Thursday, May 23, 2019

Chapter "#25" of the 11-page analysis of the Mueller Report

There were only 24 chapters 
in the 11-page report 
( full report now posted here )
https://electioncircus.blogspot.com/2019/05/barr-redacts-himself-cartoon.html

... meaning this chapter had
been deleted from my first draft:



From roughly July 2016 
through roughly 
November 2016, 
WikiLeaks released 
tens of thousands 
of documents stolen 
from the Democrat National
Committee, and from the
personal email account 
of the chairman of the 
Hillary Clinton campaign.

There is no evidence for 
any Russian government 
involvement in the 
phishing scam, 
theft of the emails 
(+ attachments) of 
John Podesta, or the 
publication of them 
by WikiLeaks.

The Podesta 
( @gmail.com ) 
e-mail inbox was 
on a Google GMail 
server, never on any 
DNC system server.

Podesta emails were 
retrieved after an 
unknown party (A) misled
him into providing 
his password, by making him 
believe he needed to reset it,
and providing a link to a 
fake google account 
password reset page.

The DNC Finance people emails 
seem to have been retrieved 
in the same manner, 
by an unknown party (B). 

Simply by knowing one 
or more passwords.

DNC emails published 
by WikiLeaks belong 
to 10 people from DNC Finance.

They were retrieved from either
10 individual inboxes OR from a 
single shared DNC Finance 
group email box. 

The To and From 
in the emails indicates 
10 different accounts.

What are the odds that 
all 10 people fell for the 
same password 
phishing scam?

At least one of 
the DNC Finance 
people received 
a phishing e-mail
similar to the one 
John Podesta received, 
and he also clicked on 
the link provided. 

There does not seem to be any 
certain link between the theft 
of the emails from Podesta 
(or DNC Finance) and the 
(alleged) hacking of DNC 
computer servers.

Also the description in the
GRU Indictment of the how 
they are accused to have 
broken in to the DNC network
and servers seems incorrect.

For two reasons:
1) groups like Fancy Bear 
normally use a very different 
approach. 

That approach is getting 
a victim to start some malware 
on a laptop or other computer 
which is already a member 
of the computer network, 
using an account also known 
to the network ("working from 
the inside").

The way described in the 
Mueller indictment (remote login 
from a non-DNC computer; 
i.e. working from the outside) 
does not work.