SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: Sdgla who wrote (1078125)7/15/2018 10:26:05 AM
From: Wharf Rat  Read Replies (2) | Respond to of 1585492
 
"conspiracy to defraud the United States." Can't they come up with a real crime?"

That is a real crime, comrade.

COUNT ONE (Conspiracy to Commit an Offense Against the United States)
1. In or around 2016, the Russian Federation (“Russia”) operated a military intelligence agency called the Main Intelligence Directorate of the General Staff (“GRU”). The GRU had multiple units, including Units 26165 and 74455, engaged in cyber operations that involved the staged releases of documents stolen through computer intrusions. These units conducted largescale cyber operations to interfere with the 2016 U.S. presidential election. Case 1:18-cr-00215-ABJ Document 1 Filed 07/13/18 Page 1 of 29 2

2. Defendants VIKTOR BORISOVICH NETYKSHO, BORIS ALEKSEYEVICH ANTONOV, DMITRIY SERGEYEVICH BADIN, IVAN SERGEYEVICH YERMAKOV, ALEKSEY VIKTOROVICH LUKASHEV, SERGEY ALEKSANDROVICH MORGACHEV, NIKOLAY YURYEVICH KOZACHEK, PAVEL VYACHESLAVOVICH YERSHOV, ARTEM ANDREYEVICH MALYSHEV, ALEKSANDR VLADIMIROVICH OSADCHUK, and ALEKSEY ALEKSANDROVICH POTEMKIN were GRU officers who knowingly and intentionally conspired with each other, and with persons known and unknown to the Grand Jury (collectively the “Conspirators”), to gain unauthorized access (to “hack”) into the computers of U.S. persons and entities involved in the 2016 U.S. presidential election, steal documents from those computers, and stage releases of the stolen documents to interfere with the 2016 U.S. presidential election.

3. Starting in at least March 2016, the Conspirators used a variety of means to hack the email accounts of volunteers and employees of the U.S. presidential campaign of Hillary Clinton (the “Clinton Campaign”), including the email account of the Clinton Campaign’s chairman.

4. By in or around April 2016, the Conspirators also hacked into the computer networks of the Democratic Congressional Campaign Committee (“DCCC”) and the Democratic National Committee (“DNC”). The Conspirators covertly monitored the computers of dozens of DCCC and DNC employees, implanted hundreds of files containing malicious computer code (“malware”), and stole emails and other documents from the DCCC and DNC.

5. By in or around April 2016, the Conspirators began to plan the release of materials stolen from the Clinton Campaign, DCCC, and DNC.

6. Beginning in or around June 2016, the Conspirators staged and released tens of thousands of the stolen emails and documents. They did so using fictitious online personas, including Case 1:18-cr-00215-ABJ Document 1 Filed 07/13/18 Page 2 of 29 3 “DCLeaks” and “Guccifer 2.0.”

7. The Conspirators also used the Guccifer 2.0 persona to release additional stolen documents through a website maintained by an organization (“Organization 1”), that had previously posted documents stolen from U.S. persons, entities, and the U.S. government. The Conspirators continued their U.S. election-interference operations through in or around November 2016.

8. To hide their connections to Russia and the Russian government, the Conspirators used false identities and made false statements about their identities. To further avoid detection, the Conspirators used a network of computers located across the world, including in the United States, and paid for this infrastructure using cryptocurrency.
justice.gov



To: Sdgla who wrote (1078125)7/15/2018 10:36:41 AM
From: TideGlider2 Recommendations

Recommended By
locogringo
Thomas A Watson

  Read Replies (1) | Respond to of 1585492
 
It was apparent from the first Comey public release of Hillary email observations that he(they) expected Hillary to win and wanted a flawed candidate to win either way. The goal being an entrenched hierarchy as it was for J Edgar Hoover. The difference would be all intelligence agencies would enjoy the same near autonomy. This was a massive self exposure of the deep state attempting to secure their status as the shadow government,

A soft coup so to speak, without firing a shot. Trump didn't become public enemy number one until it was apparent he wasn't going along wiyj the program. All the Political Party slop is not a barrier to the Dark Side. They don't care about parties , social programs or the American people. All they care about is themselves. Hillary would have gladly been their patsy. Trump was true to his word and began draining the swamp.



To: Sdgla who wrote (1078125)7/15/2018 2:39:34 PM
From: Land Shark1 Recommendation

Recommended By
Mongo2116

  Read Replies (1) | Respond to of 1585492
 
Drivel and stupid drivel at that