sciencedirect.com/science/article/pii/S0191886918302332 http://annotateddossier.com/
Random Stuff/Bonus memes
https://www.upmc.com/media/news/111418-alcohol-and-weather?T=AU https://www.simplypsychology.org/loftus-palmer.html https://en.wikipedia.org/wiki/Little_Albert_experiment https://www.microsoft.com/en-us/research/publication/why-do-nigerian-scammers-say-they-are-from-nigeria/?from=http%3A%2F%2Fresearch.microsoft.com%2Fpubs%2F167719%2Fwhyfromnigeria.pdf https://www.jhsph.edu/news/news-releases/2018/increased-motor-activity-linked-to-improved-mood.html https://www.scientificamerican.com/article/neuroscientists-make-a-case-against-solitary-confinement/ https://i.imgur.com/WaxIolU.jpg http://science.sciencemag.org/content/349/6251/aac4716 https://news.gallup.com/poll/245789/record-numbers-americans-leave.aspx?g_source=link_NEWSV9&g_medium=NEWSFEED&g_campaign=item_&g_content=Record%2520Numbers%2520of%2520Americans%2520Want%2520to%2520Leave%2520the%2520U.S. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3712619/ https://digest.bps.org.uk/2019/01/21/teenagers-lack-of-insight-into-some-of-their-abilities-has-implications-for-career-counselling/ https://www.sciencedirect.com/science/article/pii/S2352827318300223 http://www.hartford-hwp.com/archives/45a/060.html http://blog.practicalethics.ox.ac.uk/2014/09/motte-and-bailey-doctrines/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4074317/ https://warwick.ac.uk/newsandevents/pressreleases/train_the_brain https://www.bath.ac.uk/announcements/more-unites-us-than-divides-us-say-researchers/ https://www.ncbi.nlm.nih.gov/pubmed/26847946
bonus, bonus meme destiny keep on ignoring my Emails, twitch chat and reddit posts to talk about drugs
submitted by ravage037 to Destiny [link] [comments]

I'm the one who came up with the idea for this sub, so it only makes sense for me to run for president!

I posted this thread on findareddit, and it took off way more than I expected it would! So of course, since I asked about it in the first place, I obviously want to participate! I've been thinking about this sort of thing for a while, so I have a great big list of policies in my head, so there will be quite a lot of things for you to go over. Obviously, since we have a system of checks and balances in place, this all assumes that Congress and the Senate would actually work together with me and not block my every attempt to change something.
Anyway, on to the list!
About Me
Political Affiliation: None, Center, Third Party, Parties are Stupid, whichever you'd like to call it.
Religion: Agnostic
Big Debates
  • Abortion is legal nationwide under my administration. I believe people deserve the right to choose whether or not they want to be parents.
  • Gay marriage is legal nationwide. However, I will respect individual beliefs in that someone can refuse to marry you for any reason - but you will simply be able to find someone else to marry you. But again, the marriage itself is legal and no state can make a law to prohibit you to marry or refuse to acknowledge your marriage.
  • Free speech will be enforced, as well as all other parts of our constitution. This means that no private nor public entity will be permitted to restrict your right to freely speak your mind, so long as you do not break other laws in the process (i.e. you cannot legally threaten to kill somebody without repercussions).
  • As it is part of our constitution, it is without question that guns are legal nationwide. No law shall be permitted which restricts a person's right to own a gun unless that person is a convicted felon or is deemed to be mentally unsound.
War
  • I am firmly anti-war. I will extend a hand of peace to all nations, even nations that we have had a bad relationship with, in order to form a peace treaty and ceasefire between as many nations as possible. It won't bring world peace, but I believe it could at the very least make some level of difference.
  • I will pull soldiers out of nearly every warzone we are currently fighting on. Most wars that America gets involved in simply aren't our wars to fight, and as such, I will be removing our troops from them. Troops will be brought home to take a more defensive stance, or deployed towards relief efforts.
  • I vow to never attack another nation without a very good reason. I will never allow my military to be the first to strike, and I will never order a war against an entire nation for the actions of a single terrorist.
  • I will not use the military to interfere with the established administration of a country, even if that administration is blatantly evil. It is not America's place to be world police and overthrow nations. It is not our problem.
  • If you can't tell, this obviously means major cuts to military spending, which will then be repurposed to other things that need the money far more than our war machine.
  • We will no longer sell weapons to other countries. Period.
Technology
  • Free nationwide Wi-Fi for all Americans. New networks will be rolled out to provide this service, and while it won't be the best or fastest internet service out there, it is meant to be for the poor or for people in areas where better internet access is not available. There will be no need for accounts or logins, you just connect to the government Wi-Fi service and go. And no, I will not permit any data collection on the users of this service, which brings me to...
  • The NSA's spying program is shut down, effective immediately. No American citizen will have their data collected by the government or law enforcement without being a suspect of a crime and having a warrant.
  • I will enforce Net Neutrality. I will not permit ISPs to throttle or block content for any reason.
  • ISPs will be forced to make their service comparable with other developed nations. They will be required to provide higher speeds for lower prices. They will of course be competing with my free nationwide internet, and if they want to stay in business, they better get their asses in gear and give the people a better service!
  • I will push for more solar power.
  • More funding for NASA.
  • Predatory microtransaction, DLC and loot-box practices in video games will be made illegal.
  • In general, more money will be spent on technology, technology infrastructure and teaching the next generation of Americans to build and use that technology.
Foreign Policy
  • In addition to what I said above about being anti-war and attempting to establish a peace treaty, there are a few other things related to foreign policy I'd like to discuss.
  • All aid and funding for Israel is to be cut off immediately. I am firmly disgusted with the actions of the Israeli government and it is ludicrous that America gives them so much free money and weapons. Until Israel can leave Palestine the fuck alone, they will receive nothing from us. This is not a Jewish vs Islam issue - this is an Israeli government issue (before some dumbass accuses me of being a Nazi for not supporting Israel).
  • As I want to be more friendly and peaceful with other countries in general, I'd like to push for better trade policies with various countries.
Education
  • Passing of a law prohibiting colleges from charging unreasonable amounts for student tuition.
  • Abolishing of Common Core and bringing control of how to teach back to the teachers.
  • More funding for education in general. Paid for by higher taxes on the rich and lowered military spending.
Healthcare
  • Free national healthcare. Period. All of your treatments will be covered. This will be funded by increased taxes on the rich and lowered military spending.
  • Passing of laws that prevent medical companies from charging unreasonably high prices for their medicine and services.
Taxes, Welfare and Money
  • I will considerably raise taxes on the extremely wealthy. Sorry Mr. Moneybags, you may not be able to afford a sixth Yacht this year.
  • Other upper classes will also see a raise in taxes, though not as much as the highest class will.
  • Lower and middle classes will see their taxes being lowered.
  • Tipping will no longer be expected, and all employers must pay their employees no less than minimum wage.
  • Speaking of which, minimum wage is going up!
  • More money for people on Disability, especially those who are profoundly disabled, so that they can live a more comfortable life.
Government
  • Lobbying will be redefined as what it actually is - bribery, and shall be made illegal. Any politician found to be taking money from a person or corporation in a way that may influence their vote will be prosecuted.
  • A law shall be passed prohibiting politicians from sneaking unrelated legislation into bills, especially those that must be passed such as budget bills.
  • Term limits will be instated on both Congressmen and Senators. No Congressman nor Senator shall hold their position for more than 8 years.
  • Fully electronic voting machines will be banned due to their high error rate, and we will return to using paper ballots that are counted electronically.
  • The CIA is gonna get torn down and rebuilt from the ground up. It's no secret that there is a lot of dirty, horrible things being done there, and I will weed out all the corruption and throw all the criminals in the CIA into prison.
  • Let's just say that a whole lot of corrupt politicians are going to fuckin' jail.
Police
  • I will push for a demilitarization of police.
  • Police will be held accountable for their actions. If they shoot someone who can be proven to have not been violently resisting or a potential danger to the officer or another person, then they will be charged with murder and punished as any other citizen would.
  • Asset Forfeiture (police being legally allowed to rob you) will be illegal unless you have been convicted of a crime, and only assets directly related to that crime may be claimed.
Holidays
  • Columbus Day will be removed and replaced with Native American's Day, which will be a federal holiday.
  • Election Day will also be a federal holiday and only election workers will be working that day.
Media
  • Did you know the media is legally allowed to spread outright propaganda? Yeah, I'm putting a stop to that.
  • The News media will be held accountable for publishing lies. If the media can be proven to knowingly be pushing lies in order to push an agenda, they will be fined and possibly jailed. Exceptions will obviously be made for news outlets that are obviously satirical in nature.
Immigration
  • Legal immigration will be made easier and cheaper. That doesn't mean it will necessarily allow more people in than before, but it will be an easier process to go through, and thus encourage more people to immigrate legally as opposed to illegally.
  • I will begin a program to allow illegal immigrants to come forward and admit that they came here illegally, and go through a process to become legal citizens. As long as they have no criminal record (here or in their home country) and have a reasonable excuse for why they came here illegally in the first place, they can stay (in most cases). They will however be required to take English classes and demonstrate a basic understanding of the language as a part of this process.
  • I will not permit any mass immigration. These huge crowds of thousands of refugees will not be allowed to immigrate as a whole. We simply can't afford to take care of them all.
Transparency
  • Are aliens real? Did Bush do 9/11? Who REALLY killed JFK? Whatever the truth may be, I will find out, and the public WILL know the truth.
  • Paid shills will be made illegal. That means that people who are paid to influence your opinion while pretending to be an ordinary citizen will be facing jail time.
  • The TLDR Act. All bills put into motion in our government must offer a clear, concise and easy to understand summary, which is provided to the public for all to see on an official government website. Being deceptive in this summary will be punishable by law.
Ethics and Censorship
  • Profanity will no longer be required to be censored in media or television. Appropriate language warnings will still be in place, but it will be up to parent's discretion on what they feel their kids should be seeing/hearing. It is not the government's responsibility to police language.
  • As stated above, free speech will be enforced, and anyone violating another's rights to free speech will be subject to fines.
  • Media companies (gaming, film, etc) will be prohibited from censoring the content of a foreign work during the process of localization without the consent of the original creator(s).
Crime
  • Digital piracy will be reclassified. It will no longer be considered theft, but it will have it's own legal classification. As piracy does not remove a product, but instead copies it, it cannot be considered the same as theft, and thus it will have a lesser punishment than physical theft.
  • No organization shall be permitted to sue an individual or organization for committing piracy for an amount greater than the value of what was pirated. (i.e. if you download a $60 game, you owe them $60 if they catch you, not $6,000,000).
  • Illegal drug users will be sent to rehab instead of jail on their first offense.
  • Falsely claiming that you have been the victim of a crime will carry the same punishment as the crime you falsely accused someone of.
  • Prostitution will be legal, but only with proper regulation and protections to prevent abuse, sex trafficking, etc.
  • Animated pornography will be legal in all circumstances. If no human or animal, living or dead, is harmed in the production of the animated pornography, then no matter it's contents, it should be legal to produce and to view.
  • Violations of the constitution would be taken very seriously and would be prosecuted with the full extent of the law.
Alcohol and Drugs
  • I am personally heavily against the usage of both drugs and alcohol... but I know that most Americans do not feel that way. As such, to some extent, I will put aside my opinions on this matter to give the people (mostly) what they want.
  • Medical Marijuana would be legalized nationwide. Though I disagree with the recreational use of it, there is clear scientific proof that there are numerous health benefits and people should be able to make use of them.
  • Recreational Marijuana would continue to be decided on a state-by-state basis.
  • However, the laws on abuse of both marijuana and alcohol would become more strict. Abusing them and driving, or committing a crime while under the influence will result in even harsher penalties than they currently have.
  • All other currently illegal drugs will remain illegal, however, users of these drugs will NOT be immediately sent to jail, but instead will be given the opportunity to go to rehab for at the very least their first offense (even if they had previous offenses before the law goes into effect, they'll still get a chance for rehab).
Prison
  • For-profit prisons will be outlawed.
  • A massive prison reform will take place, focusing more on rehabilitation rather than punishment, especially for relatively minor crimes.
Other Social Issues
  • Transgendered people will be required to use the bathrooms of whatever sex is currently in their pants. However, laws will also be in place requiring businesses to offer a unisex, private bathroom for such individuals to use if they feel the need.
  • Transgender athletes will not be permitted to compete in official gender-segregated sports. This has proven to be a serious problem with transgender athletes having an unfair advantage in several different cases.
  • No gender other than male or female will be officially recognized by the US government (Exception being to those who are literally born with both sets of genitalia). People who claim to be non-existent genders/other species/etc may be subject to psychiatric evaluation.
  • No law nor government program shall be permitted which grants special privileges or rights to any person or group of people based on their race, sex, gender, religion etc. Everyone shall be granted the same rights and freedoms as everyone else. This means that yes, Affirmative Action is gone.
So... Would you vote for me? Please explain why or why not.
submitted by A_Wild_Taka_Appears to unForPresident [link] [comments]

Am I closing my project?

Hello, redditors!
~
Thank you for experimenting with me and my project https://coinpricebet.com! In a few weeks I've gone through multiple economic models and I think I've found one working. Placing bets on 5-minute intervals is both fun and not as random as you may think. Skilled traders feel the market and can predict prices precisely. Successful bets are returned immediately, and their profits will be taken from not-as-lucky players. This works with many player and solid pools in long term. I also constantly testing my system on prices history, telling me that math is on my side.
To be honest, this project was my hobby and I was hoping to build a business able to be profitable from the very beginning, but, again, it needs solid investments into pools and marketing and time, which I don't want to spend on this anymore. I'd better continue developing mobile games :D
My particular project has some potential, like:
Wrapping up, it can be the next big D-App, yes.
~
That's why I've thought of selling my whole project to a more wealthy guy, as it's ready to go:
I hope a mod of this sub could be an escrow?
I'm waiting for proposals here in comments, or in PM. I will update the largest price in this post.
~
Current price: $20
~
Thanks for your attention!
P.S: If it doesn't sell in 3 days, it's just gone ;)
submitted by coinpricebet to Stellar [link] [comments]

Thoughts on my culminating analysis of Russia's involvement in the U.S elections?

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however.
First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to.
Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by MangekyouSharinganKa to AskTrumpSupporters [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to geopolitics [link] [comments]

Letter to My Dad about Russiagate

Dear Dad,
You are the person who made me into a progressive. We’ve had rich talks about politics since I was a teen, and I love you for that. Right now, though, we see things differently viz. Trump and Russiagate. I understand and respect your thinking on all this, but I feel like I need to carefully write down my own thoughts to give you my perspective. Please pardon typos or factual inaccuracies (which are hopefully minor).
I’ll start with the leaks that have come out since Comey’s firing. They suggest that: (1) Comey was tightening the noose with the Russia investigation (this is possibly true, but the “noose” is more likely around Flynn, Manafort and/or Page, not Trump); (2) Comey was seeking money from Congress to expand the Russia investigation (apparently the Justice Department now says this was NOT the case); (3) Trump was furious with Comey for his Congressional testimony about being “mildly nauseous” about tipping the election to Trump; (4) Trump was also furious with Comey for not making a serious investigation of the leaks that have undermined him, and instead putting the Russia investigation first.
None of it proves that Trump is in Putin’s pocket (you and I agree on this). It’s political theater. Trump certainly looks like he fired Comey to impede the Russia investigation, but there’s no evidence of that. He had other reasons to fire Comey.
Be that as it may, what I want to point out is that the people at the center of the swirl, Flynn, Manafort, and Page—shady characters all—are only symptoms of a much larger problem that festers in our party, too. They are being made into scapegoats, if you will. Our media and Democratic leaders portray them as sui generis examples of “treason,” when more likely they are just representative of a rampant corruption that has nothing specifically to do with Russia or even Trump.
First, let me rehearse my understanding of the charges against Flynn: (1) he allegedly spoke about Obama’s sanctions in his phone call with the Russian ambassador in December, before Trump took office, presumably telling the ambassador that he would see to it that sanctions were lifted. Perhaps, too, he was stupid enough to thank the ambassador for Russian hacking, or perhaps said he didn’t give a damn about the hacking allegations and that he’d advise Trump not to investigate; (2) he took $45,000 from Russia to attend an RT event, where he sat at a table with Putin; (3) he did not properly register as a representative/agent of a foreign government (Russia and Turkey both).
According to Sally Yates, former acting attorney general, whom the NSA supplied with a transcript of Flynn’s call, Russia could have used Flynn’s words to blackmail him. I don’t see it. Whatever Flynn said viz. Russia and sanctions was probably technically illegal, since he wasn’t yet part of the administration, but not treasonous, nor vulnerable to blackmail. My guess is that Yates was legally and factually correct in her actions and assumptions (except for the blackmail part), but prosecutorial in her representations of them. I could be wrong ... Flynn might have said something even more egregious. He does seem to be the biggest fool in the administration apart from Bannon and Trump himself. Nevertheless, I reserve judgment until the facts are available.
As for the charges against Paul Manafort and Carter Page: Page was supposedly recruited by Russia agents … this came out in a court case in 2013 in which Page was called to testify. Page was never charged with wrongdoing, but did have Russian friends, and was a pro-Russia lobbyist, basically. Page, like Flynn, it seems, should have registered as a representative/agent of a foreign government, but didn’t. He technically violated the law, but was he actually in Russia’s pay to act as a secret agent? I haven’t heard any evidence of that, though maybe the FBI has turned up some. Still, he is small potatoes. At best he could have advised the Trump administration to be friendly toward Russia. He had no power.
Manafort had been head of a Ppolitical agency working with Ukraine’s pro-Russian president. He, too, should have registered as a representative/agent of a foreign government, but didn’t. But was he in Russia’s pay to do Putin’s secret bidding? So far, there’s no evidence of that, though again, perhaps the FBI has turned up something. More likely, Manafort simply had business ties to Russia and was more than willing to push the administration to favor Russia, but wasn’t an actual spy. Or, maybe the lines between being a spy and being someone who is pro-Russian, and who does business with Russians, is so blurry that it’s impossible to tell the difference. In the present state of things, however, the blurriness might well be replaced by accusations of treason, just like in the McCarthy era.
My question to the U.S. media and powers-that-be would be: is it unheard of, until now, for powerful people in government and/or industry to work on a contractual basis for foreign governments and/or take money for services, e.g., speaking at an event in that country? (The Clintons certainly come to mind in this regard). Is it unheard of, until now, for foreign governments to curry favor with U.S. political and financial elites by paying them for services, or by paying them to serve in a public relations capacity? Is it unusual, until now, for our own U.S. corporations to curry favor, moreover, with U.S. elites or with foreign elites in these very same ways?
I doubt that any of it is unheard of, or even rare. It’s wrong and unethical, but my guess is that such behavior only comes to light when someone is very very mad about a “stolen election.” At other times, it goes under the media’s radar, mostly. In fact even, now, most of it is going under the radar. In focusing narrowly on a Russia-Trump scandal, our media fails to give us a fuller view of the corruption endemic to our system, of which Flynn, Page, and Manafort are minor examples.
I’ll point out that the press did almost no investigation into ties between the Clinton campaign and staff members affiliated with, say, Ukraine, or Israel (though we did get a smattering of reporting on nations like Saudi Arabia and Norway that contributed to the Clinton Foundation specifically to curry favor). Are we therefore to assume that powerful Israelis, and/or the Israeli government, or powerful Saudis, do not curry favor with powerful Americans in the same way that the Russians do? Do powerful Ukrainians, and/or the Ukrainian government, not curry favor with powerful Americans—including people in Clinton’s campaign—the same way the Russians do? Maybe not. But can we say definitively no, they don’t? Or can we only say that journalists and the FBI haven’t investigated these ties, though they have investigated ties between Trump people and Russians due to the current climate of anger at Russia’s alleged election interference? (By the way, what ever happened to the FBI’s supposed investigation into the Clinton Foundation … the press barely mentioned it during the campaign, and hasn’t mentioned it since the election at all, so far as I know.)
Manafort, Page, and Flynn may well have broken the law by not registering as spokesmen/agents for a foreign nation, but the same can probably be said for dozens or hundreds of others who never get investigated. Not to mention the fact that American politics is organized around legalized bribery by American corporations that hire former “public servants” as lobbyists, or pay them for giving speeches, etc. etc. Is Flynn’s taking $45,000 to speak at an RT event qualitatively different from Hillary Clinton taking hundreds of thousands from Wall Street to give speeches? Or Bill Clinton taking huge payments to give speeches in foreign nations, when his wife was planning to run for president? And what about the hundreds of millions of dollars that pro-Israel Americans put into presidential, Senate, and House campaigns specifically in order to elect leaders favorable to Israel (Hillary Clinton is today dining with Haim Saban, her biggest donor, I believe, who said something like “I’m a single issue guy, and my issue is Israel”)? Are those donors not working on behalf of a foreign government? Such contributions, I might add, dwarf any remuneration Russia has given to its alleged operatives associated with Trump.
On Deep State: Some reporters and Democrats are now telling us that “there is no Deep State”; there’s only Trump paranoia, or left-wing paranoia, causing us to imagine one. The CIA, NSA, and FBI happily work for the American people, we are told. Those agencies don’t pursue their own agendas over and above the agendas of elected officials. Thus we have no reason to be suspicious of our intelligence agencies’ assertion that Russia interfered in the election, or that Trump administration underlings were/are working on behalf of Putin. And yet there is a Deep State, and we have many examples of it. For one: James Clapper, the former head of the NSA, lied to Congress in 2013 testimony about the nature of the NSA’s data collection programs, telling Congress that the NSA does not gather data from U.S. citizens. Part of what Edward Snowden leaked proved that Clapper had been telling a lie—the NSA was indeed collecting massive data from U.S. citizens—but no action was taken against Clapper (in fact, he was promoted). The CIA, moreover, has a long and documented history of lying to Congress and the American public, stretching from the Bay of Pigs to the present. Glenn Greenwald at has a fine article detailing the numerous instances of the CIA and/or NSA lying to the public over the past four decades. https://theintercept.com/2016/12/10/anonymous-leaks-to-the-washpost-about-the-cias-russia-beliefs-are-no-substitute-for-evidence/
Snowden’s reward for his whistleblowing was exile in Russia. The CIA and its allies (McCain, Graham, etc.) have meanwhile tarred him as a Russian agent. They are now trying to shut down Assange and Wikileaks (the Trump administration itself is doing this, partly no doubt to respond to the Russia-done-it hysteria). How very convenient for Deep State that Democrats—traditionally defenders of civil liberties, free speech, and whistleblowers—are now frothing at the mouth to jail Assange, and Snowden, too, if they get the chance (and what a wonderful legal precedent they’ll set for any journalist who leaks information damaging to Deep State in the future). By the way, the case for Snowden being a Russian agent is based on a debunked story about his time at a Hong Kong hotel, where he turned over his information and allowed himself to be interviewed by American journalists. Supposedly there was a multi-day period that was unaccounted for, during which time he was huddled with Russian operatives. The Intercept and others have debunked that story, but NSA/CIA and their water-carriers are still telling people, without evidence, that Snowden was a Russian spy.
Both the CIA and NSA meanwhile are deeply invested in protecting Ukraine and the Baltic states from Russia. Both agencies are also deeply invested in protecting the EU from Russian “interference.” Both agencies have deep and profound ties to NATO, which has itself been long dedicated to isolating Russia from the rest of Europe. The CIA, if not the NSA, meanwhile has a long history of interfering in elections in other nations—including European nations—whether through mere propaganda, or “fake news,” or through actual coups (among the most recent being the overthrow of the elected, pro-Russian president of Ukraine in 2014. I’m not sure what role the CIA played, but the State Department did approve the coup and helped organize the new government). CIA and NSA high-ups will presumably work against any U.S. administration sympathetic to Russia’s attempts to control—or even influence—Ukraine or the Baltic. In short, the Democrats who claim “there is no Deep State” are fooling themselves. There is a Deep State, and it can and does work against elected U.S. leaders when it perceives itself and its goals threatened.
Regarding a question that both of us wonder about: Do we know for certain that Russia hacked DNC and Podesta documents/emails and fed them to Wikileaks?
The “evidence” given to the American public shows that (1) the hackers had IP addresses correlating with Moscow’s time zone (a time zone that also includes Ukraine and Israel, among other nations); (2) that one of the hackers left behind the “signature” of the founder of one of Russia’s modern intelligence agency (why would a Russian hacker do that? Seems highly unlikely); (3) that the hackers seem to have worked during normal Russian business hours (which of course would be normal Ukraine and normal Israeli business hours, too. Moreover, would real Russian hackers, who presumably don’t want to be discovered, work only during normal business hours?); (4) that the hackers used tools and IP addresses associated with “Cozy Bear” and “Fancy Bear,” which are simply names invented by an American cybersecurity firm (CrowdStryke) to identify specific hacking patterns, as revealed by IP addresses, hacking tools, and targets (in other words, the actual hackers … or who they work for … is unknown, though the larger pattern of WHO they hack seems to suggest that they work for Russia. On the other hand, experts have suggested that those same hacking patterns could suggest that they work for other organizations, too).
The problem is that CrowdStryke, like other cybersecurity firms, works backwards in its investigations, first determining the probable malefactor, then seeking evidence to prove the malefactor guilty. Too, since CrowdStryke was the only organization that investigated the DNC servers, we have only their word to go on. In other words, whatever information the government put forward in its public report did not come from its own investigation of DNC servers, but came from CrowdStryke. Behind that information lies whatever secret, classified information that the NSA and CIA have collected, but the public can’t assess that information unless it’s declassified. The NSA, I should add, does apparently have the power to track hacking on its own—without actually investigating the hacked server—but still presumably can be duped by false IP addresses, etc. Too, the official report issued by the Obama administration to prove Russian guilt included no contrarian facts or arguments, even though plenty of cybersecurity experts have posited both. The mainstream media, however, is so certain that Deep State is telling the truth that they don’t bother to investigate contrary theories. They don’t take them seriously. Not only is this because they trust Deep State, but it’s also because they were deeply attached to Clinton’s candidacy, deeply angered that she lost, and angered still further by Trump’s attacks on the media. Instead of doing their job like Edward Murrow, we have people like Maddow mimicking Glenn Beck in putting forward vast conspiracy theories. Some of those theories even insist, without a shred of evidence, that the Russians are assassinating people to keep the full hacking story from coming out.
I should add that I do NOT think Deep State is out-and-out lying or conspiring to hide the truth. I think they believe Russia did it. But their longstanding and deeply held political biases might well cloud their judgment. At the least, the U.S. needs a special commission comprised of experts without any axe to grind who can assess the data and give the public its opinion of whether our intelligence agencies are correct. Bill Moyers said just that when the Russia story broke, but it fell on deaf ears.
Meanwhile, the Washington Post has put a new motto on its masthead, “Democracy Dies in Darkness,” which is pompous and fatuous, and false, given WaPo’s eagerness to print PropOrNot’s McCarthyite crap unfiltered (more on this later), not to mention the false story about Russians hacking Vermont’s grid, not to mention WaPo’s publication of 16 anti-Sanders stories in a 24-hour period during the primaries. I suppose it’s true that Democracy Dies in Darkness, but who’s creating the darkness?
Getting back to the hacking: Can a hacker use an IP address from another nation? Yes, this is easy. They simply hack a computer in another time zone/nation and use it as a robot. This is done constantly as a way to throw off cybersecurity. Can a hacker emulate another hacking group’s pattern? Yes. In particular, a state-sponsored hacker would have the ability to do that.
Were the hacking tools used to gain access to DNC emails available to non-Russian state hackers? Yes, once hackers use a specific tool, it gets released into the larger cyber world. It can get replicated and made available for “open source” upload (which is precisely what happened in this case). Moreover, the tool used by Fancy Bear and Cozy Bear was NOT a modern version. The tool had been updated many times (new versions created), yet these supposedly elite Russian hackers used an old version for some odd and unexplained reason. As for the Podesta emails, the hackers simply used a phishing scam (in other words, they sent an email to Podesta that posed as something official, and which asked him to supply his login and password. He was fooled, and complied, partly because one of his own staff confirmed to him, mistakenly, that the email was authentic and not a scam. The staff member says he accidentally typed “authentic” instead of “inauthentic,” and is now deeply embarrassed by his typo, of course. Phishing scams are ubiquitous. I get phishing emails every single day (which I ignore, or which our own institution’s cybersecurity people catch before they get to my inbox). Phishing is not something that only a Deep State Russian actor can do.
By the way, Fancy Bear and Cozy Bear supposedly represent the two different Russian spy agencies, GRU and FSB (I think it’s FSB). From everything I can glean, U.S. intelligence was not in the least surprised that they hacked into the DNC and/or Podesta. Our intelligence agencies do the same stuff, and do it all the time. Every intelligence agency in the developed world does this. The surprise was that the hackers fed their trove to Wikileaks. The problem is, even if the U.S. can conclusively determine that Russians did the hacking, they can’t be sure that other agencies didn’t also hack the same documents, and that Russians were for certain the actors who supplied Wikileaks. Others have pointed out, moreover, that Russia would be unlikely to give documents to Wikileaks, given that Clinton was overwhelming favored in the election. They surely knew that the U.S. would track the hacks, or try to do so. Why take the risk that Clinton, once president, would even be more anti-Russia and more pro-Ukraine than she already was?
Finally, the Obama administration announced that “all 17” U.S. intelligence agencies agreed that the Russians had hacked the DNC and Podesta emails. That claim in itself deserved profound scrutiny from the media. As journalist Seymour Hersh immediately asked, did the Coast Guard and the Air Force sign off? What would they know about it? In his most recent testimony before Congress, James Clapper admitted that only three agencies produced the report: the NSA, CIA, and FBI. The Obama administration asked the others to rubber stamp it to make the administration’s assertion appear more powerful, and to deter press scrutiny and pushback. Too, the NSA only said that they were “moderately confident” that the Russians conducted the hacks. I think they have since upgraded that to “highly confident,” but not sure. I’m still not convinced.
Another key point: after the DNC found out it had been hacked, it reported the hack to the FBI but refused to let the FBI examine its servers. Instead, it turned to CrowdStryke, a cybersecurity firm with strong ties to the Democratic party and to Ukrainian nationalists. One of CrowdStryke’s two owners/founders is Dimiti Alperovitch, a Russian émigré who also sits on the board of an organization dedicated to defending Ukraine. Alperovitch and his company had in the past asserted that Russia had used cyberwar to destroy 80% of Ukraine’s artillery, an assertion that was proven completely false. No Ukrainian artillery was destroyed by Russian cyberwar, zero (Alperovitch was recently forced to retract this claim). He had also claimed that Russia had launched a vast cyberwar against Georgia during the Russian-Georgian War, another claim that has been debunked (Russians, or at least Russian hackers unaffiliated with the state--but who were doing the state’s bidding anyway—did wage amateurish and ineffectual cyber-war against Georgia. They succeeded at shutting down the public webpages of Georgia’s utilities websites, but not in altering the actual software that controlled the utilities).
Immediately after the illustrious Washington Post wrongly claimed that the Russians had to tried to hack a Vermont utility, our illustrious former CIA chief, James Woolsey, repeated Alperovitch’s claim about Russia’s supposed cyber-attack on Georgian utilities. Woolsey claimed that the Vermont incident was “exactly what the Russians did to Georgia.” But nothing of the sort had happened in Georgia, nor did anything of the sort happen to the Vermont utility. The Vermont utility simply discovered an inert hacking tool on a computer, a tool that had nothing to do with altering the grid. The hacking tool was indeed manufactured in Russia, but was not a tool that only Russians possess … it had been widely disseminated, and is used by hackers all over the world (along with who knows how many other tools manufactured here, or in Russia, or many other nations). How could Woolsey—a former CIA director—jump to a conclusion so demonstrably and profoundly wrong? Doesn’t make him look competent. Yet the press never questioned Woolsey’s misstatement because they were so focused on the Russia-done-it meme.
What the scanty U.S. official report on Russian hacking additionally claimed as evidence was that the Russians had been using their RT network to undermine American democratic institutions. RT’s specifically named sins involved holding debates between third-party candidates (I guess Stein and Johnson) and giving voice to left-wing critics who question whether the U.S. really is a democracy, given the power of money to dictate political outcomes. What I take from this is that the elite CIA/NSA/FBI people making the report assume automatically that the American left (not the establishment Clinton left, but the left represented by Sanders and others) is anti-American, and that any media venue that gives the left a voice is trying to poison the waters of democracy. This was also the conclusion of PropOrNot, the organization that suckered the Washington Post into printing its conclusions on the stolen election, in which it listed virtually every single independent left-wing media outlet as a “dupe” or a knowing instrument of Russian propaganda … because, after all, they were reporting on the Wikileaks material, plus calling attention to the dominance of money in American politics.
This is pure Cold War-think. Yet the American public—particularly those who lived through the Cold War—are receptive to this sort of thinking, and assume that RT is indeed an instrument of Russian propaganda … and that its intent is to undermine American democracy. Sure, Putin might have used RT to divide the left and get Trump elected, but if so, he was only able to do that because the true left is already marginalized by the U.S. corporate-owned media (even so-called “public” radio and television, NPR and PBS, are mere shadows, partly thanks to the basic centrism of their reporters and editors, partly thanks to their paranoia about being abolished, and partly thanks to the fact that they’re no longer public at all, but mostly privately funded by corporate donors and wealthy individuals). And beyond that, assuming Putin really was behind the Wikileaks stuff, what Wikileaks published was nevertheless authentic. The DNC people were indeed feeding anti-Sanders stories to the press; organizing the debate schedule to favor Clinton; giving Clinton debate questions in advance; etc. I don’t think the DNC “stole” the election, as some Bernie people think—nor do I think that electronic voting machines were hacked—but it is abundantly clear that the DNC was pro-Clinton, not neutral. The DNC, in other words, gave Putin the wherewithal to make his evil plan succeed, yet Democrats blame only Putin, not the DNC.
So long as the DNC and the Democratic elites who fund and staff it are unapologetic, I can’t get very mad at Putin, even if he did sponsor the hacking.
Like many other progressives, what I see here is a McCarthyism … not self-conscious McCarthyism, and not on the scale of 1950s McCarthyism, but nevertheless an attempt to tarnish and marginalize the admittedly abysmal and dangerous Trumpites and, in the bargain, the left-wing press, by associating them with Russia and with Putin, who is now considered the most malevolent, diabolical figure on earth. Angry Clinton voters, who should know better, are buying all this stuff, hook, line, and sinker, because the pro-Clinton media (Maddow especially, but lots of others) are feeding it to them, and driving up ratings to all-time highs in the doing. Glenn Beck must be angry that they stole his secret formula. Already they’ve driven a deep wedge between Trump and Russia, thus helping stir up a new cold war, not to mention improve the odds greatly for American involvement in Syria, which could lead to war with Russia.
Sanders, fortunately, is too smart to question the Russia hysteria, which would only get him labeled a dupe. He’s been cool as a cucumber, thank God.
That said, I have no doubt that RT does, to an extent, sponsor programming that tends to help Russian government goals. As I said, they may even have given voice to left-wing American voices in order to divide the left and help Trump win. But the fact is, our own corporate-owned media refuses to give the left a voice, making it impossible to gain a hearing unless through alternative media (whether self-funded online efforts like The Young Turks network, or Democracy Now (a fantastic organization), or RT. Certainly RT is no more given to promoting left-wing points of view than Democracy Now or The Young Turks, which have no Russian connections … but which are alternative outlets that critique mainstream media.
And I’ll add that the mainstream media richly deserves critique. The New York Times is dedicated (mostly) to Clinton’s neoliberal message on domestic policy, neoconservative foreign policy, and was guilty above all others of getting us into the Iraq War by printing Judith Miller’s WMD stories. Unfortunately, that sin wasn’t a one-off mistake; the real problem lies with the centrist, hawkish, pro-Likud, pro-austerity, neoliberal editorial board and owners. They’re all Democrats, I’m sure, but they’re hawkish centrists. These and other members of the elite media and donor class are the people who influenced Hillary Clinton and other Democrats to vote for the Iraq War in 2002, and who continue to influence our Syria, Libya, Yemen, Iran, Iraq policies, not to mention our party’s policies viz. free trade bills, taxation (keep it low!), and health care (no single payer!).
The support that our mainstream media immediately gave to Trump’s Syria strike is telling. The big-time reporters are almost all liberals (conservatives are correct in that assumption), but they’re establishment liberals who are paid unseemly amounts of money, and who support belligerent foreign policy, especially in the Middle East, and who don’t see wealth inequality as a major issue. They’re members of the investor class, after all, unlike the great reporters of Murrow’s generation, or Cronkite’s generation. Maddow gets $30,000 a day, and I’m sure the others on MSNBC aren’t far behind. Yet much of the reporting she has done of late is fabulist, melodramatic crap. Same goes for the Washington Post. Jeff Bezos, the owner of the Post, has a $600 million contract with the CIA; he bought the Post for a mere $250 million. He doesn’t control the editorial board, but they know damn well who they work for. No surprise that they printed the PropOrNot tripe when no other big media outlet would touch it (PropOrNot is an org. with a secret membership comprised of retired intelligence staffers … hardly surprising that they’d tar the left-wing independent press as dupes of Russians).
In short, both the major national print outlets and the major networks are dominated by neo-liberal editorial boards who serve billionaire corporate owners, while their reporters are for the most part careerist, group-think, centrist liberals (for genuine perspective on the issues, I go to Matt Taibbi of Rolling Stone; Glenn Greenwald of The Intercept; Robert Parry of Consortium News; Norman Solomon of Common Dreams; Robert Scheer of Truthdig; and Amy Goodman of Democracy Now … several of them are Pulitzer winners, and all of them work outside the mainstream, and I’d hazard a guess that not one of my friends, including my colleagues, as well as X, X, and X, ever read them. They confine themselves to venues they consider authoritative: the Washington Post and NYT, along with MSNBC and NPPBS, though they also read the occasion piece from ever-centrist, anti-Sanders Vox and/or The Daily Beast). MSNBC, incidentally, deliberately chose to make itself more conservative in the last couple of years. They’re still liberal, of course, but their stars (like Maddow and Reid) tend to put identity politics over and above all else. So far as I can tell, their talking heads are basically okay with neoliberal economics, or at least don’t consider the various free trade deals a major problem. Joy Anne Reid has said just that, as I recall. She and others suggest that Sanders, with his economic message, is simply catering to the white working class and abandoning people of color, which is ridiculous and divisive crap.
Long and short is that I’m not fully convinced that the Russians did hack the DNC and Podesta. Deep State might have damning evidence that Russia did it, but it has not shared that evidence. They say it’s classified, which I can accept. But until it’s declassified and vetted, I don’t think Democrats should be cheerleading for Russia-gate allegations and prosecutions. The biggest sin of Flynn and Page and Manafort is probably that they were sympathetic to Russia and willing to advise Trump accordingly (and Trump himself is sympathetic to Russia for his own reasons, some of which are perfectly legitimate, and others are deeply self-serving). But we’re treating them as if they’re uniquely treasonous, as if no one else takes foreign money (or corporate money) and then seeks to shape policy to favor their benefactors. But in fact, everyone in Washington is doing that. Obama taking $400,000 from a Wall Street firm to give a one-hour talk is a symptom of a system gone completely awry. What a tawdry thing for ex-presidents, or ex-secretaries of state, to do, let alone people who yet hope to become president. Neither Truman nor Carter did it, thankfully. But everyone else thinks its fine, and some “liberals” (Noah Trevor, e.g., and others) have the gall to out-and-out attack anyone who says otherwise. After all, a black ex-president should not be denied the goodies that a white ex-president gets. As if the tawdry examples of Clinton and Bush are universal and admirable, whereas Truman and Carter are irrelevant.
Finally, how can Democrats be so incensed at Russian hacking of the DNC when they nominated a woman who set up her own home-brew server in the basement of her home in Chappaqua, New York, with one person to do all the maintenance and security? It is said that Colin Powell and Condi Rice did the same because they used personal email accounts, but that was completely different. It’s stupefying to me that a person as savvy about tech as my lifelong best friend, X, can tell me “they all did it.” Powell and Rice set up private email accounts with major providers (e.g., Google or Microsoft or maybe AOL) that employ whole armies of cybersecurity people. Too, they used their private emails under exceptional circumstances, not for all official business (as did Clinton); turned over their emails for record-keeping without being forced to do so; and, most important, used the private email accounts before the State Department imposed a rule forbidding that practice. From the time she arrived, Clinton was briefed about NOT using a private email account, yet she not only did that, but set up her own homebrew server. Of course the FBI concluded her server was indeed breached by foreign hackers. How could it not have been breached? It was nothing but a little homebrew setup with no real security in place. And we’re now beside ourselves that Russia hacked the DNC? And Comey is investigating Russian hacking, but he was just fine with letting Clinton off the hook for setting up a homebrew server that was open to any half-ass hacker in the world? And somehow we Democrats were hellbent on nominating someone who understood flat zero about cybersecurity; who didn’t take it seriously when she was told about it; and who set up her private server solely and selfishly to protect herself from FOIA requests re the Clinton Foundation.
Frankly, she was right to worry about the conflicts of interest involving the Clinton Foundation. Anyone half smart should have known that those conflicts would dog her in a general election. She was lucky enough to face Trump, who is himself the most corrupt man to ever run for president. But unfortunately, her conflicts of interest (along with Bill’s womanizing and her own Wall Street loyalties) inoculated him against the charge that his character disqualified him for the presidency. Plus, Clinton refused to listen to Bernie Sanders, or even to her own husband, about the necessity of campaigning in the Upper Midwest on economic issues. Why on earth did Obama and every other leading Democrat think it was a great idea to nominate Hillary Clinton, and clear the entire field of serious competitors, including Biden, in order to do so? Her shelf-life had expired in 2008, and yet you couldn’t say anything negative about her in 2016 without getting your head chewed off on the blogs (the Hillbots were every bit as nasty as any Bernie bro). It was like the Democratic Party was caught in some weird time warp.
This is why I feel no sympathy for Hillary Clinton, victim of everyone except her own flaws. She can blame Comey’s Oct. 28 letter for giving Trump the presidency, but it’s not like that letter appeared out of nowhere (and moreover, her slide in the polls had begun three days earlier). Comey had promised Congress, under oath, that he would notify them if the case were re-opened, which is exactly what happened after the discovery of the emails on Weiner’s laptop. He was obliged to send the letter. Democrats are furious that he didn’t also notify anyone that he was also investigating connections between the Trump campaign and Russia, but that was a completely different investigation, and he was under no obligation to Congress to reveal any of it, and no one knows whether or not Trump himself was a target of the investigation anyway.
Yet Hillary Clinton goes around blaming Comey and Putin and Sanders, the great misogynist trio, thus keeping Democrats divided and angry. I’m proud of Bernie Sanders when I think of how different his post-election actions have been from hers. He has expressed almost no bitterness or blaming at all about Clinton and the DNC, despite their use of lies to defeat his candidacy, e.g., “he’ll take away your health care!” or “he opposed the auto bailout!” or “he endorsed Fidel Castro!” or “he only cares about the white working class!” I agree with you strongly that Democrats will do well in 2018 midterms, but that won’t mean the party is unified except in opposition to Trump. It just means there’s a temporary lull while we vote for Congress. The big fight will be in 2020, and Hillary Clinton will be on the wrong side of it, as, in all probability, will 95% of my friends and colleagues.
This is why I just can’t look at any more Facebook posts from X, X, and X about Russiagate or Hillary Clinton. What I most hate about this thing is that it alienates me from my closest friends and family. But it’s too stressful to hear or see Russiagate blather, then get into a flame-war, or, just as bad, force myself to be quiet about it.
submitted by docdurango to Kossacks_for_Sanders [link] [comments]

My intent isn’t to make this Wealthy Affiliate review yet another digital sales pitch. As I searched for Wealthy Affiliate reviews, I noticed the vast majority of them are very one-sided, don’t offer any other options, and are simply biassed sales pitches from affiliate marketers trying to make a buck. So, in MY Wealthy Affiliate review, I’m going to do things a bit differently. > my wealthy affiliate login. Tag: my wealthy affiliate login. Best Affiliate Marketing Training for Beginners. Posted on February 22, 2019 April 8, 2020 by Marty B. Welcome to my site Wealthy Affiliate Trainings! There are over 4 BILLION people using the internet and regardless of the direction that you take and niche or market that you Read More. Building your very own website is SIMPLE within Wealthy Affiliate. The process takes less than 30 seconds to build a beautiful looking, mobile, and revenue ready website. State of the art, ultra powerful and secure hosting will allow you to grow your business with Wealthy Affiliate. Wealthy Affiliate will help you select a good niche, and some of that process is covered within the free membership. However . . . they also quickly position the option of you marketing Wealthy Affiliate itself …if you are at a loss, in terms of deciding upon a vertical. This is a BAD idea. How to login to wealthy affiliate? How to login to wealthy affiliate? Last Update: June 17, 2020 1. 35. lets say that i want to log in to wealthy affiliate how could i do that i need to know because i want to work with facebook. Delila, Like This 40. Join the Discussion.

[index] [12758] [14279] [3438] [1404] [1617] [12160] [7154] [4373] [7078] [8693]