Free Republic
Browse · Search
News/Activism
Topics · Post Article

Here are the six separate investigations discussed in that transcript:
1 posted on 07/18/2018 5:30:39 AM PDT by Yosemitest
[ Post Reply | Private Reply | View Replies ]


To: Yosemitest

Indictment


2 posted on 07/18/2018 5:39:23 AM PDT by stonehouse01
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Yosemitest

Bitcoin transactions are obscured, not anonymous.


3 posted on 07/18/2018 5:43:12 AM PDT by taxcontrol (Stupid should hurt)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Yosemitest

IMHO Free VPN’s are probably secretly funded by the NSA.

Paid VPN’s were probably Capitalized secretly by the NSA.


6 posted on 07/18/2018 5:51:00 AM PDT by ImJustAnotherOkie (All I know is what I read in the papers.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Yosemitest

Since “Taken” was cancelled, Kilroy was looking for a job, so they probably hired him to do this.


9 posted on 07/18/2018 6:06:39 AM PDT by Real Cynic No More
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Yosemitest

Since “Taken” was cancelled, Kilroy was looking for a job, so they probably hired him to do this.


10 posted on 07/18/2018 6:06:40 AM PDT by Real Cynic No More
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Yosemitest; bitt; vette6387; unkus; SkyPilot; ransomnote; Kaslin; ZULU; rodguy911; Liz; ...

http://redstatewatcher.com/article.asp?id=131778

BREAKING:Fmr NSA Exec Tech Dir Has Evidence That Could Debunk Mueller’s Indictments!

“Special Counsel Robert Mueller and his team may have not been totally honest with the American People.

America Restored’s Executive Director Tomi Collins and Bill Binney former Tech Director of the NSA on Saturday, July 7th in Washington DC., discussed the alleged hacking by the Russians.

Binney, who has had 40 years of experience in the intel field, provided scientific data proving Guccifer2 Data is fraud and Russian hackers did not hack the DNC.

Binney said his examination of the alleged DNC hack showed the download rate of 49 mb per a second was too fast for a foreign entity to have. Binney stated the download came from a local source, possibly via a thumb drive.

Famed hacker and programmer, Kim Dotcom agreed with Binney’s findings.

“Must watch: Former NSA technical director debunks Mueller indictment against 12 Russians with scientific evidence. DNC files could not have been transferred over the Internet at a rate of 49mb per second. But a USB thumb drive (inside DNC) could do that,” Dotcom tweeted.

Judging from Binney’s statements, it’s likely the DNC hack was an inside job, not from foreign hackers...”

Demand Seth Rich’s murder be examined with a microscope?


11 posted on 07/18/2018 6:18:27 AM PDT by ExTexasRedhead
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Yosemitest

Looking at one aspect which listed is tracking crypto purchases. Let just say I had what was referred to as a cryptographic clearance for the government and was involved with account management. Everyone can basically figure out that cryptocurrencies are really just strings of numbers to a MAC address or a string of numbers/letters that are scrambled in a fashion to remain hidden from the user or prying eyes. It would be hard, but not impossible to decrypt the hash strings. In all likelihood they were able to track the cryptocurrency purchases back to using a device or devices such as your computer or cell phone which everyone knows have tracking IDs, IP addresses, go thru ISPs, etc. Couple these easy to connect to people “registrations” it would make it simple to follow the Users, or the data packets of transmitted data. The reason the government can get away with using cryptographic hash is because we typically dual encrypt the data packets running and run everything thru firewalls and point-to-point devices that are honed or paired and encrypt each data packet once then twice before running back out the firewalls on the recipient network... then you have the limited access (until the Obama Admin decided to use commercial emails to spoof Govt Accountability). So tracking unencrypted devices, even if only using a VPN or two VPNs commercially available would be easy since all the IP traffic runs thru commercial providers whose high level network managers are essentially dual private sector/government employees who attend the latest greatest training and hold clearances. Everything is followed by the government. Apple can tell that lie that they won’t decrypt something for local law enforcement, but even Apple cannot sell a device without providing the Keys to the chips, the crypto, and all things that consumers think protect them to the government before the product is patented or licensed for any sales or use. Car GPS, cell phones, sat phones, are all registered devices that governments allow only after the keys to privacy are given to our intelligence agencies to track and read if necessary simultaneously while in use. Then you have your account numbers, your email addresses, your physical location all point to you. There is a bit or a couple bits more to this but if you understand this and you wanted to be ANON you would have to be off the grid, no credit cards, internet or phone or GPS usage. These folks the USG is inditing via the FBI is literally using the FBI as cover for high level Intelligence Operations by folks in rooms and building without windows who never take a phone into their work enclosure; people who don’t use any social media on USG devices, etc. Our FBI may have liaison Information Systems Officers who work with other agencies, but I doubt the average agent or team would have anything more than the famous Vans that grab information all around them - they literally put in a request to other agencies to have their ISOs or network managers “find” what they can’t get (If every agency had a budget for this equipment or humit resources it would still be confined to singular small footprints to keep it safe and secret). So when Trump tells you it is not just the FBI that is because the FBI is incapable of finding this information on their own - it takes the melding of private sector/govt level operations at the NSA level, but they can and did request it - and those people in those agencies (political appointees are the weak spots coupled with the full time politically corrupt govt employees) with proper requests. The FISA warrant is important, but the Intel Agencies would often go all the way back to the president to release so types of information, or information only available thru certain types of surveillance. IT TAKES A VILLAGE to do what these people did to Trump, or the Russians.


13 posted on 07/18/2018 6:24:15 AM PDT by Jumper
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Yosemitest

Bkmrk.


17 posted on 07/18/2018 7:53:00 AM PDT by RushIsMyTeddyBear
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Yosemitest

All this has me wondering if the dark web / bitcoin were created in order to trap people by finding out who was doing what dirty thing. The Deep State would have used all this to blackmail and control people.

Then, a miracle! Trump is elected. Now all this tech that was put into place for the DS is being used by Trump to STOP the Deep State.

Nice plot twist!


18 posted on 07/18/2018 7:53:54 AM PDT by generally ( Don't be stupid. We have politicians for that.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Yosemitest

Wow, how interesting! Thanks for all the work you put into this. (Do you need help with transcription? I’ve been doing transcription for a lot of years and I would be willing to help a patriot out - I’m currently unemployed so if you need help, let me know.)


22 posted on 12/12/2021 6:02:07 AM PST by Scarlett156 (I have a new broom. I feel like a queen! Get outta my way, losers! *sweeps* )
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson