Anonymous ID: 905f52 July 12, 2018, 9:14 p.m. No.2138103   🗄️.is 🔗kun

There are many versions of today's Strzok hearing.

Some of them did not show Strzok's face while he read his statement.

This video has a dual screen coverage.

You can watch his face as the questions are asked and as he answers.

 

https://www.youtube.com/watch?v=uvSG5jCJ3V8

 

=

Also:

 

Maybe the English Trump supporters can fly red, white, blue balloons – relatively cheap and a response to the balloon meant to to disgrace our President.

Anonymous ID: 905f52 July 12, 2018, 9:33 p.m. No.2138281   🗄️.is 🔗kun

The key to the accusations that Russia interfered with the 2016 election is –

IN WHAT WAY DID THEY INTERFERE WITH THE ELECTION

in such a way that we would be on the verge of war with Russia

 

The cyber expert Michael Daniels clarified this:

SOMEONE messed with various states' database of voters up until the middle of the summer, whereupon there was a lull in activity, and then in October there was a SOCIAL MEDIA campaign to try to influence the minds of American voters.

 

that's it

===

michael daniels submitted opening statement

https://www.intelligence.senate.gov/sites/default/files/documents/os-mdaniel-062018.pdf

(excerpted)

During President Obama’s administration, I served from June 2012 to January 2017 as the Special Assistant to the President and Cybersecurity Coordinator on the National Security Council staff. In that capacity, among other things, I oversaw the development of cybersecurity-related policy, coordinated our responses to significant cyber threats and incidents, and facilitated the development of inter-agency plans to disrupt our adversaries’ cyber activities.

 

Going into late spring of 2016, as the Presidential election got into full swing, we fully expected Russian cyber-based espionage activities against the major political campaigns – it had happened in previous election cycles and our operating assumption was that the Russians would target the campaigns for intelligence collection.

 

However, by late June / early July 2016, as information from the Democratic National Committee began to be released, and as a few States began to report intrusions into certain parts of their electoral infrastructure, we realized that the Russians were doing something more than merely collecting intelligence. They were carrying out operations aimed at least at influencing the election and potentially even disrupting it.

 

The goal for this line of effort was to make it more difficult for the Russians to disrupt or interfere with the actual voting process, while maintaining Americans’ confidence in the electoral system. Although many cybersecurity experts have focused on cybersecurity issues surrounding electronic voting machines, we quickly determined that the voting machines, while vulnerable, were not the most vulnerable part of the infrastructure. We also quickly determined that Russia’s goal was probably not to use cyber means to surreptitiously change the outcome of the election by changing votes.

 

In order to achieve that goal, the Russians would have had to have selected the precincts that were going to be close several months in advance, gained undetected access to the voting machines, installed malware that flipped just enough votes to change the outcome but not so many as to be detected, and then remain undetected through any post-election auditing. We did not believe carrying out such an operation was feasible.

 

Instead, we realized that a far more practical goal would be to use cyber means to undermine confidence in the election; once the potential scenarios included more than vote flipping, the potential for malicious activity expanded considerably. Widening the aperture to include the entire electoral process from beginning to end revealed segments that would be much more vulnerable to remote cyber operations. That turned out to be the points at which the electoral infrastructure touches the public internet: voter registration databases; vote tabulation reporting; and media reporting on election day.

 

Since States and local governments run the election process in the U.S., by necessity our efforts became focused on providing assistance to States and localities. The Department of Homeland Security spearheaded those efforts for the Administration. These actions focused on determining what assistance we could provide States and local governments in the near term and alerting States and local governments to the potential threat.

 

Fortunately, we did not detect or discover any significant malicious cyber activity on election day.

 

Now that the Russians have proven that cyber means can be used to engage in election interference in the United States, we should expect that they will continue to engage in such activities and that other actors will follow their lead, including non-nation state actors.

Therefore, I recommend that:

– We continue to invest in improving the cybersecurity of our electoral infrastructure in its entirety, including, but not limited to, voter registration databases, pollbooks, voting machines, vote tabulation, and vote reporting.