0% found this document useful (0 votes)
306 views8 pages

Dead Men Tell Tales

This document discusses several events related to the DNC email hack and the death of Seth Rich. It provides context about user accounts on Reddit and Twitter that were discussing these events and narratives around Russian and Seth Rich involvement. It outlines a timeline of emails and events between 2014-2015 involving Paul Combetta, the DNC, and Hillary Clinton related to email policies and security.

Uploaded by

FookYou
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
306 views8 pages

Dead Men Tell Tales

This document discusses several events related to the DNC email hack and the death of Seth Rich. It provides context about user accounts on Reddit and Twitter that were discussing these events and narratives around Russian and Seth Rich involvement. It outlines a timeline of emails and events between 2014-2015 involving Paul Combetta, the DNC, and Hillary Clinton related to email policies and security.

Uploaded by

FookYou
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

This was originally posted by the user /u/biglymagaback. His account has since been deleted.

Justice beats in the hearts of the forgotten. I have no intention of deleting this account.
Archive this for posterity.
https://twitter.com/julianassange/status/853242264272998400?
There are two narratives at stake here - the Russian Narrative, and the Seth Rich Narrative.
Both are true, from a certain point of view. I'll explain.

Background Info:
/u/stonetear = Paul "I have full access to the server" Combetta
"Hillary Clinton spied on her own campaign staff"
She believed her 2008 campaign had failed her not the other way
around and she wanted to see who was talking to who, who was leaking to
who, said a source familiar with the operation,

Timeline:
Podesta Email, March 25, 2014: Re: Google Account recovery phone number changed:
That was me [Eryn Sepp is Podesta's secretary]. Changed it from CAP
cell phone to your current personal cell phone #. Did that on Sunday
when I was downloading Herb's files to your CF thumbdrive (also added it to
your "google drive" that has a good deal of space on it).
June 2014 -- Seth Rich joins the DNC as the national data director.

July 23, 2014 -- Stonetear crowdsources e-mail scrub via Reddit - however, specifically asks
about hiding email addresses - not whole emails. Also claims he has separate storage.

/u/stonetear, December 10, 2014: "Auto-delete/retention policy and 'save' folder":


Hello- I have a client who wants to push out a 60 day email retention
policy for certain users. However, they also want these users to have a 'Save
Folder' in their Exchange folder list where the users can drop items that they
want to hang onto longer than the 60 day window.
All email in any other folder in the mailbox should purge anything older than 60
days (should not apply to calendar or contact items of course). How would I go
about this? Some combination of retention and managed folder policy?
Hillary Clinton email, December 22, 2014: "Re: Could you talk today or over the weekend?"
Sorry. Can't tell what happened with the email elves. I can do tonight after 8:00
or anytime tomorrow before 4:30."

A PHONE CALL?! TO HIS PERSONAL


CELL PHONE?!
/u/stonetear Reddit post, December 22, 2014: Bypassing two-factor authentication with
domain name?:
Hello- I have a firewall (200D) which seems to be allowing domain users
(Whether authenticated via RADIUS or LDAP) to bypass the request for their
token by logging in with domainame\username for the SSL VPN. If they use just
username, they get the token prompt.

As stated above, I have been testing with both RADIUS and LDAP authentication
to the domain controllers, but the behavior seems to be the same with either.

I've been doing a bunch of searching but am coming up empty so far. Before I
open a case with Fortinet, I figured I'd ask here. Thanks in advance!

Edit: They can bypass the token via the web portal as well as the
Forticlient by logging in as domain\username
"Heres How an Attacker Can Bypass Your Two-Factor Authentication":
Two-factor authentication systems arent as foolproof as they seem. An attacker
doesnt actually need your physical authentication token if they can trick your
phone company or the secure service itself into letting them in.

The two-step authentication systems on many websites work by sending a


message to your phone via SMS when someone tries to log in.

All an attacker has to do is call your cell phone companys customer service
department and pretend to be you. Theyll need to know what your phone
number is and know some personal details about you. These are the kinds of
details for example, credit card number, last four digits of an SSN, and others
that regularly leak in big databases and are used for identity theft. The
attacker can try to get your phone number moved to their phone.

Heck, an attacker might not need access to your full phone number. They could
gain access to your voice mail, try to log in to websites at 3 a.m., and then grab
the verification codes from your voice mailbox. How secure is your phone
companys voice mail system, exactly? How secure is your voice mail PIN
have you even set one? Not everyone has! And, if you have, how much effort
would it take for an attacker to get your voice mail PIN reset by calling your
phone company?

The intruders so thoroughly compromised the DNCs system that they also were
able to read all email and chat traffic, said DNC officials and the security
experts.
Podesta Email, March 5, 2015: Re: Thought:
When I worked for the leadership we had a records retention policy to
actively destroy all emails after 3 or 6 months . Each office made up its
own policy. Reporters should be asking congress and individual members what
their policy is ? Do they use private accounts for biz ? Why does fioa not apply to
them ?
We are. Limited Success.
Podesta Email, March 16, 2015: FW: Email retention/deletion:
Good people of American Progress: As we flagged for you last month, we are in
the process of implementing CAP/AF's longstanding records retention policy
(attached) for email. This process requires your participation.

Over the next three months, you are required to identify and designate any
Retention Category emails (defined below) in your possession. Beginning on
June 16, all email older than two years that is not designated for preservation
will be automatically and permanently deleted.

What is a Retention Category email?

For most employees, Retention Category emails are limited to emails containing
important institutional records or knowledge that is not recorded elsewhere.

o This is a limited category, including only emails containing information (not


memorialized elsewhere) that you believe will continue to be of importance to
CAP/AF's work, even 2+ years after receipt. For instance correspondence setting
forth guidelines for ongoing projects, memoranda describing major efforts,
documentation of significant decisions with ongoing implications, etc. o Please
be selective. Most employees should have few Retention Category emails.

o Legal and Tech will be conducting team briefings in the coming weeks, but
please contact us at any time with questions. * Emails relevant to any actual or
potential legal proceeding or government investigation must be preserved.
However, outside of a small number of intellectual property issues, CAP/AF is not
involved in any investigation or proceeding. If that changes, the legal team will
let you know.

Legal, financial, HR, and administrative records are preserved under separate
policies that apply the legal, finance, HR, and admin teams. What should I do
with Retention Category emails? * In the coming weeks, Tech will create a
"Retention" folder in your Outlook. Emails in the retention folder will be
preserved indefinitely, and will not be automatically deleted.
In the meantime, we encourage you to begin identifying and marking Retention
Category emails, either by flagging them or by dragging them into a new
Outlook folder of your own creation. Once Tech has created a "Retention" folder
for you, you can drag your marked emails into it.

Going Forward / Going Back

You have three months to go through your inbox, sent mail, and organizational
folders to identify old retention category emails. Starting on June 16, email older
than 2 years that is not in your Retention folder will be permanently deleted, on
a rolling basis.
Going forward, you should move Retention Category emails into the Retention
folder as needed. You will be able to create organizational subfolders within the
Retention folder.
Do not place non-Retention Category emails in the Retention folder Legal and
Tech will be going to-to-team to answer questions and help with
implementation. But feel free to ask us questions at any time.
/u/stonetear email, July 30, 2015: "VPN log report?":
Hello- Is there any way to spit out a simple VPN connection report? Ie,
who logged in, and when? I've been able to cobble something together from
the raw log files, then filtering/massaging in Excel, but it's a real pain in the rear.
We have several customers that would like to be able to get a weekly or
monthly report on remote user logins. Is a syslog server setup/config or
FortiAnalyzer the only way to do this?
September 2015 -- Josh Uretsky joins Bernie campaign as national data director,
recommended by Seth Rich (according to Sanders in a Dec 2015 interview).

/u/stonetear Reddit post, Oct 26, 2015: "Attachment report?"


I have a customer who wants to be able to run a weekly or monthly
report that shows all emails sent that have attachment(s) over X
megabytes, along with the from/to/date info, in a format that is at least
semi-management friendly. Third party software is fine, though I imagine this
is doable via PowerShell/message tracking... however I have been striking out so
far. Environment is Exchange 2010 SP3. Any suggestions are welcome!
*** December 16, 2015 -- NGP VAN applies new patch to DNC servers. According to email
15792, due to a "glitch in the code" the normal system barriers were lowered for four hours
and users could access other users data. This data could still only be accessed by other DNC
user accounts. Four unique users ran and downloaded the results of 25 unique searches,
saved to private hard drives and were removed from the premises. ***

*** December 17, 2015 -- DNC officials discover the person who accessed information was
connected to the Bernie team and demand discipline of the individual. ***

*** December 18, 2015 -- Bernie campaign fires Josh Uretsky, his campaign's national data
director ***

*** December 19, 2015 (Saturday evening at 10pm) Amy Dacey reports the previous incident
to Podesta (via Mary Fisher for some reason) ***

*** December 25, 2015 interview about break-in event where Sanders blames the DNC for
recommending Josh Urutsky. He says that he was recommended by the DNC's national data
director.

http://www.mediaite.com/online/sanders-adviser-suggests-staffer-that-breached-voter-data-
may-have-been-dnc-plant/
So who was the DNC's national data director? Seth Rich!

http://www.p2016.org/parties/dnc16.html
Josh Urutsky was hired on Seth Rich's recommendation.
Sanders knew it was Uretsky. Sanders knew Rich recommended Uretsky.

DNC wasn't stealing data, they were stealing votes. Sanders was under the umbrella of the
DNC. Rich found out about the voter fraud and colluded with Uretsky.

Sanders found out both (he thought he still had a chance of winning the primaries), and gave
them up to Amy Dacey, who was Seth Rich's boss. Dacey then confronts Rich, forwards it to
Podesta and the rest is history:

*** Jan 2016 -- Sanders claims (in May 17 interview) that his Nevada HQ had shots fired and
nearby employee apartments ransacked ***

Podesta Email, March 19, 2016: Re: Smene has your passwrd:
Milia, can you change - does JDP have the 2 step verification or do we
need to do with him on the phone? Don't want to lock him out of his in box!
This is a legitimate email. John needs to change his password
immediately, and ensure that two-factor authentication is turned
on his account. He can go to this
link: https://myaccount.google.com/security to do both. It is
absolutely imperative that this is done ASAP.

IP Address: 134.249.139.239

Location: Ukraine

So after two years from the initial


email being sent out
by /u/stonetear, two-factor
authentication still hasn't been set
up?
AND HIS IT HELP DESK THOUGHT A
SCAM ATTEMPT WAS REAL?!
May 3, 2016 Bernie pulls off surprise primary victory in Indiana Primary

*** May 14-15, 2016 -- Enraged Bernie supporters shut down Dem HQ in Nevada after a
weekend of violence, vandalism ***

May 17, 2016 Bernie wins Oregon primary (final Democrat primaries, including California,
would be in June. Stuck fork in Sanders, because he was done by mid-June)

May 21, 2016 - WikiLeaks Director Gavin MacFadyen reportedly receives DNC email transfer
from Seth Rich
May 24, 2016: "Midwest Deputy or
Director" DNC Email:
Midwest Deputy or Director position is open. If you know of anyone
who would be a good fit, let me know.

THE TRAP IS SET.


May 25, 2016 - Date of the last email in the DNC Email Archive released by Wikileaks [** KEY
DATE]. Where was Seth Rich on this date? What was his state of mind? Did something happen
on or about May 25, 2016 that resulted in Seth Rich losing access to high-level DNC emails?
Or did he get one-time access to the DNC emails on May 25, 2016 and downloaded them all
then? Investigation needed.

June 6, 2016 -- /u/MeGrimlock4 final post: https://archive.is/Ktts6


June 14, 2016: "Russian government hackers penetrated DNC, stole opposition research on
Trump"
June 14, 2016 -- DNC hires Crowdstrike to find the "Russian hackers" who have been hacking
the DNC for over a year. Claims that the past week has included purges to staff to weed out
hackers.
July 3, 2016 -- DNC is served with a
class action lawsuit
July 5, 2016 -- Seth Rich is invited
to Hillary Clinton's campaign team
according to Joel Rich in an August
16 interview. The Clinton team
announced Rich received an invite
to join their team as plausible
deniability. The hit was already
placed and they were laying the
groundwork of reducing motive. An
invite like this could only have
come from Sanders's people - after
all, who would be the
recommendation?!
DEATH OF SETH RICH = JULY 10,
2016
DNC CONVENTION = JULY 25 - 28,
2016
July 22, 2016 Wikileaks publishes
19,252 emails and 8,034
attachments from the DNC,
including emails from seven key
DNC Staff members. The leaked
DNC emails have a date range of
January 2015 to May 25, 2016 (*
KEY DATE RANGE)
September 2016 -- Wikileaks Craig Murry claims to have met a "disgusted" DNC staffer that
was one of multiple sources of the legally obtained leaks (revealed in a Dec 14, 2016
interview)

October 2016 -- Wikileaks


publishes Pedosta emails
Tl;Dr: If this timeline is accurate it means someone ransacked employee apartments two
weeks after the DNC accuses Sanders campaign of taking data off premises. This sounds like
the real Watergate. Criminally implicating Bernie "30 pieces of silver" Sanders.

Tl:Dr: There are two "leaks" here. DNC / Podesta.

DNC was leaked by Seth Rich.

Podesta was leaked through Ukrainian hacking.

Russians only knew of Podesta's emails, not DNC.

DNC blaming Russia for an entirely separate leak.

It means Caesar lied and the


enemy was not conquered! When
the Empire finds out about this,
the whole world will tremble!

You might also like