This blog will be on hiatus until 7/28, as the operator will be joining protesters in Philadelphia for the upcoming week.
While I'm in Philly, I hope to edit a comprehensive video on Guccifer 2.0 that I prepared for YouTube earlier today:
“Our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April,” that statement read, “and we believe that the subsequent release and the claims around it may be a part of a disinformation campaign by the Russians. We’ve deployed the recommended.”Again, that final period is Uchill's editorial insertion, not mine. The full sentence that he abridged into meaninglessness is a chestnut that first appeared in various media outlets (such as CNN) in mid-June: "We've deployed the recommended technology so that today our systems are secure thanks to a swift response to that attack and we will continue to monitor our systems closely."
Instead of confirming or denying the validity of the documents, the DNC has reverberated the same tired excuse, claiming Russian hackers are responsible: “Our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April and we believe that the subsequent release and the claims around it may be a part of a disinformation campaign by the Russians. We’ve deployed the recommended.”I don't have a problem with Sainato quoting Uchill, but I find it strange that he didn't bother to read the material he quoted--since anyone who reads "We've deployed the recommended" is bound to wonder what happened to the rest of the sentence.
While the DNC and Clinton campaign have called for party unity, Clinton has continued the politically-expedient tactic of adopting several of Sanders’ popular ideas.
“Our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April, and we believe that the subsequent release and the claims around it may be a part of a disinformation campaign by the Russians,” a senior DNC official said in a written statement.Here's the antepenultimate paragraph of "Celeb phone numbers included in Guccifer 2.0 hack" (7/18):
Many have suggested that Guccifer 2.0 is a front for Vladimir Putin in the Russian leader’s efforts to influence American politics, something Guccifer 2.0 denies.And here are the final two paragraphs of "New Guccifer 2.0 dump highlights 'wobbly Dems' on Iran deal" (7/18):
The DNC declined to issue a new comment but reiterated a prior statement from a senior official.Note that the last conclusion is almost identical to the first. However, Uchill knows better than to conclude two out of three articles on the same subject in less than a week in exactly the same way. So he presents the illusion of changing things up by moving the attribution of his unnamed source to the middle of the paragraph and tacking on a puzzling piece of extra information: "We've deployed the recommended."
“Our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April,” that statement read, “and we believe that the subsequent release and the claims around it may be a part of a disinformation campaign by the Russians. We’ve deployed the recommended.”
The documents provide some insight into how the DNC handled high-profile donation scandals. But the choice of documents revealed to The Hill also provides insight into the enigmatic Guccifer 2.0.Paragraph 5: The Democrats don't want candidates associated with donor Norman Hsu to be contaminated by the scandal that led to Hsu's conviction and sentencing in 2009.
To be clear, this is not to suggest that in similar circumstances, a person who engaged in this activity would face no consequences. To the contrary, those individuals are often subject to security or administrative sanctions. But that is not what we are deciding now.This concession from Comey has nothing whatever to do with the criminality of Clinton's actions and everything to do with how security breaches in various government departments routinely result in demotions, firings, or the revocation of security clearances--but Goodman is only interested in what he wanted to hear, not what Comey said.
The fact that the distinction between Guccifer and Guccifer 2.0 is lost on much of the public suggests something about how little attention people are paying to the DNC hack--but it suggests far more about how little coverage the Guccifer 2.0 revelations have received from corporate media.All of you #Guccifer2 @BernieSanders people that shared docs, they all were fake. #DrinkingTheKoolAid #fact https://t.co/6hqyb4724m— Michael A. Brown (@920MichaelBrown) July 7, 2016
Today, Twitter is abuzz again with assertions that the DNC hack must not be authentic because Marcel Lehel lied about accessing clintonemail.com. Even people who understand that the Guccifers are different hackers still blur the two hacks based on Comey's statement:Not a good night. The #AltonSterling video and reports that #Guccifer2 might be dead. No, not a good night at all.— Dres1011 (@Dres1011) July 6, 2016
How strange that people who have no trouble understanding the difference between George H.W. Bush and George W. Bush somehow fail to grasp the difference between Marcel Lazar Lehel (Guccifer) and the unidentified hacker whose handle (Guccifer 2.0) is an homage to Lehel.Hey all you #Guccifer & #Guccifer2 conspiracy theorists. Sucks 2BU. Dir. Comey just confirmed they lied about hacking Sct Clinton. Lol!— Schmeldo (@58isthenew40) July 7, 2016
If there was no penetration of her server, explain #Guccifer2 disclosures. Your review has been totally corrupted. #Whitewash— Skip Hatos (@SkipHatos) July 5, 2016
— GUCCIFER 2.0 (@GUCCIFER_2) July 4, 2016
CrowdStrike said it is investigating whether the hacker’s public statements are part of a Russian disinformation campaign or just a lone hacker looking to steal credit, but as of June 15, they said their internal findings that Guccifer 2.0 was connected to Russian intelligence services had not changed.Is the purpose of that paragraph to raise questions about Guccifer 2.0 in the spirit of open and honest inquiry--or to foreclose discussion by setting up a false dichotomy?
Of course I'm interested, but I'll have to get some legal advice before sharing such documents publicly--or even reviewing them. I hope you're familiar with the U.S. government's "chilling effects" campaign and the way it impacted Barrett Brown. I fully intend to exercise all the rights I'm guaranteed as a U.S. citizen, but I'm unwilling to do anything illegal. I hope that's a satisfactory answer.In fact, this post is far less about what Guccifer 2.0 said to me than what I said to him--and what I fear other bloggers with short memories (or shallow educations concerning recent U.S. history in the cybercrime arena) might have said instead.
At the instruction of the FBI, Monsegur offered Hammond a server to store the data being extracted from Stratfor. Hammond agreed, and told others that they would use Monsegur's server as a "first base of operations" before moving it elsewhere.It's undeniable that Henry's FBI allowed the Stratfor hack to proceed long after they knew it was underway, so why should we assume that they had nothing to do with selecting the target?