in the 11-page report
( full report now posted here )
https://electioncircus.blogspot.com/2019/05/barr-redacts-himself-cartoon.html
... meaning this chapter had
been deleted from my first draft:
From roughly July 2016
through roughly
November 2016,
WikiLeaks released
tens of thousands
of documents stolen
from the Democrat National
Committee, and from the
personal email account
of the chairman of the
Hillary Clinton campaign.
There is no evidence for
any Russian government
involvement in the
phishing scam,
theft of the emails
(+ attachments) of
John Podesta, or the
publication of them
by WikiLeaks.
The Podesta
( @gmail.com )
e-mail inbox was
on a Google GMail
server, never on any
DNC system server.
Podesta emails were
retrieved after an
unknown party (A) misled
him into providing
his password, by making him
believe he needed to reset it,
and providing a link to a
fake google account
password reset page.
The DNC Finance people emails
seem to have been retrieved
in the same manner,
by an unknown party (B).
Simply by knowing one
or more passwords.
DNC emails published
by WikiLeaks belong
to 10 people from DNC Finance.
They were retrieved from either
10 individual inboxes OR from a
single shared DNC Finance
group email box.
The To and From
in the emails indicates
10 different accounts.
What are the odds that
all 10 people fell for the
same password
phishing scam?
At least one of
the DNC Finance
people received
a phishing e-mail
similar to the one
John Podesta received,
and he also clicked on
the link provided.
There does not seem to be any
certain link between the theft
of the emails from Podesta
(or DNC Finance) and the
(alleged) hacking of DNC
computer servers.
Also the description in the
GRU Indictment of the how
they are accused to have
broken in to the DNC network
and servers seems incorrect.
For two reasons:
1) groups like Fancy Bear
normally use a very different
approach.
That approach is getting
a victim to start some malware
on a laptop or other computer
which is already a member
of the computer network,
using an account also known
to the network ("working from
the inside").
The way described in the
Mueller indictment (remote login
from a non-DNC computer;
i.e. working from the outside)
does not work.