Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
#3: We have discovered several other attempts by the US Intelligence community<br />
to change the narrative to make it look like Cozy Bear had access as early as May<br />
2015. We have researched all of these claims and found them to be completely false.<br />
We therefore believe that the original story told by the FBI agent to the NY Times in 2016<br />
has the most validity. According to this FBI agent, he personally warned the DNC that<br />
their servers were hacked by a group called the Dukes in September 2015 - but the DNC<br />
tech team took no significant action because they did not believe he was actually from<br />
the FBI. Nothing was done for months. The incompetent mess was described in detail in<br />
a New York Times story a year later. The NY Times article states that the FBI called the<br />
DNC repeatedly but was ignored because DNC staffers thought he was an impostor<br />
rather than a real FBI agent. The NY Times article claimed that the FBI knew the Dukes<br />
were Russians and had a long history opposing them. If this were really the case, then<br />
the actions of the FBI and the DNC border on incompetence. The NY Times article links<br />
to the F Secure Report (we have already quoted about the Dukes which concluded the<br />
Dukes were Russian based on the Cozy Duke Time Stamps. As noted before, the F<br />
Secure Report ignored a mountain of information such as server call back locations<br />
indicating that the Dukes were not Russians but Americans).<br />
Our Comments on the September 15 Cozy Bear DNC Attack<br />
There is a fundamental problem with the first DNC attack. The FBI had evidence that a<br />
major crime had been committed with Russians hacking DNC server in Washington DC.<br />
Yet all they did was call the DNC? This is not what is supposed to happen when a major<br />
crime is committed. The FBI is required to lock down the crime scene and take position of<br />
any and all evidence in order to launch an investigation. Warrants are supposed to be<br />
entered. The hacked server is supposed to be examined. The server logs would certainly<br />
supply important clues that could eventually be traced back to the alleged hackers.<br />
Why didn’t the FBI take control of the crime scene in September 2015???<br />
<strong>Hack</strong> <strong>Everything…</strong> A Detailed Timeline of the DNC <strong>Hack</strong> Page 31