Godlike Productions - Discussion Forum
Users Online Now: 2,155 (Who's On?)Visitors Today: 2,129,382
Pageviews Today: 2,958,334Threads Today: 697Posts Today: 14,016
10:22 PM


Back to Forum
Back to Forum
Back to Thread
Back to Thread
REPORT COPYRIGHT VIOLATION IN REPLY
Message Subject EVERYTHING will be coming out soon. The DNC server is the key.
Poster Handle Anonymous Coward
Post Content
POTUS dropped a major breadcrumb for us to look into when he stated: "What happened to the servers of the Pakistani gentleman that worked on the DNC? Where are those servers? They’re missing. Where are they?"

Putin dropped a bread crumb too when he stated: "For instance, we can bring up Mr. Browder in this particular case. Business associates of Mr. Browder have earned over $1.5 billion in Russia. They never paid any taxes. Neither in Russia nor in the United States. Yet, the money escapes the country. They were transferred to the United States. They sent huge amount of money, $400 million as a contribution to the campaign of Hillary Clinton."

The MSM is creating a lot of noise to drown out these two huge bombshell drops. No mention of Awan, other than discrediting it thoroughly and calling it a conspiracy theory.

Trump had the world's attention yesterday at the Helsinki presser - he intentionally drew attention to the DNC server and Pakistani Awan for a reason - for us to follow his que and investigate further.

Main points:
-Awans are paid 2X the median salary of congressional staffers in similar positions.
-Jackie Speier and Debbie Wasserman Schultz also requested top secret clearance for the Awan brothers. The Awans are Pakistani Nationals not US citizens.
-Awans worked under congressional members who work for top secret level congressional committees (DHS, Foreign affairs, Select intelligence committee).
-External Server

George Webb believes that the Awan Brothers used 'dummy' routers and wiretaps to procure sensitive government information that could be passed to operatives in conflict zones as a sort of warning system for the rat-lines. These rat-lines include drug smuggling, human trafficking, organ harvesting, information, and weapons.

How Russians Used X-Agent to get Imran Awan's iPhones on Capital Hill



From RT article:

The brothers, Abid, Jamal and Imran Awan, worked as shared employees for various members of the House, covering committees relating to intelligence, terrorism and cybersecurity, which included the House Committee on Foreign Affairs, the Committee on Homeland Security and the Subcommittee on Tactical Air and Land Forces of the Armed Services Committee.
(cannot link)


“... There is a possibility that Seth Rich was not the one who leaked the information, but that the DNC bigwigs THOUGHT he was, in which case, by neither confirming nor denying that Seth Rich was the leaker, it may be that letting the DNC continue to think it was him is being done in protection of the actual leaker. Seth Rich could also have been killed for unrelated reasons, perhaps Imran Awan thought he was on to his doings. ...”

“... Don't forget this Twitter post by Wikileaks on October 30, 2016: Podesta: "I'm definitely for making an example of a suspected leaker whether or not we have any real basis for it." [link to www.wikileaks.org (secure)] ...”

“... Did Imram Awan leak the documents exposing that the DNC was colluding with the Clintons and rigging the primaries and convention in her favor? After all, that's where this all began. ...”

“... That was when Hillary came up with the idea to try to blame the Russians for the leaks and thus lead the world close to nuclear war for her own personal ambition. ...”

“... The DNC was caught in the act of rigging the Primaries. Fact. ...”

“... And someone inside hacked their computers for all those emails, too. That's why they didn't turn over their computers to the F.B.I. because it would bear that out. ...”

“... Aside from the obvious crimes of espionage and certainly extortion and fraud, why was Imran Awan trying to flee the country just after Seth Rich's assassination? Was Rich spilling the beans about Debbie Schultz's Pakistani mole and not just the Hillary scam? ...”


...

Mueller Indicts 12 Russian Intel Officials For Hacking DNC, Hillary Campaign
[link to www.zerohedge.com (secure)]


4. By in or around April 2016, the Conspirators also hacked into the computer networks of the Democratic Congressional Campaign Committee ("DCCC") and the Democratic National Committee ("DNC"). The Conspirators covertly monitored the computers of dozens of DCCC and DNC employees, implanted hundreds of files containing malicious computer code ("malware"), and stole emails and other documents from the DCCC and DNC.

5. By in or around April 2016, the Conspirators began to plan the release of materials stolen from the Clinton Campaign, DCCC, and DNC.

6. Beginning in or around June 2016, the Conspirators staged and released tens of thousands of the stolen emails and documents. They did so using fictitious online personas, including "DCLeaks" and "Guccifer 2.0."

7. The Conspirators also used the Guccifer 2.0 persona to release additional stolen documents through a website maintained by an organization ("Organization Iй), that had previously posted documents stolen from U.S. persons, entities, and the U.S. government The Conspirators continued their U.S. election-interference operations through in or around November 2016.

8. To hide their connections to Russia and the Russian government, the Conspirators used false identities and made false statements about their identities. To further avoid detection, the Conspirators used a network of computers located across the world, including in the United States, and paid for this infrastructure using cryptocurrency.

...

Hacking into the DNC Network

26. On or about April 18, 2016, the Conspirators hacked into the DNC's computers through their access to the DCCC network. The Conspirators then installed and managed different types of malware (as they did in the DCCC network) to explore the DNC network and steal documents, a. On or about April 18, 2016, the Conspirators activated X-Agent's keylog and screenshot functions to steal credentials of a DCCC employee who was authorized
to access the DNC network. The Conspirators hacked into the DNC network from the DCCC network using stolen credentials.

By in or around June 2016, they gained access to approximately thirty-three DNC computers.

In or around April 2016, the Conspirators installed X Agent malware on tho DNC network, including the same versions installed on the DCCC network.

MALYSHEV and his co-conspifators monitored the X-Agent malware from the AMS panel and captured data from the victim computers. The AMS panel collected thousands of keylog and screenshot results from the DCCC and DNC computers, such as a screenshot and keystroke capture of DCCC Employee 2 viewing the DCCC's online banking information.

Theft of DCCC and DNC Documents

27. The Conspirators searched for and identified computers within the DCCC and DNC networks that stored information related to the 2016 U.S. presidential election, for example, on or about April 15, 2016, the Conspirators searched one hacked DCCC computer for terms that included "hillary," "cruz," and "trump." The Conspirators also copied select DCCC folders, including "Benghazi Investigations." The Conspirators targeted computers containing information such as opposition research and field operation plans for the 2016 elections.
28. To enable them to steal a large number of documents at once without detection, the Conspirators used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks. The Conspirators then used other GRU malware, known as "X-Tunncl," to move the stolen documents cutside the DCCC and DNC networks through encrypted channels.

a. For example, on or about April 22, 2016, the Conspirators compressed gigabytes of data from DNC computers, including opposition research. The Conspirators later moved the compressed DNC data using X-Tunnel to a GRU-leased computer located in Illinois.

b. On or about April 28, 2016, the Conspirators connected to and tested the same computer located in Illinois. Later that day, the Conspirators used X-Tunnel to connect to that computer to steal additional documents from the DCCC network.

29. Between on or about May 25, 2016 and June 1, 2016, the Conspirators hacked the DNC Microsoft Exchange Server and stole thousands of emails from the work accounts of DNC employees. During that time, YERMAKOV researched PowerShell commands related to accessing and managing the Microsoft Exchange Server.

30. On or about May 30, 2016, MALYSHEV accessed the AMS panel in order to upgrade custom AMS software on die server. That day, the AMS panel received updates from approximately thirteen different X-Agent malware implants on DCCC and DNC computers.

31. During the hacking of the DCCC and DNC networks, the Conspirators covered their tracks by Intentionally deleting logs and computer flies. For example, on or about May 13, 2016, the Conspirators cleared the event logs from a DNC computer. On or about June 20, 2016, the Conspirators deleted logs from the AMS panel that documented their activities on the panel, including the login history. Efforts to Remain on the X'CC and PNC Networks

32. Despite the Conspirators' efforts to hide their activity, beginning in or around May 2016, both the DCCC and DNC became aware that they had been hacked and hired a security company ("Company 1") to identify the extent of the intrusions. By in or around June 2016, Company 1 took steps to exclude intruders from the networks. Despite these efforts, a Linux-based version of X-Agent, programmed to communicate with the GRU-registercd domain linuxkml.net, remained on the DNC network until in or around October 2016.

33. In response to Company Ts efforts, the Conspirators took countermeasures to maintain access to the DCCC and DNC
networks.

More info & continued here:

www.softpanorama.org/Skeptics/Political_skeptic/Neocons/obama_as_neoconser​vative_in_foreigh_policy.shtml
 Quoting: ElleMira


GREAT POST. KEEP IT BURNING. EXCELLENT WORK.
 Quoting: Anonymous Coward 76335367
 
Please verify you're human:




Reason for copyright violation:







GLP