Declassified transcripts: CrowdStrike couldn't say for sure Russians stole DNC emails

  
Via:  badfish  •  2 months ago  •  44 comments

By:   Sophie Mann and Joseph Weber (Just The News)

Declassified transcripts: CrowdStrike couldn't say for sure Russians stole DNC emails
CrowdStrike's Shawn Henry was interviewed by House Intelligence Committee members in December 2017

Sponsored by group The Donald on Newstalkers

The Donald on Newstalkers


How many times have we heard the MSM say there was evidence? How many times have we heard on this site that Russia Hacked the DNC? How many former Obama and Hillary Hacks have lied on TV?

There is no evidence Russia hacked the DNC, put your arms around it and own it!


S E E D E D   C O N T E N T



CrowdStrike's Shawn Henry was interviewed by House Intelligence Committee members in December 2017

  • Transcript of Henry's committee interview

Declassified documents released by House Intelligence Committee Chairman Adam Schiff show the president of CrowdStrike Services — a computer-and-network-security firm hired to investigate the hacking of Democratic National Committee servers — couldn't say for certain that Russians downloaded Democratic Party emails.

During the interview made public Thursday, Shawn Henry explained that CrowdStrike found some evidence that information was taken from DNC servers, but it was not conclusive.

Responding to a question from Rep. Joaquin Castro (D-Texas), he said, "There is evidence of exfiltration, not conclusive, but indicators of exfiltration off the DNC."

Henry said that based on the evidence his firm reviewed, they believe "70 gigabytes of data" were exfiltrated from the DNC's network. However, when asked by Rep. Mike Conaway (R-Texas) whether he could "unequivocally say it was or not was exfiltrated out of the DNC, from what you know of?"

Henry responded, "I can't say based on that," according to the 80-page transcript.

The closed-door interview is one of 57 that the committee conducted during its two-year Russia investigation.

There is widespread agreement in the intelligence community that Russia hacked the DNC servers, but questions have long persisted because FBI investigators did not seize the DNC servers and relied instead on CrowdStrike's analysis of what occurred during the hacking.

Henry is a former FBI agent who oversaw the bureau's cyber crimes efforts before he transitioned to the private sector to do cyber security work.

He was interviewed on Dec. 5, 2017, on Capitol Hill by five members of the House Permanent Select Committee on Intelligence — Reps. Castro, Conaway, Adam Schiff, Chris Stewart and Eric Swalwell, with lawyers for the related parties present.

Henry said he was initially contacted by a former Justice Department colleague named Michael Sussmann who became an attorney for the Washington, D.C. law firm Perkins Coie. He said Sussmann unexpectedly emailed him and subsequently told him in a series of communications that he was seeking some cybersecurity remediation for the Democratic National Committee, whose computers had been hacked.

Henry said he realized the magnitude of the account, considering the hack had occurred, perhaps by Russian actors, during the closely contested 2016 presidential race.

"This isn't Joe's Pizza," he told committee members. He also said there were two hacks, the second having occurred after the first was addressed.


Tags

jrGroupDiscuss - desc
smarty_function_ntUser_is_admin: user_id parameter required
[]
 
badfish
1  seeder  badfish    2 months ago

The lie fit the narrative, but in myth busting may 2020 we are finally learning a few things.

 
 
 
The Magic Eight Ball
1.1  The Magic Eight Ball  replied to  badfish @1    2 months ago
 myth busting may 2020

hindsight is trump - 2020

cheers :)

 
 
 
Heartland American
1.1.1  Heartland American  replied to  The Magic Eight Ball @1.1    2 months ago

Indeed!  Keep America Great! 

 
 
 
It Is ME
2  It Is ME    2 months ago

No wonder Schifty has been withholding "HIS EVIDENCE" for so long. It was a sham this entire time !

 
 
 
Heartland American
2.1  Heartland American  replied to  It Is ME @2    2 months ago

Everything he’s ever said and done in his life is one giant sham! 

 
 
 
Jeremy Retired in NC
3  Jeremy Retired in NC    2 months ago

It's amazing that as we see more and more documents declassified, we see the Democrats and Obama Administration's corruption.

It's time to start putting people in prison.

 
 
 
Heartland American
3.1  Heartland American  replied to  Jeremy Retired in NC @3    2 months ago

Obama-Biden for prison 2020!  

 
 
 
Jeremy Retired in NC
3.1.1  Jeremy Retired in NC  replied to  Heartland American @3.1    2 months ago

Now that's a campaign I would donate to.  Prosecution of course.

 
 
 
badfish
4  seeder  badfish    2 months ago

I love Thenewstalkers, they have the best crow.

512

 
 
 
squiggy
5  squiggy    2 months ago

bigger.jpg

 
 
 
Suz
5.1  Suz  replied to  squiggy @5    2 months ago

That is too funny!  Thank you for an afternoon laugh to go with my coffee.

 
 
 
badfish
6  seeder  badfish    2 months ago

There is an absolute slaughter going on twitter right now, every democrat and lying sack of shit MSM reporter is taking a beating. It's epic!

 
 
 
JohnRussell
6.1  JohnRussell  replied to  badfish @6    2 months ago

no one is interested in the twitter pages where the dregs of humanity congregate

 
 
 
badfish
6.1.1  seeder  badfish  replied to  JohnRussell @6.1    2 months ago

You were so interested you felt necessary to reply. Thank you for coming to the conversation, the truth where all of the propaganda you promoted over the last three years has been exposed as a myth.

I still consider you my homie though. Where were you the other day, i missed you?

 
 
 
Texan1211
6.1.2  Texan1211  replied to  JohnRussell @6.1    2 months ago
no one is interested in the twitter pages where the dregs of humanity congregate

So why then have you reposted Trump's tweets so many times?

Just because you have no interest in the truth doesn't mean the rest of us are so gullible as to believe the swill you have been swallowing for 4 years.

 
 
 
squiggy
6.1.3  squiggy  replied to  JohnRussell @6.1    2 months ago
no one is interested in the twitter pages where the dregs of humanity congregate

WTF? Did you break your shovel?

 
 
 
The Magic Eight Ball
6.2  The Magic Eight Ball  replied to  badfish @6    2 months ago
every democrat and lying sack of shit MSM reporter is taking a beating. It's epic!

  the next 6 months will be full of such "revelations"   

the slaughter is just beginning  :)

 
 
 
Heartland American
6.2.1  Heartland American  replied to  The Magic Eight Ball @6.2    2 months ago

And they will implicate Biden as being directly involved in this scandal and cripple his sleepy creepy campaign 

 
 
 
squiggy
6.3  squiggy  replied to  badfish @6    2 months ago

so-easy.jpg

 
 
 
Sean Treacy
7  Sean Treacy    2 months ago

Sure would have been nice of the DNC to allow the FBI's request to  access the servers.

 
 
 
badfish
7.1  seeder  badfish  replied to  Sean Treacy @7    2 months ago

Why would they do that? It would prove Seth Rich sent the emails to wikileaks.

 
 
 
JohnRussell
7.1.1  JohnRussell  replied to  badfish @7.1    2 months ago

Wouldn't it be incredibly easy for Assange to prove that Seth Rich sent him the DNC material? 

I dont recall seeing that happening. 

 
 
 
badfish
7.1.2  seeder  badfish  replied to  JohnRussell @7.1.1    2 months ago

Yes he offered but the DOJ refused.

 
 
 
JohnRussell
7.1.3  JohnRussell  replied to  badfish @7.1.2    2 months ago

He could release such proof without the DOJ. 

 
 
 
badfish
7.1.4  seeder  badfish  replied to  JohnRussell @7.1.3    2 months ago

He wants a deal, I think it would benefit all of us to make a deal. The proof can certainly be verified by forensic tech.

 
 
 
The Magic Eight Ball
7.2  The Magic Eight Ball  replied to  Sean Treacy @7    2 months ago
Sure would have been nice of the DNC to allow the FBI's request to  access the servers

allow a fbi request to see the evidence?  just that statement alone screams corruption.

first time ever the FBI did not take the evidence by force.

 

 
 
 
JohnRussell
8  JohnRussell    2 months ago
The leaks began in June 2016, when the GRU began publishing thousands of documents stolen from the email accounts of Democratic National Committee (DNC) staff, supporters and volunteers, through an online persona called DCLeaks.

The hackers behind DCLeaks gave selected journalists advanced access to the hacked documents on pages of the website that had yet to be made public.

DCLeaks used Twitter to send private messages to WikiLeaks, suggesting they collaborate almost immediately.

WikiLeaks had already published an archive of around 30,000 Clinton emails obtained under the US Freedom of Information Act. 

In the message, later recovered by the FBI, DCLeaks told WikiLeaks: “You announced your organization was preparing to publish more of Hillary’s emails. We are ready to support you. We have some sensitive information too, in particular, her financial documents. Let’s do it together.”

A day later, a new online persona, Guccifer 2.0, appeared on Twitter, claiming that he, a lone Romanian hacker, was responsible for the DNC hacking, rather than the GRU. 

WikiLeaks sent private Twitter Messages asking Guccifer 2.0 to send “any new material for us to review” as it will have a much higher impact being published on WikiLeaks.

WikiLeaks followed up by asking Guccifer 2.0 to send over any material on Hillary Clinton as a matter of urgency, before Clinton solidified her support at the DNC.

The material reached WikiLeaks in the form of an encrypted email attachment, and on 22 July 2016, WikiLeaks published around 20,000 emails from the DNC.

Within days, Trump issued a public challenge to Russian intelligence to find thousands of emails that Clinton had   controversially stored on a personal server   while serving as secretary of state at the Obama Whitehouse.

“Russia, if you’re listening, I hope you’re able to find the 30,000 emails that are missing. I think you will probably be rewarded mightily by our press,” he said.

Robert Mueller’s   Report on the investigation into Russian interference in the 2016 presidential election   found that GRU hackers started targeting Clinton’s staff within hours of the president’s challenge.

https://www.computerweekly.com/news/252482803/FBI-search-warrants-reveal-Trump-aides-messages-to-WikiLeaks-founder-Julian-Assange
 
 
 
badfish
8.1  seeder  badfish  replied to  JohnRussell @8    2 months ago

The DNC had crowdsource research it, wouldn't let the feds do it and the CEO says they don't have proof.

All previous articles sourcing the hack are unproven, untrue and have no evidence to support.

Sorry no dice homeslice. When under oath a lot of democrat allies actually tell the truth. On tv, they lie.

 
 
 
Tessylo
8.1.1  Tessylo  replied to  badfish @8.1    2 months ago

jrSmiley_40_smiley_image.gifjrSmiley_88_smiley_image.gifjrSmiley_25_smiley_image.gifjrSmiley_44_smiley_image.gifjrSmiley_86_smiley_image.gif

 
 
 
badfish
8.1.2  seeder  badfish  replied to  Tessylo @8.1.1    2 months ago

No one figured you would actually have anything of substance to say. We keep you around for entertainment purposes.

 
 
 
Vic Eldred
8.1.3  Vic Eldred  replied to  badfish @8.1    2 months ago
The DNC had crowdsource research it

And the FBI went along with it!  What does that tell ya!

 
 
 
Heartland American
8.1.4  Heartland American  replied to  badfish @8.1.2    2 months ago

👍👌🦠😂

 
 
 
gooseisgone
8.1.5  gooseisgone  replied to  badfish @8.1    2 months ago
All previous articles sourcing the hack are unproven

Which means Stone was prosecuted for no reason.

 
 
 
The Magic Eight Ball
9  The Magic Eight Ball    2 months ago

the download speeds recorded were consistent with a thumb drive, not an online hack   

his name was seth rich

watching the truth come out = priceless

 
 
 
Heartland American
9.1  Heartland American  replied to  The Magic Eight Ball @9    2 months ago

Sean Hannity was right all along.

 
 
 
badfish
10  seeder  badfish    2 months ago

Stay tuned, DNI will release proof Seth Rich was the Wikieleaker.

Hmm i wonder why he was executed?

 
 
 
Heartland American
10.1  Heartland American  replied to  badfish @10    2 months ago

by her command...

 
 
 
JohnRussell
11  JohnRussell    2 months ago
Stay tuned, DNI will release proof Seth Rich was the Wikieleaker. Hmm i wonder why he was executed?

The fake news campaign to re-elect Donald Trump is underway on Newstalkers. 

 
 
 
gooseisgone
11.1  gooseisgone  replied to  JohnRussell @11    2 months ago

Jr how can you even use the term “fake news” you have been the definition of it for the last 3years. 

 
 
 
Heartland American
11.1.1  Heartland American  replied to  gooseisgone @11.1    2 months ago

Lol!  Without a doubt!  The bulk of the lamestream msm is fake news....

 
 
 
The Magic Eight Ball
11.1.2  The Magic Eight Ball  replied to  Heartland American @11.1.1    2 months ago
The bulk of the lamestream msm is fake news

the msm has been pushing more unproven conspiracy theories than any others.

over 3 yrs of complete and utter bs 

any who take them seriously now?  just plain silly.

 
 
 
Thomas
12  Thomas    2 months ago

If you read the transcript, it says that the FBI was investigating and did identify the source of the hacking as Russia, before Mr. Henry was called to testify, before he was even contacted about it. And, the document states that it is unclassified, which means that it wasn't classified to begin with. So the article is wrong and deceptive in the characterization both of the materials sensitivity and the whole gist of the argument. And the "Joe's Pizza" remark came from one Mr Stewart of Utah...

Here, my emphasis added (I apologize for the transcription errors it was taken from an image):

HENRY: So -- excuse me one minute' because I have something I -. So, just to preface my statement, because l think it's important, one piece to understand' Typically, the FBI looks at computer intrusions, based on, from a national security perspective as well as a criminal perspective' And actions they may take in an environment are often directed by that, who the actors may be -- generally, the FBl. As it relates to this case, we shared intelligence with the FBl. we had contact with them over a hundred times in the course of many months from June of 2016 up through current time, in the last couple weeks, I imagine.

…..

STEWART OF UTAH:

…. lt just is interesting to me' and it Seems, l don’t want to say inconsistent, but curious to me that there would be evidence of a crime and that there wouldn't -- and especially with a client' Now' you may not have been aware of the client initially, but you quickly became aware of the client.

HENRY: Very quicklY'

STEWART OF UTAH: Yeah' I mean, this isn't Joe's Pizza' This is something else with much more intense, I don't want to say national security' but political and other interests. I mean, this client is, after all, a national figure in the middle of a national campaign. Did it strike you as curious or -- that the FBI didn't take the lead in this investigation? And who makes that decision? Does the FBI __ let me ask you this way: ln your experience, whether in your official capacity in the government or now as a private contractor/business owner, do you have examples of where something similar like this happened, but the FBI or any other law enforcement organization came in and said, "we're going to take the read on this, this is a criminal matter, we're going to do the investigation?

HENRY: In these types of cases, my experience typically has been notification made to the victim about what has occurred in their environment, not that the FBI would typically come in. And they certainly wouldn’t conduct a remediation. And they *

STEWART OF UTAH: And remediation is protecting the –

HENRY; Remediation is essentially cleaning it up. something bad has happened. There's been an actor. There's malware, malicious software in an environment. Somebody has access to what's occurring in the environment. So the remediation is cleaning out the bad stuff and putting in place infrastructure that is safe and secure.

 

STEWART OF UTAH: so, in this case and generally, it’s to protect the client' It's to protect their security from that point forward as best they can.

HENRY: yes, sir.

STEWART of Utah: okay. so you were saying that generally, they - the FBI doesn’t do remediation, but _

HENRY: They make notification.

…….

STEWART oF UTAH: And would you just conclude with what you discovered and how you discovered it and what you did with that information?

HENRY: So we did - we did some forensic analysis in the environment. we deployed technology into the environment' into the network' software called Falcon that essentially looks at the processes that are running on different computers in the environment' we also looked historically at the environment, using a different piece of software to look backwards at what was happening in the environment' And we saw activity that we believed was consistent with activity We'd seen previously and had associated with the Russian Government'

STEWART oF UTAH: And can you identify that as being -- with a fair degree of confidence that it's associated with the Russian Government?

HENRY: We said that we had a high degree of confidence it was the Russian Government. And our analysts that looked at it that had looked at these types of attacks before, many different types of attacks similar to this in different environments, certain tools that were used, certain methods by which they were moving in the environment, and looking at the types of data that was being targeted, that it was consistent with a nation-state adversary and associated with Russian intelligence.

STEWART OF UTAH: Okay. Are there other nation-states that could have -- based on this evidence, that could have been the perpetrator?

HENRY: There are other nation-states that collect this type of intelligence for sure, but the -- what we would call the tactics and techniques were consistent with what we'd seen associated with the Russian state.

Read it. And next time before you post something, do your legwork and see if it has even the remotest possibility of being true. This is just like the Chump:Full of sound and Fury, Signifying nothing.

Good Day.
 
 
 
Greg Jones
12.1  Greg Jones  replied to  Thomas @12    2 months ago

Still no real proof that somebody did something.

 
 
 
Heartland American
12.1.1  Heartland American  replied to  Greg Jones @12.1    2 months ago

Proof?  Who needs that?  The mere accusation will suffice to disqualify if the target has an “R” after their name or works for one who bears that scarlet letter. 

 
 
Loading...
Loading...

Who is online

Ozzwald
Dulay
gooseisgone


58 visitors