Summary: People have been divided about the DNC hack-leak ever since the story began with the Chalupa-Isikoff article. These divisions run so deep they mark where people stand politically. Mutually exclusive positions range from whether or not Russians hacked the DNC or if the information was downloaded and then leaked, presumably by Seth Rich. All three are different positions.
This article culminates what I’ve learned about the hack-leak and the Information Operation surrounding this. It presents a much different perspective.
There were multiple DNC hacks. There is also clear proof supporting the download to a USB stick and subsequent information exchange (leak) to Wikileaks. All are separate events.
Here’s what’s different in the information I’ve compiled.
- The group I previously identified as Fancy Bear was given access to request password privileges at the DNC. And it looks like the DNC provided them with it.
- I’ll show why the Podesta email hack looks like a revenge hack.
- The reason Republican opposition research files were stolen can be put into context now because we know who the hackers are and what motivates them.
At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators.
This gives some credence to the Seth Rich leak (DNC leak story) as an act of patriotism. If the leak came through Seth Rich, it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election. No political operative is going to argue with the presumed president-elect over foreign policy. The leaker may have been trying to do something about it. I’m curious what information Wikileaks might have.
The real crime of the DNC hack wasn’t the hack.
If only half of the following proved true in context and it’s a matter of public record, that makes the argument to stop funding for Ukraine immediately barring an investigation of high crimes by Ukrainian Diaspora, Democrat, and Republican leaders in Congress, private Intel for hire, and Ukrainian Intel’s attacks on the US government and political processes.
Perhaps it’s time Donald J. Trump @realDonaldTrump should consider treason investigations across the board. Make America great again by bringing justice and civility back.
After reading this it’s time to demand Congress to stop funding Ukraine.
DNC Hack – High Crimes or Misdemeanors?
So what went on at the DNC way back in 2016? Do you know? Was it a hack or a leak? Does it matter?
Recently, an investigative journalist who writes under the name Adam Carter was raked over the coals. Carter writes at Disobedient Media and has been providing a lot of evidence supporting the DNC leak story former Ambassador Craig Murray and Wikileaks claim happened.
When the smear article came out and apparently it’s blossoming into a campaign, a few people that read both of us wrote to the effect “looks like your work is the only thing left standing.” I immediately rebuffed the idea and said Carter’s work stands on its own. It has nothing to do with anything I’ve written, researched, or plan to.
I’d say the same about Scott Humor, Lee Stranahan, Garland Nixon, Petri Krohn, or Steve McIntyre. And there are many others. There has been a lot of good work on the DNC hacks and 2016 election interference. Oftentimes, what looks like contradictory information is complimentary because what each journalist is working on shows the story from a different angle.
There are a lot of moving parts to the story and even a small change in focus brings an entirely new story because it comes from a different direction.
Here’s what I mean. If the DNC hack was really a leak, does that kill the “hack” story? No, it doesn’t and I blame a lot of activist journalists for making the assumption that it has to work this way. If Seth Rich gave Ambassador Craig Murray a USB stick with all the “hacked info,” it doesn’t change an iota of what I’ve written and the evidence you are about to read stands on its own. But, this has divided people into camps before the whole situation could be scrutinized and that’s still not done yet.
If for example, you have a leak on Jan 5th, can you have “a hack” on Jan 6th, 7th, or 8th? Since there is so much crap surrounding the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks have been a cover-up?
Hang em’ High
According to Obama, the hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn’t stop until after the elections in 2016. According to Crowdstrike the hacks continued into November.
“Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying to break into the organization’s computers “daily, hourly” until after the election — contradicting President Obama’s assertion that the hacking stopped in September after he warned Russian President Vladimir Putin to “cut it out.”-ABC
This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best.
The DNC fiasco isn’t that important of a crime. The reason I say this is the FBI would have taken control over material evidence right away. No law enforcement agency or Intel agency ever did. This means none of them considered it a crime Comey should have any part of investigating. That by itself presents the one question mark which destroys any hope Mueller has proving law enforcement maintained a chain of custody for any evidence he introduces.
It also says the US government under Barrack Obama and the victimized DNC saw this as a purely political event. They didn’t want this prosecuted or they didn’t think it was prosecutable.
Once proven it shows a degree of criminality that makes treason almost too light a charge in federal court. Rest assured this isn’t a partisan accusation. Team Clinton and the DNC gets the spotlight but there are Republicans involved.
Identifying Team Fancy Bear
There are a couple of caveats that need to be made when identifying the Fancy Bear hackers. The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This group was on the run trying to stay a step ahead of Russian law enforcement until October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and possibly former Russian state security. The majority of the group are Ukrainians making up Ukraine’s Cyber Warfare groups.
Identifying the hackers as FSB or GRU today is as helpful and has the same validity as identifying Special Prosecutor Mueller as a cashier at McDonalds because he worked there during school. It’s insulting and self-defeating, so stop it.
How Mueller is Making a Russian Attribution for the DNC Hackers
If you look at the attribution section for the Tallinn Manual 2.0 on the International Law Applicable to Cyber and specifically the section that deals with peacetime attributions of a non-state actor/ hacker we have an answer.
The hackers, OSINT, Cyber, spies, terrorists, etc call themselves volunteers to keep safe from State level retaliation, even though a child can follow the money. As volunteers motivated by politics and patriotism they are protected to a degree from retribution.
They don’t claim State sponsorship or governance and the level of attack falls below the threshold of military action. Mueller has a lot of latitude for making the attribution Russian, even though the attacks came from Ukrainian Intel. Based on how the rules are written, because the few members of the coalition from Shaltai Boltai are Russian in nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution. The caveat is if the attribution is proven wrong, the US will be liable for damages caused to the State which in this case is Russia.
How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they have the ability to research and work in over 30 different languages.
This can be considered an Information Operation against the people of the United States and of course Russia. We’ll get to why shortly.
After 2013, Shaltay Boltay was no longer physically available to work for Russia. The Russian hackers were in Ukraine working for the Ukrainian government’s Information Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they were tricked to return to Moscow and promptly arrested for treason.
From all this information we know the Russian component of Team Fancy Bear is Shaltai Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian Intelligence. We know they are grouped with InformNapalm which is Ukraine’s OSINT unit. We know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work directly with the Atlantic Council and Crowdstrike’s Dimitry Alperovich.
In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged data from the Surkov leak.
But during 2014,2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta went to work for the DNC as opposition researchers.
The First Time Shaltai Boltai was Handed the Keys to US Gov Servers
The setup to this happened long before the partnership with Ukrainian Intel hackers and Russia’s Shaltai Boltai was forged. The hack that gained access to US top-secret servers happened just after the partnership was cemented after Euro-Maidan.
In August 2009 Hillary Clinton’s Deputy Chief of Staff at the State Department Huma Abedin sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010, Abedin received an email titled “Re: Your yahoo account. We can see where this is going, can’t we?
“After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin’s associates to access email accounts into 2015 and 2016.”
Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo hack.
The time frame has to be noted. The hack happened in 2014. Access to the email accounts continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai Boltai was working from Kiev, Ukraine.
So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking at the time frame. Ukraine had the keys already in hand in 2014.
The DNC’s Team Fancy Bear
The “Fancy Bear hackers” may have been given the passwords to get into the servers at the DNC because they were part of the Team Clinton opposition research team. It was part of their job. Let that concept settle in for a moment.
According to Politico “In an interview this month, Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists, government officials and private intelligence operatives. While her consulting work at the DNC this past election cycle centered on mobilizing ethnic communities — including Ukrainian-Americans — she said that, when Trump’s unlikely presidential campaign began surging in late 2015, she began focusing more on the research, and expanded it to include Trump’s ties to Russia, as well.”
The only investigative journalists, government officials, and private intelligence operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and the Ministry of Information.
All of these hacking and information operation groups work for Andrea Chalupa with EuroMaidanPR and Irena Chalupa at the Atlantic Council. Both Chalupa sisters work directly with the Ukrainian government’s Intel and propaganda arms.
Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage, terrorist, counter-terrorism, cyber, propaganda, and info war channels officially recognized and directed by Ukraine’s Information Ministry. Along with their American colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against Ukraine’s criminal activities.
Alexandra Chalupa hired this particular hacking terrorist group called Fancy Bear by Dimitry Alperovich and Crowdstrike at the latest in 2015. While the Ukrainian hackers worked for the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the state of the projects they were working on. Let’s face it, once you’re in, setting up your Fancy Bear toolkit doesn’t get any easier. This is why I said the DNC hack isn’t the big crime. It’s a big con and all the parties were in on it.
Indict Team Clinton for the DNC Hacks and RNC Hack
Hillary Clinton exposed secrets to hacking threats by using private email instead of secured servers. Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife Huma Abedin using Weiner’s computer for top-secret State Department emails. And of course Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to do opposition research hacked her.
Here’s a question. Did Huma Abedin have Hillary Clinton’s passwords for her private email server? It would seem logical given her position with Clinton at the State Department and afterward. This means that Hillary Clinton and the US government top secret servers were most likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate passwords.
The RNC Hack
According to the Washington Post, “Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.”
In January 2017, criminal proceedings started for Edward Nedelyaev under articles 335 ‘spying’ and 343
‘inciting hatred or enmity.” He was a member of the Aidar battalion. Aidar members have been cited for torture and murder. Although the translation isn’t available on the linked video the MGB (LNR equivalent to the FBI) ask Aidar’s Nedelyaev about his relationship with Ukraine’s SBU. The SBU asked him to hack US presidential candidate Donald Trump’s election headquarters and he refused. Asked if this was through convictions, he says no, explaining that he is not a hacker. The video was published on January 10, 2017.
Taken at face value it really does show the ineptness of the SBU after 2014. This is why Ukraine relied (s) on the Diaspora financed Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, RUH8, Bellingcat, Webradius, InformNapalm and associated parties.
The Ukrainians were hired to get the goods on Trump. Part of that is knowing where to start isn’t it?
Fancy Bear’s Second Chance at Top Secret Passwords From Team Clinton
How stupid would the Fancy Bear teams of Shaltai Boltai, CyberHunta, Ukrainian Cyber Alliance, and RUH8 be if they had access to the DNC servers which makes it easier to get into the US State servers and not do that if it was their goal?
One very successful method of hacking is called social engineering. You gain access to the office space and any related properties and physically locate the passwords or clues to get you into the hardware you want to hack. This includes something as simple as looking over the shoulder of the person typing in passwords.
Let’s be clear. The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State personnel, and most likely Crowdstrike’s Dimitry Alperovich. Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have Fancy Bear’s signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.
Here is where it goes from bad to outright Fancy Bear ugly. Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former staff for research purposes from 2013 through prepping for the 2016 election. Were any foreigners part of the opposition research team for Team Hillary in 2014-2015-2016? The Clinton’s don’t have a history of vetting security issues well.
Let’s recap. Clinton keeps 6 top secret passwords for research staff. Alexandra Chalupa is running a research department that is rich in (foreign) Ukrainian Intelligence operatives, hackers, terrorists, and a couple Ruskie traitors.
Kristina Dobrovolska was acting as a handler and translator for the US State Department in 2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington to meet with Chalupa.
Alexandra types in her password to show Dobrovolska something she found and her eager to please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the Fancy Bear crew about it and they immediately get to work looking for Trump material on the US secret servers with legitimate access. I mean, what else could they do with this? Turn over sensitive information to the ever corrupt Ukrainian government?
According to the Politico article, Alexandra Chalupa was meeting with the Ukrainian embassy in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.
Four Verkhovna Rada deputies there for the event included: Viktoriia Y. Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh.
According to CNN, DNC sources said Chalupa told DNC operatives the Ukrainian government would be willing to deliver damaging information against Trump’s campaign. Later, Chalupa would lead the charge to try to unseat president-elect Trump starting on Nov 10, 2016.
Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison and translator who escorted the delegates from Kyiv during their visits to Albany and Washington.
Kristina Dobrovolska is the handler manager working with Ukraine’s DNC Fancy Bear Hackers. She took the Rada members to dinner to meet Joel Harding who designed Ukraine’s infamous Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.
The Podesta Hack – Don’t Mess with OUNb Parkhomenko
I have no interest in reviewing his history except for a few points. Adam Parkhomenko, a Diaspora Ukrainian nationalist almost gained a position in the presumed Clinton White House. As a Ukrainian nationalist, his first loyalty, like any other Ukrainian nationalist, is to a fascist model of Ukraine which Stepan Bandera devised but with a win it would be in America.
During the 2016 primaries, it was Parkhomenko who accused Bernie Sanders of working for Vladimir Putin. Parkhomenko has never really had a job outside the Clinton campaign.
Before Clinton declared her candidacy, Parkhomenko started a PAC for Hillary Clinton with the goal of getting millions of people email lists so the support was ready for a Clinton run. After she declared her candidacy, Robby Mook, Hillary’s campaign manager decided to sideline Parkhomenko and didn’t take on his full staff as promised. He reduced Parkomenko to a quiet menial position when he was brought onboard.
Ultimately, Podesta became responsible for this because he gave Parkhomenko assurances that his staff would be brought on and there would be no gaps in their paycheck. Many of them including Parkhomenko’s family moved to Brooklyn. And of course, that didn’t happen. Podesta was hacked in March and the Ukrainian nationalist Adam Parkhomenko was hired April 1st.
Today, Parkhomenko is working as a #DigitalSherlock with the Atlantic Council along with the Fancy Bear hackers and many of the people associated with them. Why could this be a revenge hack?
The Ukrainian Intel hackers are Pravy Sektor Ukrainian nationalists. Alexandra Chalupa is also an OUNb Bandera Ukrainian nationalist. This Ukrainian nationalist was on his way to becoming one of the most powerful people in America. That’s why.
The DNC Leak- A Patriotic Act
“At the same time her aides were creating “loyalty scores”, Clinton, “instructed a trusted aide to access the campaign’s server and download the messages sent and received by top staffers. She believed her campaign had failed her—not the other way around—and she wanted ‘to see who was talking to who, who was leaking to who.2’” After personally reading the email correspondence of her staffers, she called them into interviews for the 2016 campaign, where she confronted them with some of the revelations.”-
Forget about the DNC. The hackers may have spent months surfing the US secret servers downloading and delivering top secret diplomatic files to their own government. The people entrusted with this weren’t just sloppy with security, this is beyond treason.
It doesn’t matter if it was Seth Rich, though I hope it was ( for identification’s sake), who downloaded data from the DNC servers. The reasons supporting a leak are described by the Veteran Intelligence Professionals for Sanity (VIPS). This shows clearly why the leak to Wikileaks is much more plausible than a hack for the files taken in what is commonly called the DNC hack. This leak was one “hack” of many that was going on.
Imagine being this person inside the situations described above with the reality hitting you that things were very wrong. Even if they only saw parts of it, how much is too much? US government secrets were being accessed and we know this because the passwords were given out to the research teams the hackers were on.
It is very possible that giving the files to Wikileaks was the only safe way to be a whistleblower with a Democrat president supporting Team Hillary even as Team Hillary was cannibalizing itself. For detail on how the leak happened, refer to Adam Carter at DisobedientMedia.com and the VIPS themselves.
Today, this isn’t a Democrat problem. It could just as easily been an establishment Republican.
Ukraine needs to pay for what their Intel Operators/ hackers have done. Stop funding Ukraine other than verifiable humanitarian aid. Call your Congressional Rep.
Next up– We are going to look at who has oversight over this operation and who’s footing the bills.
Over the last 4 years, I’ve researched and written many stories that are still breaking in media today. Over the past 7 months we:
- Identified Propornot
- Identified Fancy Bear
- Showed clearly why Mueller’s evidence is rife with fraudulent data.
- We solved the DNC Hack-Leaks and showed the how and why of what went on.
If you want to support investigative research with a lot of depth, please support my Patreon page. You can also support my work through PayPal as we expand in new directions over the coming year. For the last 4 years, it’s been almost entirely self-supportive effort which is something when you consider I live in Donbass.