Wednesday, July 10, 2019

Yes, indeed, the kidney has a special place in the heart. It is an incredible thing. Ask any heart surgeon.

OMG.

He has no finesse. Trump. He is inarticulate.

Continued from previous entry

1. Summer and Fall 2016 Operations Targeting Democrat-Linked Victims

There was a synergy between the Russians and the Trump campaign and this is blantant proof.

On July 27, 2016, Unit 26165 targeted email accounts connected to candidate Clinton's personal office Personal Privacy  Earlier that day, candidate Trump made public statements that included the following: "Russia, if you're listening, I hope you're able to find the 30,000 emails that are missing. I think you will probably be rewarded mightily by our press." 183 The "30,000 emails" were apparently a reference to emails described in media accounts as having been stored on a personal server that candidate Clinton had used while serving as Secretary of State.

Within approximately five hours of Trump's statement, GRU officers targeted for the first time Clinton's personal office. After candidate Trump's remarks, Unit 26165 created and sent malicious links targeting 15 email accounts at the domain PP         including an email account belonging to Clinton aide PP      The investigation did not find evidence of earlier GRU attempts to compromise accounts hosted on this domain. It is unclear how the GRU was able to identify these email accounts, which were not public. 184

Unit 26165 officers also hacked into a DNC account hosted on a cloud-computing service Personal Privacy     copies of the DNC data using Personal Privacy     databases (referred to On September 20, 2016, the GRU began to generate function designed to allow users to produce backups of databases (referred to Personal Privacy     as "snapshots"). The GRU then stole those snapshots by moving them to Personal Privacy   account that they controlled; from there, the copies were moved to GRU controlled computers. The GRU stole approximately 300 gigabytes of data from the DNC cloudbased account. 185

183 "Donald Trump on Russian & Missing Hillary Clinton Emails (click here)," YouTube Channel C-SPAN, Posted 7/27/16, available at https://www.youtube.com/watch?v=3kxG8uJUsWU (starting at 0:41).

184 Investigative Technique    

185 Netyksho Indictment ,i 34; see also SM-2589105-HACK, serial 29
 Investigative Technique 

2. Intrusions Targeting the Administration of U.S. Elections

They are very ambitious Russians. 

In addition to targeting individuals involved in the Clinton Campaign, GRU officers also targeted individuals and entities involved in the administration of the elections. Victims included U.S. state and local entities, such as state boards of elections (SBOEs), secretaries of state, and county governments, as well as individuals who worked for those entities. 186

The personal aspect of the Russians need for control is always there. It isn't just getting files, it is knowing who is involved. Innocent people in their everyday lives are targets of Russian power.

 The GRU also targeted private technology firms responsible for manufacturing and administering election-related software and hardware, such as voter registration software and electronic polling stations.187 The GRU continued to target these victims through the elections in November 2016. While the investigation identified evidence that the GRU targeted these individuals and entities, the Office did not investigate further. The Office did not, for instance, obtain or examine servers or other relevant items belonging to these victims. The Office understands that the FBI, the U.S. Department of Homeland Security, and the states have separately investigated that activity.

By at least the summer of 2016, GRU officers sought access to state and local computer networks by exploiting known software vulnerabilities on websites of state and local governmental entities. GRU officers, for example, targeted state and local databases of registered voters using a technique known as "SQL injection," by which malicious code was sent to the state or local website in order to run commands (such as exfiltrating the database contents). 188 In one instance in approximately June 2016, the GRU compromised the computer network of the Illinois State Board of Elections by exploiting a vulnerability in the SBOE's website. The GRU then gained access to a database containing information on millions of registered Illinois voters, 189 and extracted data related to thousands of U.S. voters before the malicious activity was identified. 190

The Russians were going to steal the election. They do all the time within their own country, but, it is very overt by stuffing ballot boxes. They definitely thought they would change votes and make it happen for their candidate.

183 "Donald Trump on Russian & Missing Hillary Clinton Emails," YouTube Channel C-SPAN, Posted 7/27/16, available at https://www.youtube.com/watch?v=3kxG8uJUsWU (starting at 0:41). 

184 Investigative Technique

185 Netyksho Indictment ,i 34; see also SM-2589105-HACK, serial 29 Investigative Technique  

186 Netyksho Indictment , 69

187 Netyksho Indictment , 69  Investigative Technique

188   Investigative Technique
189   Investigative Technique
190   Investigative Technique


Investigative Technique 
Similar Investigative Technique   for vulnerabiliites continued through the election.

Unit 74455 also sent spearphishing emails to public officials involved in election administration and personnel at companies involved in voting technology. In August 2016, GRU officers targeted employees of Personal Privacy     , a voting technology company that developed software used by numerous U.S. counties to manage voter rolls, and installed malware on the company network. Similarly, in November 2016, the GRU sent spearphishing emails to over 120 email accounts used by Florida county officials responsible for administering the 2016 U.S. election. 191 The spearphishing emails contained an attached Word document coded with malicious software (commonly referred to as a Trojan) that permitted the GRU to access the infected computer.192 The FBI was separately responsible for this investigation. We understand the FBI believes that this operation enabled the GRU to gain access to the network of at least one Florida county government. The Office did not independently verify that belief and, as explained above, did not undertake the investigative steps that would have been necessary to do so.

Exactly. They didn't care where the information came from or who obtained it, they would use it anyway. The Trump Campaign had a symbiotic relationship with Russia.

D. Trump Campaign and the Dissemination of Hacked Materials 

The Trump Campaign showed interest in WikiLeaks's releases of hacked materials throughout the summer and fall of 2016.  Harm of Ongoing Matter   

l.  HOM        

a. Background

Harm of Ongoing Matter     

191  Netyksho Indictment, 76   Investigative Technique  
192  Harm of Ongoing Matter

Breaktime

Continued from previous entry

b. WikiLeaks's First Contact with Guccifer 2.0 and DCLeaks

Shortly after the GRU's first release of stolen documents through dcleaks.com in June 2016, GRU officers also used the DCLeaks persona to contact WikiLeaks about possible coordination in the future release of stolen emails. On June 14, 2016, @dcleaks _ sent a direct message to @WikiLeaks, noting, "You announced your organization was preparing to publish more Hillary's emails. We are ready to support you. We have some sensitive information too, in particular, her financial documents. Let's do it together. What do you think about publishing our info at the same moment? Thank you."159  Investigative Technique  

Any of those documents supplied by Russia has to be viewed with a great deal of skepticism. I am quite confident if scrutinized there are changes made to suit Putin's hate of her.


Around the same time, WikiLeaks initiated communications with the GRU persona Guccifer 2.0 shortly after it was used to release documents stolen from the DNC. On June 22, 2016, seven days after Guccifer 2.0's first releases of stolen DNC documents, WikiLeaks used Twitter's direct message function to contact the Guccifer 2.0 Twitter account and suggest that Guccifer 2.0 "[s]end any new material [stolen from the DNC] here for us to review and it will have a much higher impact than what you are doing." 160


After the Russians published material on their own, Wikileaks actually solicited them to publish them on Wikileaks with hopes of having a greater impact. They may be right. The Russians were having success with their espionage sites though, at least in the USA.

On July 6, 2016, WikiLeaks again contacted Guccifer 2.0 through Twitter's private messaging function, writing, "if you have anything hillary related we want it in the next tweo [sic] days preferable [sic] because the DNC is approaching and she will solidify bernie supporters behind her after." The Guccifer 2.0 persona responded, "ok ... i see." WikiLeaks also explained, "we think trump has only a 25% chance of winning against hillary ... so conflict between bernie and hillary is interesting." 161

Wikileaks does have an agenda.

c. The GRU's Transfer of Stolen Materials to WikiLeaks Both the GRU and WikiLeaks sought to hide their communications, which has limited the Office's ability to collect all of the communications between them. Thus, although it is clear that the stolen DNC and Podesta documents were transferred from the GRU to WikiLeaksInvestigative Technique

Footnote 158 3/14/16 Twitter DM, @WikiLeaks to Personal Privacy  Less than two weeks earlier, the same account had been used to send a private message opposing the idea of Clinton " in whitehouse with her bloodlutt and amitions [sic] of empire with hawkish liberal-interventionist appointees." 11/19/15 Twitter Group Chat, Group ID 594242937858486276, @WikiLeaks et al.

Footnote 159 6/14/16 Twitter DM, @dcleaks_ to @WikiLeaks.

Footnote 160 Netyksho Indictment ,r 47(a).

Footnote 161 7/6/16 Twitter DMs, @WikiLeaks & @guccifer_2.

The Office was able to identify when the GRU ( operating through its personas Guccifer 2.0 and DCLeaks) transferred some of the stolen documents to WikiLeaks through online archives set up by the GRU. Assange had access to the internet from the Ecuadorian Embassy in London, England. Investigative Technique   

On July 14, 2016, GRU officers used a Guccifer 2.0 email account to send WikiLeaks an email bearing the subject "big archive" and the message "a new attempt."163 The email contained an encrypted attachment with the name "wk dnc link I .txt.gpg."164 Using the Guccifer 2.0 Twitter account, GRU officers sent WikiLeaks an encrypted file and instructions on how to open it.165 On July 18, 2016, WikiLeaks confirmed in a direct message to the Guccifer 2.0 account that it had "the 1 Gb or so archive" and would make a release of the stolen documents "this week." 166 On July 22, 2016, WikiLeaks released over 20,000 emails and other documents stolen from the DNC computer networks. 167 The Democratic National Convention began three days later.

Similar communications occurred between WikiLeaks and the GRU-operated persona DCLeaks. On September 15, 2016, @dcleaks wrote to @WikiLeaks, "hi there! I'm from DC Leaks. How could we discuss some submission-related issues? Am trying to reach out to you via your secured chat but getting no response. I've got something that might interest you. You won't be disappointed, I promise." 168 The WikiLeaks account responded, "Hi there," without further elaboration. The @dcleaks_ account did not respond immediately.

The Russians were controlling the information they sent to Wikileaks. They didn't send all of it at once. It was staged.

The same day, the Twitter account@guccifer_2 sent @dcleaks_ a direct message, which is the first known contact between the personas. 169 During subsequent communications, the Guccifer 2.0 persona informed DCLeaks that WikiLeaks was trying to contact DCLeaks and arrange for a way to speak through encrypted emails. 170

Footnote 162  Investigative Technique 

Footnote 163 This was not the GRU's first attempt at transferring data to WikiLeaks. On June 29, 2016, the GRU used a Guccifer 2.0 email accou~ted file to a WikiLeaks email account. 6/29/16 Email, guccifer2@mail.com IT            (The email appears to have been undelivered.)

Footnote 164 See SM-2589105-DCLEAKS, serial 28 (analysis).

Footnote 165 6/27/16 Twitter DM, @Guccifer_2 to @WikiLeaks.

Footnote 166 7/18/16 Twitter OM, @Guccifer_2 & @WikiLeaks.

Footnote 167 "DNC Email Archive," WikiLeaks (Jul. 22, 2016), available at https://wikileaks.org/dnc-emails.

Footnote 168 9/15/16 Twitter DM, @dcleaks_ to @WikiLeaks.

Footnote 169 9/15/16 Twitter DM, @guccifer _ 2 to @dcleaks _.

An analysis of the metadata collected from the WikiLeaks site revealed that the stolen Podesta emails show a creation date of September 19, 2016. 171 Based on information about Assange's computer and its possible operating system, this date may be when the GRU staged the stolen Podesta emails for transfer to WikiLeaks (as the GRU had previously done in July 2016 for the DNC emails). 172 The WikiLeaks site also released PDFs and other documents taken from Podesta that were attachments to emails in his account; these documents had a creation date of October 2, 2016, which appears to be the date the attachments were separately staged by WikiLeaks on its site. 173

Beginning on September 20, 2016, WikiLeaks and DCLeaks resumed communications in a brief exchange. On September 22, 2016, a DCLeaks email account dcleaksproject@gmail.com sent an email to a WikiLeaks account with the subject "Submission" and the message "Hi from DCLeaks." The email contained a PGP-encrypted with the filename "wiki_mail.txt.gpg." 174 Investigative Technique The email, however, bears a number of similarities to the July 14, 2016 email in which GRU officers used the Guccifer 2.0 persona to give WikiLeaks access to the archive of DNC files. On September 22, 2016 (the same day of DCLeaks' email to WikiLeaks), the Twitter account dcleaks sent a single message to WikiLeaks with the string of characters Investigative Technique 

The Office cannot rule out that stolen documents were transferred to WikiLeaks through intermediaries who visited during the summer of 2016. For example, public reporting identified Andrew Mueller-Maguhn

Mr. Muller-Maguhn is not a covert figure. I think the hacking business in Europe is regarded differently than in the USA. I believe he is a business man.

Andy Müller-Maguhn (click here) is a member of the German hacker association Chaos Computer Club. Having been a member since 1986, he was appointed as a spokesman for the club in 1990, and later served on its board until 2012

as a Wikileaks associate who may have assisted with the transfer of these stolen documents to Wikileaks. 175

The FBI had no problem coming to conclusions even when the material was Wikileaks. 

Footnote 170 See SM-2589105-DCLEAKS, serial 28; 9/15/16 Twitter DM, @G uccifer_2 & @WikiLeaks.

Footnote 171 See SM-2284941, serials 63 & 64 Investigative Technique

Footnote 172 Investigative Technique   At the time, certain Apple operating systems used a setting that left a downloaded file's creation date the same as the creation date shown on the host computer. This would explain why the creation date on WikiLeaks's version of the files was still September 19, 2016. See SM2284941, serial 62 Investigative Technique

Footnote 173 When WikiLeaks saved attachments separately from the stolen emails, its computer system appears to have treated each attachment as a new file and given it a new creation date. See SM-2284941, serials 63 & 64.

Footnote 174 See 9/22/16 Email, dcleaksproject@gmail.com

Footnote 175 Ellen Nakashima et al., A German Hacker Offers a Rare Look Inside the Secretive World ofJulian Assange and WikiLeaks (click here), Washington Post (Jan. 17, 2018).

On October 7, 2016, WikiLeaks released the first emails stolen from the Podesta email account. In total, WikiLeaks released 33 tranches (batches) of stolen emails between October 7, 2016 and November 7, 2016. The releases included private speeches given by Clinton; 177 internal communications between Podesta and other high-ranking members of the Clinton Campaign; 178 and correspondence related to the Clinton Foundation.179 In total, WikiLeaks released over 50,000 documents stolen from Podesta's personal email account. The last-in-time email released from Podesta' s account was dated March 21, 2016, two days after Podesta received a spearphishing email sent by the GRU.

It must feel pretty lousy to be hacked by a foreign power that is hostile to your own government. I imagine it rattles a person quite a bit. Everyone you care about, everyone you know, business associates are all part of those accounts. I think it is really hard to get your mind around it.

d. WikiLeaks Statements Dissembling About the Source of Stolen Materials

As reports attributing the DNC and DCCC hacks to the Russian government emerged, WikiLeaks and Assange made several public statements apparently designed to obscure the source of the materials that WikiLeaks was releasing. The file-transfer evidence described above and other information uncovered during the investigation discredit WikiLeaks's claims about the source of material that it posted.

If Assange is considered a journalist then Wikileaks has no obligation to cite sources, but, don't make it up.

Beginning in the summer of 2016, Assange and WikiLeaks made a number of statements about Seth Rich, a former DNC staff member who was killed in July 2016. The statements about Rich implied falsely that he had been the source of the stolen DNC emails

July 9, 2019
By Dell Cameron

A stunning report published Tuesday (click here) by Yahoo News identifies a Russian intelligence service as the origin of a conspiracy theory connecting the unsolved murder of former Democratic National Committee staffer Seth Rich to the leak of thousands of DNC emails in the summer of 2016. The report, authored by Yahoo’s chief investigative correspondent, Michael Isikoff, traces the root of the theory back to a phony intelligence “bulletin” reportedly circulated online by the SVR, Russia’s foreign intelligence service.


Rich, a 27-year-old DNC data specialist, was murdered on July 10, 2016, in what police concluded was a botched robbery. In the following weeks, WikiLeaks began disclosing some 20,000 internal DNC emails online, triggering theories that Rich may have been the anti-secrecy organization’s source. A slew of right-wing personalities, including notorious GOP trickster Roger Stone, helped spread the theory far and wide in an apparent attempt to aid President Trump, whose campaign was at the time under investigation by Special Counsel Robert Mueller....


On August 9, 2016, the @WikiLeaks Twitter account posted: "ANNOUNCE: WikiLeaks has decided to issue a US$20k reward for information leading to conviction for the murder of DNC staffer Seth Rich." 180 Likewise, on August 25, 2016, Assange was asked in an interview, "Why are you so interested in Seth Rich's killer?" and responded, "We're very interested in anything that might be a threat to alleged Wikileaks sources." The interviewer responded to Assange's statement by commenting, "I know you don't want to reveal your source, but it certainly sounds like you're suggesting a man who leaked information to WikiLeaks was then murdered." Assange replied, "If there's someone who's potentially connected to our publication, and that person has been murdered in suspicious circumstances, it doesn't necessarily mean that the two are connected. But it is a very serious matter ... that type of allegation is very serious, as it's taken very seriously by us."181

After the U.S. intelligence community publicly announced its assessment that Russia was behind the hacking operation, Assange continued to deny that the Clinton materials released by WikiLeaks had come from Russian hacking. According to media reports, Assange told a U.S. congressman that the DNC hack was an "inside job," and purported to have "physical proof' that Russians did not give materials to Assange. 182

176  Investigative Technique
177  Personal Privacy
178  Personal Privacy
179  Netyksho Indictment ,r 43. 
180 @WikiLeaks 8/9/16 Tweet.
181 See Assange: "Murdered DNC Staffer Was 'Potential' WikiLeaks Source, (click here) " Fox News (Aug. 25, 2016)(containing video of Assange interview by Megyn Kelly).
182 M. Raju & Z. Cohen, A GOP Congressman's Lonely Quest Defending Julian Assange (click here), CNN (May 23, 2018).


continued in following entry - thank you
Page 43 of the Special Counsel Report (click here) Page 51 on the PDF.
Under the heading Guccifer (sounds like Lucifer) 2.0.


That same day, June 15, 2016, the GRU also used the Guccifer 2.0 WordPress blog to begin releasing to the public documents stolen from the DNC and DCCC computer networks. The Guccifer 2.0 persona ultimately released thousands of documents stolen from the DNC and DCCC in a series of blog posts between June 15, 2016 and October 18, 2016. 147 Released documents included opposition research performed by the DNC (including a memorandum analyzing potential criticisms of candidate Trump), internal policy documents (such as recommendations on how to address politically sensitive issues), analyses of specific congressional races, and fundraising documents. Releases were organized around thematic issues, such as specific states (e.g., Florida and Pennsylvania) that were perceived as competitive in the 2016 U.S. presidential election. 

The Russians seemed to know what they were looking at and it was the DNC strategy for the races of 2016. Sabotage and nothing short of it. Talk about demoralizing. I can't imagine how they felt when their work was displayed so publically. Of course, Trump's documents weren't on public display. 


Beginning in late June 2016, the GRU also used the Guccifer 2.0 persona to release documents directly to reporters and other interested individuals


Who are the other individuals? They were working with stolen documents. That didn't stop anyone? "The Smoking Gun" isn't what I would call a mainstream media outlet, so it is easy to understand that Russia didn't want the public to know there were stolen documents being used for the purpose of electing Trump. The Russians used conservative media that was more inflammatory then regular media. If a mainstream newspaper was sent these documents they would go through an extensive review of where they came from and would probably have called the FBI. Whether they would print them or not is still uncertain, but, the process would be very different than placing scandalous documents with obscure media sources. The information would reach voters with extremist views first and by the time it reached the mainstream media the momentum would already be established and nearly impossible to stop. The USA elections were very well studied by Putin's intelligence services.

Specifically, on June 27, 2016, Guccifer 2.0 sent an email to the news outlet The Smoking Gun offering to provide "exclusive access to some leaked emails linked [to] Hillary Clinton's staff." 148 The GRU later sent the reporter a password and link to a locked portion of the dcleaks.com website that contained an archive of emails stolen by Unit 26165 from a Clinton Campaign volunteer in March 2016. 149 That the Guccifer 2.0 persona provided reporters access to a restricted portion of the DCLeaks website tends to indicate that both personas were operated by the same or a closely-related group of people.150

The GRU continued its release efforts through Guccifer 2.0 into August 2016. For example, on August 15, 2016, the Guccifer 2.0 persona sent a candidate for the U.S. Congress documents related to the candidate's opponent.151 On August 22, 2016, the Guccifer 2.0 persona transferred approximately 2.5 gigabytes of Florida-related data stolen from the DCCC to a U.S. blogger covering Florida politics. 152 On August 22, 2016, the Guccifer 2.0 persona sent a U.S. reporter documents stolen from the DCCC pertaining to the Black Lives Matter movement.153


Footnote 147 Releases of documents on the Guccifer 2.0 blog occurred on
June 15, 2016;
June 20, 2016;
June 21, 2016;
July 6, 2016;
July 14, 2016;
August 12, 2016;
August 15, 2016;
August 21, 2016;
August 31, 2016;
September 15, 2016;
September 23, 2016;
October 4, 2016; and
October 18, 2016. 

Footnote 148 6/27/16, email Guccifer20@aol.fr to Personal Privacy (subject "leaked emails"); Investigation Technique IT

Footnote 149 6/27/16 Email, uccifer20@aol.fr to Personal Privacy ;(subject "leaked emails"); IT        see also 6/27/16 guccifer20@aol.fr to Personal Privacy (subject "leaked emails") (claiming DCLeaks was a "Wikileaks sub project)

Footnote 150 Before sending the reporter the link and password to the closed DCLeaks website, and in an apparent effort to deflect attention from the fact that DCLeaks and Guccifer 2.0 were operated by the same organization, the Guccifer 2.0 persona sent the reporter an email stating that DCLeaks was a "Wikileaks sub project" and that Guccifer 2.0 had asked DCLeaks to release the leaked emails with "closed access" to give reporters a preview of them.

So, Putin was even lying about the relationship with Wikileaks to attempt to cover his tracks.

Footnote 151 Netyksho Indictment ,r 43(a).

Footnote 152 Netyksho Indictment ,r 43(b ).

Footnote 153 Netyksho Indictment ,r 43(c).

The GRU was also in contact through Guccifer 2.0 persona with HOM      a former Trump campaign member Harm to Ongoing Matter    154 early August 2016, HOM         Twitter's suspension of the Guccifer 2.0 Twitter account. After it was reinstated, GRU officers posing as Guccifer 2.0 wrote HOM        in private message, "thank u for writing back ... do u find anyt[h]ing interesting in the docs i posted?" On August 17, 2016, the GRU added, "please tell me if i can help u anyhow . .. it would be a great pleasure to me." On September 9, 2016, the GRUi;(T);f posing as Guccifer 2.0-referred to a stolen DCCC document posted online and asked HOM        "what do u think of the info on the turnout model for the democrats entire presidential campaign." - responded, "pretty standard."155 The investigation did not identify evidence of other communications between HOM      and Guccifer 2.0.

3. Use of WikiLeaks

In order to expand its interference in the 2016 U.S. presidential election, the GRU units transferred many of the documents they stole from the DNC and the chairman of the Clinton Campaign to WikiLeaks. GRU officers used both the DCLeaks and Guccifer 2.0 personas to communicate with WikiLeaks through Twitter private messaging and through encrypted channels, including possibly through WikiLeaks's private communication system. 

a. WikiLeaks's Expressed Opposition Toward the Clinton Campaign 

WikiLeaks, and particularly its founder Julian Assange, privately expressed opposition to candidate Clinton well before the first release of stolen documents. In November 2015, Assange wrote to other members and associates of WikiLeaks that "[w]e believe it would be much better for GOP to win ... Dems+Media+liberals woudl [sic] then form a block to reign in their worst qualities. . . . With Hillary in charge, GOP will be pushing for her worst qualities., dems+media+neoliberals will be mute . ... She' s a bright, well connected, sadisitic sociopath."156

Sadistic sociopath. Wow. I have never and I never will see Hillary Clinton in that light. She was well liked in the State Department and among her peers. She had a burden from the right wing media that no one should have to shoulder and perhaps that is what others see.

In March 2016, WikiLeaks released a searchable archive of approximately 30,000 Clinton emails that had been obtained through FOIA litigation. 157 While designing the archive, one WikiLeaks member explained the reason for building the archive to another associate:

Footnote154 HOM     

Footnote 155  Harm of Ongoing Matter    Harm to Ongoing Matter

Footnote 156 11/19/15 Twitter Group Chat, Group ID 594242937858486276, @WikiLeaks et al. Assange also wrote that, "GOP will generate a lot opposition [sic], including through dumb moves. Hillary will do the same thing, but co-opt the liberal opposition and the GOP opposition. Hence biliary has greater freedom to start wars than the GOP and has the will to do so." Id.


Footnote 157 WikiLeaks, "Hillary Clinton Email Archive," available at https://wikileaks.org/clinton-emails/.


OMG, Hillary was promoting women and girls with her position at the State Department. She was even a champion for the LGBT. Where does Assange get the idea his activities would annoy Hillary? Did she ever say that? I think there are a lot of assumptions that are not accurate. I don't think Hillary Clinton was bothered by Wikileaks in a personal way. I think she worried about the exposure of the military, but, on a personal level I don't see it as an issue. Her personal life had taken added dimension with a son-in-law and a grandchild. I think she and Bill were happy in ways most of us are happy. Her professional life had to be satisfying, she had speaking engagements. She was a busy lady. I don't think she dwelled on all that. She had lawyers that dwelled on that stuff.

[W]e want this repository to become "the place" to search for background on hillary's plotting at the state department during 2009-2013. . . . Firstly because its useful and will annoy Hillary, but secondly because we want to be seen to be a resource/player in the US election, because eit [sic] may en[]courage people to send us even more important leaks. 158


continued in next entry - thank you

Hanford Nuclear Plant is 7 miles from the Columbia River and degrading quickly.

In 2017, under the Trump administration and Rick Perry as Energy Secretary had a tunnel collapse at this former weapons plant. I doubt if an oilman understands the intricacies of a decaying nuclear weapons plant. President Obama didn't have an oilman at the Department of Energy, he had a physicist. I suggest Perry get in touch with the former Secretary of Energy and commission help.

May 10, 2017
By Susan Hobbs Baker

Hanford PUREX (Plutonium Uranium Extraction - click here) plant interior.

...A 20-foot-long section (click here) of an underground rail tunnel beneath a plutonium production facility called the Plutonium Uranium Extraction Facility (PUREX) collapsed, potentially affecting an area of about 400 square feet. These tunnels contain contaminated equipment and materials from the facility, and were sealed in the 1990s. It’s believed that routine road maintenance was the cause of the collapse. Robots are currently being used to inspect the accident. Here is the official feed from Hanford for updates....

July 10, 2019
By Anna King

Hanford's PUREX plant.

A new federal report (click here) says that a massive building at the Hanford Nuclear Site is worse off than managers thought.

The so-called PUREX — Plutonium Uranium Extraction — plant isn’t clean. Starting in 1956 the plant processed loads of plutonium. Its walls are up to 6 feet thick, and it’s as long as three football fields.

PUREX is located within Hanford’s 200 East Area. It’s about 7 miles from the Columbia River and 5 miles from State Highway 240.

Locals call these large buildings with deep underground walls “canyons.” They’re also called “Queen Marys” because of their long shape resembling ocean liners sailing amid the sagebrush....
The Individual Mandate is still a part of the ACA. For some reason the Republican Congress decided to give Americans a pass on the tax for personal responsibility, that does not negate the individual mandate. A Congress in the future can return the cost of the tax. The fluidity in the law when it comes to the individual mandate tax amount does not negate the mandate, it only makes the law susceptible to politics. The change in a $0.00 by the Republican Congress was carried out because of politics, not practical law.

None of the women, when they were girls, carry guilt for their assault. No one was going to stop Jeffery Epstein. "Me Too."

This is happening because of "Me Too." Before this movement, women were chattel and nothing more.

Jeffery Epstein was a mystery because he was a master at the sex trade. He used his Wall Street status to hide his lucrative sex trade business. A Wall Street identity provided the perfect front for his public persona.

Women, when assaulted in any way, never deserve it or asked for it. Women are supposed to be pretty and personable. Being yourself could never be a crime. Being attractive is what women and men are supposed to pursue. Being attractive is legal and is part of a personal grooming paradigm worth trillions on Wall Street.

Most of the women, when girls, were just beginning the idea of dating. They could never be so mastered in the art of being seductive that they invited an older man's intentions. And remember this, Jeffery Epstein INTENDED to have what he wanted. He is the guilty one.


October 26, 2019
By Landon Thomas, Jr.

...It’s a life full of question marks. (click here) Epstein is said to run $15 billion for wealthy clients, yet aside from Limited founder Leslie Wexner, his client list is a closely held secret. A former Dalton math teacher, he maintains a peripatetic salon of brilliant scientists yet possesses no bachelor’s degree. For more than ten years, he’s been linked to Manhattan-London society figure Ghislaine Maxwell, daughter of the mysteriously deceased media titan Robert Maxwell, yet he lives the life of a bachelor, logging 600 hours a year in his various planes as he scours the world for investment opportunities. He owns what is said to be Manhattan’s largest private house yet runs his business from a 100-acre private island in St. Thomas.

Power on Wall Street has generally accrued to those who have made their open bids for it. Soros. Wasserstein. Kravis. Weill. The Sturm und Drang of their successes and failures has been played out in public. Epstein breaks the mold. Most everyone on the Street has heard of him, but nobody seems to know what the hell he is up to. Which is just the way he likes it....


July 10, 2019
By Nico Hines

A new accuser (click here) has come forward to claim that Jeffrey Epstein sexually assaulted her when she was 14 and then raped her at the age of 15 inside his New York City townhouse.

Jennifer Araoz, now 32, told NBC’s Today show on Wednesday morning that she was first approached in 2001 by a recruiter who brought her to Epstein’s home on the Upper East Side promising that he could help with her career. Once there, she said she was initially treated well, given wine and a tour of the house before being handed $300.

She said was invited back on several occasions, each time being given an envelope containing the same amount of money, usually by Epstein’s secretary....