Posted on 07/18/2018 5:30:39 AM PDT by Yosemitest
JASON BUTTRILL: THE INDITEMENT OF THE 12 RUSSIANS - HOW THEY ACTUALLY GOT THE EVIDENCE TO FINGER THOSE 12 RUSSIAN - AMAZING STORY
Were not sure WHO actually did this.
Were thinking it was the probably the N.S.A.
I dont think it was the C.I.A.
But it was someone in the intelligence community, probably the N.S.A.
What they did was, is they found out who these Russian G.R.U. Agents were.
They found out who they were.
Then they found out what their BITCOIN WALLETS were.
GLENN: Lets stop here.
JASON: Right there.
GLENN: Lets just stop here for a second.
JASON: Yeah.
GLENN: Were ident
The N.S.A is able to identify 12 K.G.B. Agents.
Now I dont know if youve seen any movies, but those guys are pretty stealthy.
They then find them and track their BITCOIN WALLET.
Now heres where it gets spooky.
JASON: So
And Ill even one-up that.
Theyre actually even more sneakier than the K.B.G.
This is the G.R.U. which is their military branch.
Their whole point is to go in undetected and get out undetected.
I mean, these guys are the REAL DEAL !
So then they found out their BITCOIN WALLETS
WALLET, then they track their purchases.
Now as far as I know, THATS IMPOSSIBLE !
Like if you talk to someone that says, that wants to do transactions privately or anonymously, go through BITCOIN, through the BLOCKCHAIN, and theyre not suppose to be
its all anonymous.
DOC THOMPSON: Thats part of the reason you want to do it.
JASON: Its almost the ENTIRE reason.
DOC: Thats right. Its a silk road.
Its all that stuff.
GLENN: I have Teeka Tiwari coming in tomorrow. He will know
JASON: Oh we got to ask him.
GLENN:
If theres another way of doing it.
Cause Im still holding out if theres a way possibly a way to check it at the gate of the WALLET,
and then see where it lands on the other side.
You shouldnt be able to do it.
But maybe there is something that I dont know about.
JASON: The thing, and think about this, like if you are someone thats buying drugs on the internet, buying human beings (this happens on the dark-net), weapons, all kinds of stuff
Youve got to be reading this inditement and going OH CRAP !
Seriously !
DOC: I need a new business model.
JASON: If they can do this, that means everything youve purchased, they probably know about it.
They probably know about it.
So then, they went on from there, it gets even crazier.
Then they track BITCOIN, which its suppose to be impossible.
Then they find out that they bought a V.P.N. which stands for Virtual Private Network.
That is HOW you get on the dark-web.
You cant even get on the dark-web unless you use a V.P.N.
Now they bought a V.P.N. which is suppose to make them, again, anonymous.
So all the things that theyre doing, all the searches, all the web sites that theyre going to, its suppose to be completely dark to them.
GLENN: Thats why they call it the dark web.
You cant track it !
JASON: And so then they found out that their
DOC: But you can track the V.P.N.s though ?
JASON: Youre not suppose to.
No!
You cant !
DOC: Okay, so that parts brand new.
Even the log-ins.
JASON: Yeah.
DOC: Okay.
JASON: So then they find out, through this, through their BITCOIN, through the V.P.N., they leased, using BITCOIN, a Malay.., a server, a computer server in Malaysia.
Now again, all this stuff
shouldnt be possible.
SARA GONZALES: How ?
JASON: Theyre doing it.
So then they found out G.R.U. Agents were using the GUCCIFER 2.0 persona, which is the person that started, was leaking the leaked E-mails, and all that stuff out.
They also found out that DCLINKS.COM was being ran off this server by the G.R.U. Agents.
So DCLINKS.COM was the first place to start leaking the leaked E-mails.
GLENN: So IF our government can do this, they can do anything.
This is phenomenal information.
JASON: The experts say this shouldnt be possible.
GLENN: Yes.
JASON: To put that into context.
GLENN: This is way beyond what Snowden said.
DOC: Is it possible that this isnt actually how it played out, though ?
Because, what if they actually started at the bottom, at the end,
and said, lets track DCLINKS.COM, and GUCCIFER, and go backwards, and go via the Malaysian Server, and then that would be more
?
JASON: Okay
and then
I would say that would be even more impossible to do it backwards.
DOC: Really ?
JASON: Because then if youre going backwards, you shouldnt be able to see, because theyre using a V.P.N.
DOC: I see what youre saying.
JASON: You shouldnt be able to see that. And then
DOC: The first two steps would make sense.
GLENN: Youre only seeing numbers, youre only seeing numbers come across on BITCOIN.
DOC: Okay.
GLENN: You dont know who those numbers belong to.
JASON: Right.
And then if youre also, then if youre going through the V.P.N., the purchases, thats even more encrypted.
You cant even see, you cant go through the WALLETS to get to the purchases.
DOC: Right.
GLENN: We dont know
so no idea how this is happening ?
Thats pretty solid.
SARA: Yeah.
GLENN: Now come back to me, now on
now that I know this
Ive said for the last day or two, that about Trump, hes conflating all of it.
Okay
If you look over at the chalk board, there are now six items,
(I just went through 5 of them on the air) but six items.
Only two of them are verified Russia.
Okay ?
And theyre enough to say to Putin, Knock it off !
One is the GUCCIFER WIKILEAKS which we just showed you how they found that.
The other one is SOCIAL MEDIA (the F.B.I, and FACEBOOK, and everything else) track that one.
We know those.
We also know that somebody who was with the G.R.U. or the K.G.B., was in the Trump Tower.
They TRIED TO entrap Trump, or they TRIED TO get him to do it.
But they didnt have anything.
So there IS NO COLLUSION THERE !
But there was AN ATTEMPT !
JASON: Can I get in, can I expand on that ?
GLENN: Yes.
JASON: That is very typical K.G.B. era style tactics.
They, they always look into trying to get some kind of information, to make something look bad, give the appearance of something to look bad, or make contact with someone that is running for President.
Theyve been doing that ever since the 1950s.
So that, its very, very common to do that.
GLENN: Which [Paul] Manafort would know, which explains why Manafort got up out of that meeting pretty quickly and walked out, cause he knows this is a set-up, this is not good.
Okay, so those three things, we know.
We DONT KNOW about the IMRAN AWAN, the guy who was working with Debbie Wassermann Schultz.
And we also DONT KNOW about HILLARYS SERVER.
Yesterday, the President said 30,000 E-mails.
They have them.
Anthony WEINER had them. Okay.
But STRZOK NEVER LOOKED AT THEM !
Remember ?
That was the whole thing.
DOC: That was, in fact, Jim Jordan made that point in testimony, over and over again.
GLENN: Correct !
DOC: He said that you received this, right ? From
JASON: He sat on it for a YEAR !
DOC: Right. Exactly !
So you got it.
He said that I didnt personally get it.
He didnt admit that.
He said, but WE GOT IT, the F.B.I. got it.
And he did not do anything.
GLENN: Okay.
DOC: Yeah.
GLENN: Now we know
Put yourself in Donald Trumps shoes.
Youre watching television every day.
Youre watching what the press is doing.
You know what the D.N.C. is doing.
You know that FUSION GPS, you KNOW IT !
Was hired BY the Democratic Operatives.
So you KNOW that THAT
THAT came from them.
Was it into Russia ?
We dont know !
Were not hearing anything about that.
We KNOW the Democrats were involved.
IMRAN AWAN
We KNOW that the Democrats are involved.
The F.B.I. and N.S.A.
HAD TO BE IN CHARGE of those two investigations.
Okay ?
We already know what the N.S.A. can do.
WHY havent they done it WITH THOSE TWO ?
So, if youre Donald Trump, and youre saying what a minute.
Hillarys Server, you didnt even look !
And the guy who DIDNT LOOK
is the guy was
who is telling me that maybe there is collusion ?
All of a sudden I DONT TRUST the N.S.A. !
I DONT TRUST the F.B.I. !
I DONT TRUST JUSTICE !
I DONT !
I could say, Look, yeah I got that.
Okay, thats really good.
WHAT ABOUT THE REST OF IT, which he keeps saying.
WHAT ABOUT THIS !
WHAT ABOUT THAT !
But hes not laying it out well.
JASON: Imagine the Brief.
And weve just seen the UN-CLASSIFIED Inditement.
Imagine the Brief that he has gotten on HOW the N.S.A. broke down BITCOIN, how they broke down a V.P.N., and fingered these G.R.U.s
GLENN: And yet those same people cant track the E-mail server.
DOC: Right, they cant do that. [/sarc]
GLENN: They CANT do that. [/sarc]
So, to me, I actually, I feel bad for Donald Trump, today.
I really do.
I feel, I wish I could go to the White House, Im never going to go.
But I wish I could go with my chalk Board and go, and say, Mr. President, let me lay this out for you.
DOC: Stop getting hung up on the word COLLUSION .
GLENN: Yes !
DOC: Thats a separate issue.
[Russian] INVOLVEMENT FIRST !
GLENN: Let me lay this out !
Because I understand now WHY you might have said, He looked at me in the eye.
I dont know about this guy.
He might be a bad guy.
DOC: Thats right.
GLENN: But I think YOU GUYS ARE, because youre giving me these answers,
but youre NOT, strangely, giving me any of these !
SO I DONT TRUST YOU !
DOC: Now politically speaking, wouldnt that be very advantageous if he said, Listen
CLEARLY, THEY WERE MEDDLING .
This is all going on.
Lets investigate.
The COLLUSION DIDNT HAPPEN !
Lets SEPARATE the two.
GLENN: If he could lay this out, like THIS
If I were on FOX today, and I was laying this out EVERY DAY for the people
It would move, and you would start to see a dislodging of
of the bad guys.
It would start to move.
But nobody in the press is doing that.
Nobody in the press CAN do it.
Nobody on the main-stream press WANTS to do it. And Trump cant.
[ time in video: 10:08 ]
1. Trump Tower COLLUSION - FBI
2. GUCCIFER - WIKILEAKS (We know this was Russia) - NSA - CIA
3. IMRAN AWAN - DEMO OPS - FBI, NSA, CIA
4. FUSION GPS - DEMO OP Putin Control - FBI, NSA, CIA
5. SOCIAL MEDIA -Russia - FBI - Justice
6. HILLARYS SERVER / STRZOK - FBI - Justice
Indictment
Bitcoin transactions are obscured, not anonymous.
IF the evidence is real, will the government actually take it to TRIAL, when the defendants demand “Discovery” ?
IMHO Free VPN’s are probably secretly funded by the NSA.
Paid VPN’s were probably Capitalized secretly by the NSA.
I’m hoping somer real experts on the subject, who have the background knowledge, give us some comments to expose all this corruption.
I think this whole thing is BS. It is always amazing to me to see who will step out of the shadows to claim his 15 minutes. It never ends well.
Since “Taken” was cancelled, Kilroy was looking for a job, so they probably hired him to do this.
Since “Taken” was cancelled, Kilroy was looking for a job, so they probably hired him to do this.
http://redstatewatcher.com/article.asp?id=131778
BREAKING:Fmr NSA Exec Tech Dir Has Evidence That Could Debunk Muellers Indictments!
“Special Counsel Robert Mueller and his team may have not been totally honest with the American People.
America Restored’s Executive Director Tomi Collins and Bill Binney former Tech Director of the NSA on Saturday, July 7th in Washington DC., discussed the alleged hacking by the Russians.
Binney, who has had 40 years of experience in the intel field, provided scientific data proving Guccifer2 Data is fraud and Russian hackers did not hack the DNC.
Binney said his examination of the alleged DNC hack showed the download rate of 49 mb per a second was too fast for a foreign entity to have. Binney stated the download came from a local source, possibly via a thumb drive.
Famed hacker and programmer, Kim Dotcom agreed with Binneys findings.
Must watch: Former NSA technical director debunks Mueller indictment against 12 Russians with scientific evidence. DNC files could not have been transferred over the Internet at a rate of 49mb per second. But a USB thumb drive (inside DNC) could do that, Dotcom tweeted.
Judging from Binneys statements, its likely the DNC hack was an inside job, not from foreign hackers...”
Demand Seth Rich’s murder be examined with a microscope?
Impossible data rates to be over even a gigabit network for the file transfers to have been from Russia.
The date/time stamps on the files the Rosenstein investigation used to determine it was Russia, Russia, Russia showed a data rate REQUIRED to be over 40 mega BYTES per second (to get those stamps). On a gigbit network maximum data transfer rate is about 6 mega BYTES per second.
However, you can get those transfer rates on a USB 3.0 thumbdrive. Meaning: it was an inside job.
The Guccifer 2 basis narrative to determine it was anybody anywhere in the world using the internet is a 100% fabrication.
Looking at one aspect which listed is tracking crypto purchases. Let just say I had what was referred to as a cryptographic clearance for the government and was involved with account management. Everyone can basically figure out that cryptocurrencies are really just strings of numbers to a MAC address or a string of numbers/letters that are scrambled in a fashion to remain hidden from the user or prying eyes. It would be hard, but not impossible to decrypt the hash strings. In all likelihood they were able to track the cryptocurrency purchases back to using a device or devices such as your computer or cell phone which everyone knows have tracking IDs, IP addresses, go thru ISPs, etc. Couple these easy to connect to people “registrations” it would make it simple to follow the Users, or the data packets of transmitted data. The reason the government can get away with using cryptographic hash is because we typically dual encrypt the data packets running and run everything thru firewalls and point-to-point devices that are honed or paired and encrypt each data packet once then twice before running back out the firewalls on the recipient network... then you have the limited access (until the Obama Admin decided to use commercial emails to spoof Govt Accountability). So tracking unencrypted devices, even if only using a VPN or two VPNs commercially available would be easy since all the IP traffic runs thru commercial providers whose high level network managers are essentially dual private sector/government employees who attend the latest greatest training and hold clearances. Everything is followed by the government. Apple can tell that lie that they won’t decrypt something for local law enforcement, but even Apple cannot sell a device without providing the Keys to the chips, the crypto, and all things that consumers think protect them to the government before the product is patented or licensed for any sales or use. Car GPS, cell phones, sat phones, are all registered devices that governments allow only after the keys to privacy are given to our intelligence agencies to track and read if necessary simultaneously while in use. Then you have your account numbers, your email addresses, your physical location all point to you. There is a bit or a couple bits more to this but if you understand this and you wanted to be ANON you would have to be off the grid, no credit cards, internet or phone or GPS usage. These folks the USG is inditing via the FBI is literally using the FBI as cover for high level Intelligence Operations by folks in rooms and building without windows who never take a phone into their work enclosure; people who don’t use any social media on USG devices, etc. Our FBI may have liaison Information Systems Officers who work with other agencies, but I doubt the average agent or team would have anything more than the famous Vans that grab information all around them - they literally put in a request to other agencies to have their ISOs or network managers “find” what they can’t get (If every agency had a budget for this equipment or humit resources it would still be confined to singular small footprints to keep it safe and secret). So when Trump tells you it is not just the FBI that is because the FBI is incapable of finding this information on their own - it takes the melding of private sector/govt level operations at the NSA level, but they can and did request it - and those people in those agencies (political appointees are the weak spots coupled with the full time politically corrupt govt employees) with proper requests. The FISA warrant is important, but the Intel Agencies would often go all the way back to the president to release so types of information, or information only available thru certain types of surveillance. IT TAKES A VILLAGE to do what these people did to Trump, or the Russians.
Hahaha you know the truth and we are just consumers. Even the new weapons the military is going to release to the infantry will be networked while deployed. Two cups and a string might work as about the VPN available.
The folks monitoring the DNC server “on our side” would have known everything from server logs. You can’t print a document without it being logged to a specific user, pc, and printer which shows the date and time. You can’t delete anything that has not already been backed up which would also be logged. Even if you delete it from Outlook it is still in the Server’s scrambled metadata and easy to recover. Trust but Verify is essentially built into Microsoft.
This is how they know the server wasn’t “hacked” and that the emails were downloaded directly from the server... the timestamps show that the transfer was too short for it to be over the Internet.
Guccifer is willing to testify to this. There is also an FBI agent that is willing to testify that he was approached by a person in DC trying to give him the emails because they contained evidence of crimes.
Neither has been allowed to testify or present their evidence.
Seth Rich was the source of the emails and he was killed.
Hack attempts on the servers occurred after that.. and then someone released the CIA hacking set into the wild via WikiLeaks so they could claim that anyone could have had those tools in case they left a footprint.
This is the timeline as I understand it.
Bkmrk.
All this has me wondering if the dark web / bitcoin were created in order to trap people by finding out who was doing what dirty thing. The Deep State would have used all this to blackmail and control people.
Then, a miracle! Trump is elected. Now all this tech that was put into place for the DS is being used by Trump to STOP the Deep State.
Nice plot twist!
When Congressional or Senate committees bring people before them for questioning, on this attempt to bring down Trump, they already have the evidence. These people are released back into the wild to be monitored in order to roll up the entire opposition - all to be dealt with when the time comes. I believe that after the midterms, maybe before if polling data is bad for Trump, they will arrest and charge these people, first for their lies and evasions to committees and second for treason.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.