Lawsuit outs Ellen Ratner as source for Seth Rich information

Discussion in 'Conspiracy Theories' started by icehole3, Jul 15, 2019.

You are viewing posts in the Conspiracy Theory forum. PF does not allow misinformation. However, please note that posts could occasionally contain content in violation of our policies prior to our staff intervening.

  1. vman12

    vman12 Well-Known Member Past Donor

    Joined:
    Jun 25, 2015
    Messages:
    66,736
    Likes Received:
    46,539
    Trophy Points:
    113
    Really.

    What evidence is that.
     
  2. Hoosier8

    Hoosier8 Well-Known Member Past Donor

    Joined:
    Jan 16, 2012
    Messages:
    107,541
    Likes Received:
    34,489
    Trophy Points:
    113
    You mean the Mueller report that accepted the DNC provided information as proof without the FBI ever doing forensic analysis?
     
    vman12 likes this.
  3. vman12

    vman12 Well-Known Member Past Donor

    Joined:
    Jun 25, 2015
    Messages:
    66,736
    Likes Received:
    46,539
    Trophy Points:
    113
    He says he has evidence not from the DNC.

    Let's try to suppress laughter for a second.
     
    Last edited: Jul 16, 2019
  4. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    They had their own evidence, read the Russian indictment.
     
  5. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    For example, on or about April 22, 2016, the Conspirators compressed gigabytes of data from DNC computers, including opposition research. The Conspirators later moved the compressed DNC data using X-Tunnel to a GRU-leased computer located in Illinois.
    b. On or about April 28, 2016, the Conspirators connected to and tested the same computer located in Illinois. Later that day, the Conspirators used X-Tunnel to connect to that computer to steal additional documents from the DCCC network.
     
  6. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    More than a month before the release of any documents, the Conspirators constructed the online persona DCLeaks to release and publicize stolen election-related documents. On or about April 19, 2016, after attempting to register the domain electionleaks.com, the Conspirators registered the domain dcleaks.com through a service that anonymized the registrant. The funds used to pay for the dcleaks.com domain originated from an account at an online cryptocurrency service that the Conspirators also used to fund the lease of a virtual private server registered with the operational email account dirbinsaabol@mail.com. The dirbinsaabol email account was also used to register the john356gh URL-shortening account used by LUKASHEV to spearphish the Clinton Campaign chairman and other campaign-related individuals.
     
  7. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    Later that day, at 7:02 PM Moscow Standard Time, the online persona Guccifer 2.0 published its first post on a blog site created through WordPress. Titled “DNC’s servers hacked by a lone hacker,” the post used numerous English words and phrases that the Conspirators had searched for earlier that day (bolded below):
     
  8. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    On or about August 15, 2016, the Conspirators, posing as Guccifer 2.0, wrote to a person who was in regular contact with senior members of the presidential campaign of Donald J. Trump, “thank u for writing back . . . do u find anyt[h]ing interesting in the docs i posted?” On or about August 17, 2016, the Conspirators added, “please tell me if i can help u anyhow . . . it would be a great pleasure to me.” On or about September 9, 2016, the Conspirators, again posing as Guccifer 2.0, referred to a stolen DCCC document posted online and asked the person, “what do u think of the info on the turnout model for the democrats entire presidential campaign.” The person responded, “[p]retty standard.”
     
  9. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    Conspirators used the same pool of bitcoin funds to purchase a virtual private network (“VPN”) account and to lease a server in Malaysia. In or around June 2016, the Conspirators used the Malaysian server to host the dcleaks.com website. On or about July 6, 2016, the Conspirators used the VPN to log into the @Guccifer_2 Twitter account. The Conspirators opened that VPN account from the same server that was also used to register malicious domains for the hacking of the DCCC and DNC networks.
     
  10. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    After failed attempts to transfer the stolen documents starting in late June 2016, on or about July 14, 2016, the Conspirators, posing as Guccifer 2.0, sent Organization 1 an email with an attachment titled “wk dnc link1.txt.gpg.” The Conspirators explained to Organization 1 that the encrypted file contained instructions on how to access an online archive of stolen DNC documents. On or about July 18, 2016, Organization 1 confirmed it had “the 1Gb or so archive” and would make a release of the stolen documents “this week.”
     
  11. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    Either US Intel was spying on the hackers or mueller just made up a bunch of ****
     
  12. vman12

    vman12 Well-Known Member Past Donor

    Joined:
    Jun 25, 2015
    Messages:
    66,736
    Likes Received:
    46,539
    Trophy Points:
    113
    Oh great.

    How does he know how much data was moved from the DNC server and where it went?

    Oh yeah.

    The DNC told him that's what happened.
     
  13. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    How would the dnc know where it went? Or who leased the computer? How would they know about a test in April?
    If this is all made up why the hell is this indictment allowed to stand?!!
     
  14. vman12

    vman12 Well-Known Member Past Donor

    Joined:
    Jun 25, 2015
    Messages:
    66,736
    Likes Received:
    46,539
    Trophy Points:
    113
    They employed the people who notified the FBI of the hack of course: CrowdStrike.

    it's allowed to stand because it's about as effective as a ham sandwich indictment. It's not going anywhere anyway.
     
    Last edited: Jul 16, 2019
  15. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    Ignoring the other posts with evidence that couldn’t have come from the dnc huh? Yah I don’t blame you lol
     
  16. vman12

    vman12 Well-Known Member Past Donor

    Joined:
    Jun 25, 2015
    Messages:
    66,736
    Likes Received:
    46,539
    Trophy Points:
    113
    Really.

    Who else had access to the DNC servers.

    Wasn't the FBI or DHS. I'll remind you that the DNC servers aren't government computers.
     
  17. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    How did crowdstrike know who the hackers were emailing?
     
  18. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    How did crowdstrike track bitcoins being used?
     
  19. vman12

    vman12 Well-Known Member Past Donor

    Joined:
    Jun 25, 2015
    Messages:
    66,736
    Likes Received:
    46,539
    Trophy Points:
    113
    Who managed security of DNC computers that got the emails.
     
  20. vman12

    vman12 Well-Known Member Past Donor

    Joined:
    Jun 25, 2015
    Messages:
    66,736
    Likes Received:
    46,539
    Trophy Points:
    113
    Who says they did?

    I mean I can sit here and make a bunch of statements:

    "Purple is blue".

    That's not evidence that purple is blue.
     
  21. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    So we’re back to mueller fabricating evidence
     
  22. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    No idea what you’re askinf or how it relates to my question
     
  23. vman12

    vman12 Well-Known Member Past Donor

    Joined:
    Jun 25, 2015
    Messages:
    66,736
    Likes Received:
    46,539
    Trophy Points:
    113
    You don't understand that someone was in charge of making sure DNC computers were secure from hacking?
     
  24. vman12

    vman12 Well-Known Member Past Donor

    Joined:
    Jun 25, 2015
    Messages:
    66,736
    Likes Received:
    46,539
    Trophy Points:
    113
    Did you fabricate it, or did you just regurgitate it as evidence?
     
  25. The Mello Guy

    The Mello Guy Well-Known Member

    Joined:
    Apr 13, 2010
    Messages:
    114,662
    Likes Received:
    41,522
    Trophy Points:
    113
    Sure but what’s that have to do with my question about who the hackers were emailing?
     

Share This Page