Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Yosemitest

Looking at one aspect which listed is tracking crypto purchases. Let just say I had what was referred to as a cryptographic clearance for the government and was involved with account management. Everyone can basically figure out that cryptocurrencies are really just strings of numbers to a MAC address or a string of numbers/letters that are scrambled in a fashion to remain hidden from the user or prying eyes. It would be hard, but not impossible to decrypt the hash strings. In all likelihood they were able to track the cryptocurrency purchases back to using a device or devices such as your computer or cell phone which everyone knows have tracking IDs, IP addresses, go thru ISPs, etc. Couple these easy to connect to people “registrations” it would make it simple to follow the Users, or the data packets of transmitted data. The reason the government can get away with using cryptographic hash is because we typically dual encrypt the data packets running and run everything thru firewalls and point-to-point devices that are honed or paired and encrypt each data packet once then twice before running back out the firewalls on the recipient network... then you have the limited access (until the Obama Admin decided to use commercial emails to spoof Govt Accountability). So tracking unencrypted devices, even if only using a VPN or two VPNs commercially available would be easy since all the IP traffic runs thru commercial providers whose high level network managers are essentially dual private sector/government employees who attend the latest greatest training and hold clearances. Everything is followed by the government. Apple can tell that lie that they won’t decrypt something for local law enforcement, but even Apple cannot sell a device without providing the Keys to the chips, the crypto, and all things that consumers think protect them to the government before the product is patented or licensed for any sales or use. Car GPS, cell phones, sat phones, are all registered devices that governments allow only after the keys to privacy are given to our intelligence agencies to track and read if necessary simultaneously while in use. Then you have your account numbers, your email addresses, your physical location all point to you. There is a bit or a couple bits more to this but if you understand this and you wanted to be ANON you would have to be off the grid, no credit cards, internet or phone or GPS usage. These folks the USG is inditing via the FBI is literally using the FBI as cover for high level Intelligence Operations by folks in rooms and building without windows who never take a phone into their work enclosure; people who don’t use any social media on USG devices, etc. Our FBI may have liaison Information Systems Officers who work with other agencies, but I doubt the average agent or team would have anything more than the famous Vans that grab information all around them - they literally put in a request to other agencies to have their ISOs or network managers “find” what they can’t get (If every agency had a budget for this equipment or humit resources it would still be confined to singular small footprints to keep it safe and secret). So when Trump tells you it is not just the FBI that is because the FBI is incapable of finding this information on their own - it takes the melding of private sector/govt level operations at the NSA level, but they can and did request it - and those people in those agencies (political appointees are the weak spots coupled with the full time politically corrupt govt employees) with proper requests. The FISA warrant is important, but the Intel Agencies would often go all the way back to the president to release so types of information, or information only available thru certain types of surveillance. IT TAKES A VILLAGE to do what these people did to Trump, or the Russians.


13 posted on 07/18/2018 6:24:15 AM PDT by Jumper
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Jumper
I'm not good at reading a block of text, so I'm going to re-format it.
Thanks for that info Jumper, but let me ask another question.
Remember this ? : HOW do we know it was the Russians ?
Why couldn't it be IMRAN AWAN and his co-workers with Debbie Wassermann Schultz, and with the Democratic National Committee who was DOING the hacking and leaving FALSE TRACES of the Russians.
We MUST INVESTIGATE the Democratic National Committee's servers ! ! !
But some of those servers are missing. (How convenient ! )
20 posted on 07/19/2018 12:15:06 PM PDT by Yosemitest (It's SIMPLE ! ... Fight, ... or Die !)
[ Post Reply | Private Reply | To 13 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson