Tyb
I have irl today
o7
TO3406
Donald Trump Jr.
/ @DonaldJTrumpJr 04/04/2022 21:10:05
Truth Social: 108076794211793122
Image Name: 1a93ff31ec7f2187.jpg
Filename: 1a93ff31ec7f2187.jpg
Seems legit to me.
The Alfa Bank Hoax Is Looking A Lot Like Crossfire Hurricane
By: Margot Cleveland
April 04, 2022
If cybersecurity experts could trigger an investigation into Trump for political reasons, they can prompt an investigation of anyone, for any reason.
A lawyer for former Hillary Clinton campaign attorney Michael Sussmann revealed last week that federal agents never asked Sussmann the origin of the data he provided the FBI related to the Alfa Bank hoax. Beyond highlighting the hackery of the Crossfire Hurricane team, this revelation raises broader concerns about the cozy relationship between the government and private cybersecurity experts.
On Thursday, Sussmannâs Latham and Watkins attorney Michael Bosworth pushed for the dismissal of the special counselâs criminal case. That case charged Sussmann with lying to former FBI General Counsel James Baker when he provided Baker âwhite papersâ and data ostensibly showing a secret communications channel between the Trump organization and the Russia-connected Alfa Bank. According to the indictment, Sussmann falsely claimed during his meeting with Baker that he was not acting on behalf of a client, when in fact he was working for both the Clinton campaign and tech executive Rodney Joffe.
During last weekâs oral argument on Sussmannâs motion to dismiss, Bosworth posited that Sussmannâs allegedly false statement was not âmaterialâ to the FBIâand thus not a crimeâby arguing that because the FBI never questioned Sussmann on the source of the Alfa Bank information, it was irrelevant to the investigation.
Not once will the evidence show, Bosworth argued, that âanyone at the FBI ever asked Mr. Sussmann, âHey, by the way, where did this information come from?â No one asked. Not once. Ever.â Sussmannâs attorney continued: âRegardless of who his clients were, if the source of his information was so critical to the governmentâs investigation, if it mattered so much, youâd think at some point someone would have said, âHey, buddy, you provide this tip to the government. Where did this stuff come from? Who gave it to you? Where didâhow did they get it?â
Bosworthâs argument came in response to prosecutor Andrew DeFilippisâs assertion that the special counselâs office would âput on the stand at trial witnesses who will say that, when youâre analyzing data, you donât simply close your eyes to where the data came from and compare it to other data or look for corroboration through other sources. The first thing any responsible forensic analysis will ask is âWhere was the data from?ââ
Picking up on Bosworthâs argument, the court interrupted DeFilippis, asking: âIf thatâs the first thing a responsible investigator would ask, then why would it matter whether Mr. Sussmann was there on behalf of a client or not? Wouldnât the natural question have been, âWhere did this stuff come from?ââ
DeFilippis responded that because the former FBI general counsel wrongly believed Sussmann had come forward âas a good citizen,â that lulled Baker into accepting the data and white papers without question. Sussmannâs attorney called that argument ânonsensical,â saying that, âif, as the special counsel claims, the first question that investigators would ask is where did the data come from, thatâs the question thatâs paramount.â
Bosworth then stressed that the FBI knew the data didnât originate with Sussmann because heâs âa lawyerâ and isnât âsitting on a pool of DNS data,â and because Baker testified repeatedly that âSussmann told him that the information originated with various cyber experts.â âAt no point did the FBI say, âWho are those experts? Can we talk to them? Where did they get it from?â Bosworth continued. âSo, the notion that Mr. Sussmannâs statement about a client somehow affected the FBIâs willingness to ask the basic questions they ask in any case just doesnât hold water,â Sussmannâs attorney concluded.
Bosworth made an excellent pointâactually two, as we will soon seeâjust not the winning point he thought. The failure of the FBI to ask âthe basic questionsâ about the data and white papers Sussmann provided on the purported Trump-Alfa Bank secret communications speaks not of the unimportance of that information, but of the incompetence (or political corruption) of the Crossfire Hurricane team.
The Tips of Many Icebergs
The FBIâs glaring lack of curiosity concerning the source of the Alfa Bank âintelâ mirrors in many respects how the agents assigned to investigate Trump approached the Steele dossier. With Christopher Steeleâs supposed intel, the Crossfire Hurricane team undertook some steps to identify Steeleâs sources and to verify the information contained in the memoranda. Yet before they were able to do either, the Department of Justice submitted a Foreign Intelligence Surveillance Act (FISA) application to the FISA court and obtained a warrant to surveil former Trump campaign advisor Carter Page.
The DOJ later submitted three renewal applications to the FISA court, again relying heavily on the Steele dossier, even though agents were unable to confirm any of the non-public âintelâ of relevance and after discovering numerous problems with Steeleâs reporting. The Department of Justiceâs Office of Inspector General or OIG later found that the FISA applications targeting Page contained 17 âsignificant inaccuracies and omissions.â
Soon after, the then-presiding judge of the FISA court, Rosemary Collyer, blasted the FBI for its handling of the Page FISA applications. She also stressed âthe frequency with which representations made by FBI personnel turned out to be unsupported or contradicted by information in their possession, and with which they withheld information detrimental to their case, calls into question whether information contained in other FBI applications is reliable.â
The FISA abuse seen in the Page case exposed the DOJ and FBIâs sloppiness, disregard for the law, incompetence, and political bias, casting doubt on the entire FISA process. Similarly, the revelation last week that no one from the FBI asked Sussmann for the source of the Alfa Bank data and whitepapers suggests these same problems broadly infect federal law enforcement and intelligence agencies.
Relying on Obviously Suspect Information
With Steele, the feds believed the unbelievable in part because of Steeleâs pedigree as a former MI6 agent. Here the FBI relied unquestioningly on Sussmann and the data and white papers he provided from âvarious cyber expertsâ to open an investigation into the supposed Alfa Bank-Trump communications network.
While Sussmannâs attorney posited that the FBI unquestioningly accepted the data and white papers because the source of the information was irrelevant, the more likely explanation is that the law enforcement and intelligence communities worked regularly with Sussmann, tech companies, and cyber experts, and placed unwavering trust in those sources.
Sussmannâs congressional testimony confirmed that he had âvarious contacts with members of law enforcement and the intelligence community on behalf of a number of different clientsâ since leaving the Department of Justice. He had served as âa prosecutor in the {DOJâs] Computer Crime and Intellectual Property Sectionâ before joining Perkins Coie.
Sussmann likewise revealed in court filings that Joffe, âfar from being a stranger to the FBIâwas someone with whom the FBI had a long-standing professional relationship of trust and who was one of the worldâs leading experts regarding the kinds of information that Mr. Sussmann provided to the FBI.â
Thereâs a Whole Lot of This Going On
It was also not merely Sussmann and Joffe with whom the FBI and intelligence agencies held close contact. Rather, documents obtained from right-to-know requests to Georgia Tech reveal extensive coordination between the Department of Defenseâs Defense Advanced Research Projects Agency (DARPA), the FBI, and cybersecurity experts.
Some of this coordination came through private organizations such as Ops-Trust, a self-described âhighly vetted community of security professionals focused on the operational robustness, integrity, and security of the Internetâ that includes both law enforcement and private cybersecurity experts. The National Cyber Forensics and Training Alliance, or NCFTA, likewise âfacilitates collaboration and information sharing between private industry, academia, and the law enforcement/intelligence communityâ with the FBI having an agent âcollocatedâ at the NCFTA.
Emails reviewed by The Federalist show regular communication between the FBI and members of the NCFTA listserv discussing investigative matters, including requests by the FBI for âlaw enforcement friendly contactsâ at tech companies. No wonder, then, that the FBI was âlulledâ into opening an investigation into the supposed Trump-Alfa Bank connection based on Sussmannâs word that the data and white papers originated with cyber experts.
Just Consider One Other Georgia Tech Researcher
While the documents publicly available remain limited mainly to those accessible from Georgia Tech, that material still provides a glimpse at the deep connection between private cybersecurity experts and members of federal law enforcement and intelligence agencies.
Emails show, for instance, that Manos Antonakakis, the Georgia Tech researcher who reviewed one of the white papers Sussmann later provided to Baker, worked for years with FBI agents, communicated with DARPA about various requests to assist with FBI or DOJ investigations, and provided analyses used in various criminal matters. Antonakakis also provided an analysis for the federal government of hackers believed to be working for the Russian military intelligence agency GRU, known publicly by the nickname âFancy Bear.â
Other documents show that as part of Antonakakisâ work with DARPA and the $17 million contract awarded Georgia Tech researchers to âidentify the virtual actors responsible for cyberattacks, a technique known as âattribution,â Antonakakis conducted attribution analysis for the federal government, including with data provided by Joffe.
A Situation Ripe for Setups
This collaboration between government entities and private cybersecurity experts is, as the Wall Street Journal recently reported, of âenormous intelligence valueâ and âcan help governments and companies detect and counter cyberattacks.â The Journalâs coverage, however, missed the mark when it then noted that âthe monitoring of web traffic flow by government entities and private cybersecurity expertsâ raises âprivacy implications.â
This analysis missed the larger and more serious scandal: Individuals with wide access to sensitive government and proprietary data can exploit that data to target a political opponent. They can draft misleading âwhite papers,â present the data and white paper to the FBI and CIA with whom they hold a trusted relationship, and thereby trigger a criminal (or national security) investigation.
The Sussmann indictment and other documents filed in his criminal case allege this exact scenario, with one cyber expert called merely the âOriginatorâ but since identified as April Lorenzen creating a dataset purporting to show the Trump-Alfa Bank connection. She shared her data with Joffe, who tasked Antonakakis, Dave Dagon, and employees working at technology companies connected to Joffe âto mine Internet data to establish âan inferenceâ and ânarrativeâ tying then-candidate Trump to Russia.â
Apparently Fabricating Allegations Out of Spite
Joffe would later present to other researchers a âwhite paperâ that purported to explain the basis for the Trump-Alfa Bank theory, asking for their feedback. While Antonakakis did not support the paper and thought it âwas not great,â privately he told Joffe that while âa DNS expert would poke several holes to this hypothesis (primarily around visibility,â âvery smartly you do not talk aboutâ that. âThat being said,â Antonakakis added, âI do not think even the top security (non-DNS) researcher can refute your statements. Nice!â
Knowing the deficiencies in the white paper, Joffe nonetheless allegedly had Sussmann hand it off to the FBIâs general counsel, which then triggered a federal investigation into the supposed Trump-Alfa Bank connection. The Clinton campaign also pushed the Alfa Bank hoax to the media, directing reporters to talk to Georgia Techâs Dagon about the analysis.
Sussmann also presented a second set of data to the CIA that allegedly consisted of internet traffic exploited by Joffe, Dagon, and Lorenzen related to, among other locales, the Trump Tower, Donald Trumpâs Central Park West apartment building, and the Executive Office of the President of the United States. In providing this data to the CIA, the âtrustedâ Sussmann told agents, the data âdemonstrated that Trump and/or his associates were using supposedly rare, Russian-made [Yota] wireless phones in the vicinity of the White House and other locations.â
Not only was there âno support for these allegations,â according to the special counsel, the data provided to the CIA was cherry-picked to create the appearance of a Trump-Russia connection, while additional data compiled by the researchers but not shared with the CIA conflicted with the Yota cell phone theory.
Weaponizing National Security Against Political Targets
These allegations indicate that, as with the Steele dossier, politically motivated actors presented false or misleading information to federal agents to prompt an investigation into Trump. As in the case of Steeleâs intel, the Crossfire Hurricane team took the data seriously, in part because it came from supposedly trusted sources.
Just as the implications of the FISA abuse extended beyond Pageâs case and raise concerns about the entire FISA system, the implications of cybersecurity experts allegedly exploiting nonpublic internet traffic to frame a political enemy reach beyond Trump. If cybersecurity experts could trigger an investigation into Trump for political reasons, they can prompt an investigation of anyone, for any reason. Maybe they already have.
Lorenzen, Dagon, Joffe, and Sussmann allegedly culled data to fit a narrative and possibly draft misleading âwhite papersâ that Sussmann, on behalf of Joffe, then presented to the FBI and CIA for political ends. This destroys the publicâs trust in cybersecurity experts. The FBIâs failure to ask even the most basic questions when it received the data and unsigned âwhite papersâ from Sussmann renders them likewise suspect.
Yet Dagonâs attorney has the chutzpah to claim, as the Wall Street Journal put it, âthat the indictment of Mr. Sussmann would have a chilling effect on decades of constructive cooperation between private cybersecurity researchers and government.â âBecause the way the government and Durham has handled this, the cybersecurity community now is afraid to take anything to law enforcement,â Jody Westby told the paper. As a result, âthe whole nation is at a higher risk level,â Westby warned.
On this latter point, Westby is correct: Our nation is at higher risk of cyber-attack. But the blame for that firmly lies with the cybersecurity experts who abused the great power entrusted to them to hurt Trump.
It is not merely those who prepared the material or presented it to the FBI or CIA who hold responsibility. Every cybersecurity expert who bolstered the Alfa Bank hoax, defended a theory that a âDNS expertâ could easily poke several holes in, refused to reveal those deficiencies, failed to call out colleagues for abusing the government and publicâs trust, and instead blamed the special counselâs office for revealing the sham, shares in the blame.
The work private cybersecurity experts do, and the help they provide the FBI and intelligence agencies, is of vital importance to our country and its national security. It is precisely because of this that the Alfa Bank and Yota cell phone hoaxes are so scandalous.
https://thefederalist.com/2022/04/04/the-alfa-bank-hoax-is-looking-a-lot-like-crossfire-hurricane/
>>16013312, >>16013315, >>16013317, >>16013319 Devin Nunes retruthed: The Alfa Bank Hoax Is Looking A Lot Like Crossfire Hurricane
Q proof NOTABLE
I fucking suck at linux
ahhh shut up
kek!
meh, first world issues
just going to take double the time it takes a normal personâŚ
notable inclusion
Steve Huffman
Thank you pedo bun anon
It has always been this bad, you were too stupid to know differently.
đŚđşThe Australian Bushmasters will be flown to Ukraine out of RAAF Base Amberley in Ipswich, QLD on C-17 Globemasters after being painted "olive green".
đşđŚA Ukrainain flag has been painted on the door at the rear of each vehicle.
đPS. This publicity stunt by Scott Morrison will end in disaster when Australian Bushmasters are captured/destroyed by Russian forces⌠watch this space.
đŚđşVideo and images from Ukraine of Destroyed/Captured Australian iconic Bushmasters will damage the reputation of Australia's Defence capability internationally.
đ§âđŚŻScotty from marketing really didn't think this through did he?
âď¸PS. Keep an eye on C-17 Globemasters flying out of RAAF Amberley Base in QLD via flightradar24 .com⌠They will most likely land in Poland seeing as though Russia controls all of the airspace in Ukraine.
@AussieCossack
WARNINGâď¸Graphic Contentâ ď¸
đąCold hard evidence of Ukrainian Nazi war crimes exposed! Share!
đşđŚUkrainian nazi soldiers have filmed themselves executing Russian troops.
đ´The Russian troops have their hands tied and were executed by Ukrainian troops and Georgian mercenaries by way of cutting their throats (note the streams of blood).
đ´The leaked video shows Ukrainian soldiers saying "He is still alive finish him off" and "Glory to Ukraine" as they execute the Russian soldiers.
đđWhere is the outrage from the Main Stream Media?
đŚđşRemember, Prime Minister Scott Morrison and the Deep State are funding and supporting the Kiev Nazi regime! Lest we forget.
@AussieCossack
8.9K viewsedited
22:13
Honorable mention about changing another bakers notes