header 2000x400
01_1000x440 02_1000x440 03_1000x440 04_1000x440 05_1000x440 06_1000x440 07_1000x440 08r_1000x440 09r_1000x440 10r_1000x440

Hack Everything Special Report

Hack Everything is an 85 page detailed Timeline of the DNC Hack. This report also includes the results of our extensive research into the 876 IP addresses in the Grizzly Steppe report. Our conclusion is that it is extremely unlikely that Russia committed the DNC cyber attack. To find out who did, please take the time to read our full report. Then share this report with anyone you know who is interested in learning the truth about the DNC hack.

You can read this report at the following series of 8 links. Our you can download a free PDF of our report by clicking on the Download link in our main menu. As our site may be taken down at any moment, please help us get the word out by sharing this report. Permission is granted to download, distribute, repost & republish all or any part of this report on any website. If you have any questions or comments, feel free to email us.

David Spring M. Ed.
This email address is being protected from spambots. You need JavaScript enabled to view it.
January 10, 2017


00a



Executive Summary… A Primer on the Power of the NSA

Part 1: Evolution of Cyber Warfare Weapons 2007 to 2015
September 1, 2007: The NSA begins the Prism Collection Program.
June 6, 2013: Snowden Provides Documents Confirming the Power of the NSA
February 16, 2015 Kaspersky exposed the Equation Group
February 28, 2015: Kaspersky links Cozy Bear to Cozy Duke.

Part 2 Details of the DNC Hack... July 2015 to May 2016
September 2015: Cozy Bear also known as Cozy Duke attacks DNC network.
March 22, 2016: Fancy Bear Prepares to Attack the DNC
March 22, 2016: Billy Takes the Bait (so did Podesta)
March 22, 2016: Fancy Bear used a Ukrainian Server in their Email Attack
May 1, 2016: Crowdstrike kicks Cozy Bear & Fancy Bear Out of DNC Server

Part 3 Summer of Spin...The DNC Hack: June to August 2016
June 12 2016: Wikileaks Announces Clinton Data Release is Imminent
June 14, 2016: Crowdstrike releases DNC Hack Report
June 17, 2016: German Hack Smoking Gun turns out to be Smoke & Mirrors
July 10, 2016: DNC staffer Seth Rich killed in Washington DC
July 22, 2016: Wikileaks published DNC Leak Documents
July 24 2016: Wikileaks issues Tweet Implying Source is an Insider
July 31, 2016: Former NSA Lead Administrator, William Binney says the Hack was not done by Russians but by the NSA

Part 4 Ongoing Allegations... September to December 2016
September 15, 2016 Server Company Provides Analysis of Hacker Locations
October 7 2016: US issues Press Release Blaming Russia for DNC Hack
October to November 2016: Over the course of a month, Wikileaks publishes more than 58,000 emails hacked from the Gmail account of John Podesta.
November 2 2016: Wikileaks says Russia is not the source
November 8 2016: Media claims odds of Hillary winning as high as 90%.
November 24, 2016 Washington Post issued a story claiming that Russian propaganda help spread fake news through a list of 200 fake news websites.
November 30 2016: Congress passed bill authorizing Ministry of Truth for 2017
December 14 2016: Craig Murray, one of their leaders of Wikileaks said that their source was not a Russian but rather a “disgusted Democratic party insider.”
December 16 2016: Digital Fingerprints Turn Out to be Paw Prints
December 22, 2016: Smoking Gun Alert…Dimitri, Crowdstrike & Ukraine

Part 5 DHS/FBI Grizzly Steppe Report..December 29 & 30, 2016
December 29 2016: The DHS/FBI Grizzly Steppe Report Turns out to be Proof that the NSA does not like the TOR Project
December 30 2016 Glaring Problems with the Grizzly Steppe Report
December 30, 2016 Security Expert John McAfee Explains why he is certain the Russians did not hack the DNC

Part 6 The Rush to War... January 2017 to Present
January 3, 2017: Assange Explains Why a 14 Year Old Could Have Hacked Podesta’s Email
January 5 2017: John McCain, who has called for a Declaration of War against Russia, holds a Senate Armed Services Committee hearing
January 5, 2017 DNC says FBI never asked to access hacked computer servers
January 6, 2017: FBI claims DNC Refused to Give them Access to Hacked DNC Server
January 6 2017 US Intelligence Groups Issue the Dumbest Report I Have Ever Read
January 7 2017 Wikileaks Craig Murray says source is Washington Insider
January 10, 2017: David Spring with Turning Point News publishes “Hack Everything, A Detailed Timeline of the DNC Hack.”

Part 7 Who Really Hacked the DNC
Were either Cozy Bear or Fancy Bear Teenage Hackers?

Part 8 Cyber Warfare as a Business Model
Conclusion… How to Really Protect Yourself from NSA Cyber Weapons

About the Author

00b
Dedication
This report is dedicated to Edward Snowden, a true patriot who understood that his duty was not to defend and protect dishonest leaders, but to defend and protect the Constitution of the United States. Many suspected we were all being watch from “behind the curtain.” Snowden risked his life to give us the proof.

Acknowledgements
This report provides links to more than 100 other reports. Each of these reports provided the pieces in putting together this complex puzzle. nI want to thank all of these researchers for their work. Together, we can and will overcome deception and deceit. Those pushing for cyber warfare may have massive amounts of money. But we have a more powerful weapon… The Truth.
Wikileaks just released about 8,000 pages of CIA documents detailing more than 1,000 tools the CIA uses to hack everything from computers and cell phones to “smart” TV sets and “smart” refrigerators. Among these tools is a program called UMBRAGE which is a group of hacking tools “borrowed” from other countries. Wikileaks documents confirm that the CIA uses these tools to implant fake “fingerprints” on their cyber attacks in order to fool researchers into believing that the attacks were being conducted by other countries, such as Russia, when in fact the attacks were actually conducted by the CIA. In this article, we will explain why this new evidence makes it even more likely that the “hacking” of the DNC servers were done not by Russia but by US spy agencies such as the CIA and NSA.

Background… Why Fake Finger Prints are Important
On June 15, 2016, a private security firm called Crowdstrike issued a report called “Bears in the Midst” which accused (Russian) groups called Fancy Bear and Cozy Bear of hacking the DNC servers. The accusation was based on the presence of “Russian finger prints” such as Russian Time stamps found in the attacking software. Crowdstrike claimed that these Russian fingerprints were all over the smoking gun found on the DNC server. But we later learned that Crowdstrike is actually an inside group of former FBI cyber warfare leaders who had been working with the DNC for over 9 months and had been working with the CIA for years in an effort to promote the CIA war in the Ukraine.

01

On December 29, 2016, US spy agencies released a report called Grizzly Steppe which included 876 “Command and Control” IP (Internet server) addresses which supposedly were “evidence” of a vast network of Russian hackers. After this release, I spent the next two weeks researching these 876 Internet servers (see map with their locations below).

02

On January 10, 2017, I published an 85 page report called “Hack Everything” that included the results of our extensive research into these 876 Internet server addresses. We found that 426 of these Internet servers were TOR “Exit Node” servers. Russians would not use TOR servers because TOR servers are constantly being attacked by the NSA. Since there are only 1,000 to 2,000 TOR servers in the world, this amazing connection could not be a coinicidence.

Misleading and blatantly false claims about the attack on the Democratic National Committee (DNC) are being used to create fear in the minds of the American people in order to launch cyber warfare and other sanctions against Russia. These scare tactics are also being used to pass draconian legislation limiting free speech and increase funding for the American Police State. This wave of propaganda is also a convenient excuse to explain away the Democratic Party loss of the 2016 Presidential Election. If we are interested in determining why the DNC hack happened, and how it happened, we first need to separate the lies from the truth so we can understand what happened and when it happened.

There were many significant and inter-related events both before the leak and after the leak. Many false claims have been made about several of these events in what appears to be a propaganda war of distortions, disinformation and outright lies by the main stream media. Numerous articles have been written on both sides of this debate. Yet thus far, there has not been a detailed timeline to review the events as they happened. The purpose of this report is to fill this void. Although a complete timeline of the DNC hack would go all the way back to the 1990s and the beginning of the modern Internet (a subject I have written extensively about in past articles), we will start with the 2007 formation of the NSA Prism Partners Program as the precursor to the 2009 US cyber warfare attack on Iran and carry it to the present day DNC cyber warfare attack. This is therefore an outline of the past 10 years of international cyber warfare – something the American people know next to nothing about.

After the timeline, we will go into detail over who was most likely to have done the hacking and why they hacked the DNC. Our conclusion based on an overwhelming amount of evidence is that the Russian government did not hack the DNC. The only question remaining is who did hack the DNC and why they did it. This is a lengthy report for the simple reason that strong allegations require strong evidence. Just as US Intelligence agencies had a duty to provide irrefutable evidence to the American people to justify launching an attack against Russia, so do we have a duty to provide irrefutable evidence to support the claim that Russia was not responsible for the DNC hack. We believe this report provides that evidence. This report includes numerous well documented facts that have never been released before. Those who spend too much time reading only the main stream media may be shocked by these facts. Others who have spent more time reading independent news sources may not be surprised at all. The truth is a powerful weapon. It is time to shed some light on this darkness. If you have any questions or comments, feel free to email me: This email address is being protected from spambots. You need JavaScript enabled to view it..


In the late 1990’s, three federal judges ruled that Microsoft was a monopoly that had engaged in price fixing in violation of the Sherman Anti-trust Act. To maintain their lucrative monopoly over computer operating systems, Microsoft made a “deal with the devil” by allowing the NSA to have an open back door into every Microsoft Windows computer. This back door was enabled by placing the Explorer web browser inside of the Windows Operating system. The downside of allowing the NSA access to every Windows computer was that it also allowed hackers access to Windows computers. This back door is still present today – meaning that it is impossible to secure any Windows computer. But in 2007, the NSA launched a new program called PRISM that was about to make this dangerous situation much worse.


2007: NSA expands its program to actively recruit and train computer hackers.
One of the documents exposed by Snowden in 2013 was a 2007 NSA job posting document in which the NSA actively solicited hackers to go to work for the NSA. The trainees will be taught how to “develop an attackers mindset.” Note that the NSA goal is not merely to monitor computers but to remotely destroy them. http://www.spiegel.de/media/media-35661.pdf

01

September 1, 2007: The NSA begins the Prism Collection Program.

As confirmed in documents provided by Edward Snowden in 2013, the NSA started the Prism Data Collection Program to enlist major US corporations to help with mass surveillance in 2007. Its first recruit was Microsoft in September 2007.

02
This was also the time that the startup program for all computers except Chromebooks began to change from the simple BIOS program to a complex encrypted program called UEFI. This means that not only is the operating system insecure but so is the startup program as both call back to Microsoft and the NSA using hidden backdoors.

Reminder: APT stands for Advanced Persistent Threat. APT refers to a suspected government sponsored hacker. Fancy Bear is APT 28 and Cozy Bear is APT 29.

September 2015: Cozy Bear also known as Cozy Duke attacks DNC network.

01

The timing of the first Cozy Bear attack on the DNC was first reported in the New York Times to be September 2015 with the FBI contacting the DNC almost immediately.
http://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html?_r=0


However, a report released on January 6, 2017 by the FBI called “Assessing Russian Activities and Intentions in Recent US Elections” states on page 2 that “In July 2015, Russian Intelligence gained access to the Democratic National Committee (DNC) networks and maintained that access until at least June 2016.”
https://www.dni.gov/files/documents/ICA_2017_01.pdf

June 03 2016: WikiLeaks creates an insurance file which includes the DNC hack. This seems to indicate that Wikileaks had at least some data by June 3 2016. However, Wikileaks later said that there were two separate leaks from two separate sources. It appears that at least one of the leaks was not until July 2016.

June 12 2016: Wikileaks Announces Clinton Data Release is Imminent

At 5:59 pm, Julian Assange announces that they have documents relating to Hillary Clinton which are pending publication and that it would be “enough evidence” to indict her. This appears to be the first public announcement about the DNC leak and/or hack. But he did not reference the DNC… Just the Clinton email private server scandal. He had already posted 32,000 emails from the Clinton private server. He did state that there were more leaked emails to come. Perhaps he did not want to mention the DNC because the DNC hack was not yet public and he wanted to protect his source(s).

http://www.itv.com/news/update/2016-06-12/assange-on-peston-on-sunday-more-clinton-leaks-to-come/

01

Here is a quote from the June 12, 2016 article:

“Julian Assange, founder of Wikileaks, said on Sunday that the journalist organization is planning to release upcoming leaks in relation to US presidential hopeful Hillary Clinton. Speaking to Peston on Sunday, Mr Assange said Wikileads has further information relating to claims circulating since 2015 that Clinton had in the past used her family's private email server for official communications.”

September 15, 2016 Server Company Provides Analysis of Hacker Locations

While nearly all of the servers claimed to be involved in the Russian Hacking attacks were not in Russia and have failed to provide any analysis from their server logs (I really wonder why this is because all servers have server logs), one Russian company that was caught up in the cyber attack did take the time to analyze their logs and issue a press release with their findings. Since this is what every server company should have done, I will quote from an English translation of their press release which was written in Russian.

This company has since been attacked as being owned by Russian criminals and I want to make it clear that I have no way of verifying their report. I am simply quoting them to show the public what could be done if a server company wanted to help us discover the truth – namely they should all publish their logs. Also I am certain that the FBI can get a warrant for all logs of all servers in the US. The fact that the FBI has not done this (or has not released information about the logs if they have done this) is a strong indication that the FBI is not really interested in providing the public with additional information about the locations of communications from the hackers to the servers. Here is the source document which will be translated for you if you visit the page with a Chrome Browser.

https://chronopay.com/blog/2016/09/15/chronopay-pomogaet-king-servers-com/

Here is an edited version of their press release (I edited to make it shorter by eliminating text that was not related to the server logs. I also bolded the important parts):

“King Servers (https://www.king-servers.com), which owns servers from which the hacker allegedly performed attacks on the United States Democratic Party, states the absence of any «Russian trace» in this cybercrime nor its own involvement...King Servers, owned indeed by Russian nationals, provides VPS and VDS rental services of the equipment, physically located in the Netherlands. Earlier, after the FBI alert (https://s.yimg.com/dh/ap/politics/images/boe_flash_aug_2016_final.pdf) and analysis from Threat Connect (https://threatconnect.com/blog/state-board -election -rabbit-hole /), the world's leading media were spreading information about the discovery of the so-called «Russian trace» in the attacks on the United States democratic party in Illinois. The «Russian trace» was mostly presented as the use of King Servers services, stating that the company belongs to Russian citizens. As of September 15, neither King Servers received any complaints or appeals for any server misuse or abuse, nor any public authority did any attempts for servers withdrawal. Due to that King Servers found out about the issue related to that attack only on September 15, at 7 am Moscow time, and immediately shut down identified servers.

The analysis of the internal data allows King Services to confidently refute any conclusions about the involvement of the Russian special services in this attack. Attackers rented two servers using probably fabricated personal and identification data. After the attack servers were wiped out. However, King Servers maintains logs of accessing administrative control panel. After log analysis, King Servers obtained a list of about 60 of all possible IP addresses of «hackers», none of which belongs to any Russian ip range. Attackers were logging into administrative control panel mainly from Scandinavian countries (Norway, Sweden) and from the European Union (Italy).

December 29 2016: The DHS/FBI Grizzly Steppe Report Turns out to be Proof that the NSA does not like the TOR Project

The Department of Homeland Security and the FBI release a joint report which they claim provides evidence of Russian Hacking of the US Election. In fact, there is no evidence in the report linking Russia to anything. But there is plenty of evidence linking the attacks to the NSA.
https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf

The “alternative names list” for the Russian hacking programs on page 4 specifically referred to in the DHS/FBI report included the following: Cozy Bear, Cozy Duke, Cosmic Duke, Fancy Bear and MiniDuke.

01

As justification for launching a cyber war against Russia, on page 5 of their press release, the US government also falsely accused the Russians of creating a hacking program called PAS_TOOL_PHP_WEB_KIT. This web kit is a commonly available hacking program that even you can download. The following article claims that this program was made by Ukrainians not Russians.
https://www.wordfence.com/blog/2016/12/russia-malware-ip-hack/

Things have only gone from bad to worse in the first weeks of January 2017. Nearly every day we are told that there is “new evidence” of Russian hacking. But the new evidence is never released.

January 3, 2017: Julian Assange Explains Why a 14 Year Old Could Have Hacked Podesta’s Email

Julian Assange of WikiLeaks says that the Russian government did not provide him with the hacked DNC emails during a televised interview. Julian Assange stated that Podesta’s password for his Gmail account was “password.” For those who may not know, the word password is the most common password and is the first password checked by hackers when trying to access any login screen. Here is a quote from the interview: "Podesta gave out that his password was the word ‘password’ ... a 14-year-old kid could have hacked Podesta."
http://www.foxnews.com/politics/2017/01/04/wikileaks-assange-14-year-old-kid-could-have-hacked-podesta-emails.html


01

Assange also repeatedly stated that Wikileaks gained access to the Podesta emails from a leak and not a hack and that the source of the leak was not Russia. Assange, who is a former computer security consultant, also stated that Hillary Clinton made “almost no attempt” to protect the private server that stored her State Department emails. I have previously written about how insecure the Clinton server was and that any teenager could have hacked it using programs and methods available through a simple Google search. While the main stream media claims that the Clinton server was hacked by Guccifer and that Guccifer was Fancy Bear or Cozy Bear and therefore a Russian spy, the fact is that Guccifer could just have easily been a bored American teenager with too much time on his hands.

If the Russians did not hack the DNC servers, then who gave the data to Wikileaks?

This leads to the important question of how Wikileaks got all of the emails and other data it released which certainly did influence the outcome of the US elections. According to both of the major sources in Wikileaks, Julian Assange and Craig Murray, they got the data from “a disgusted DNC Democrat” who was mad about how the DNC treated Bernie Sanders.
http://www.washingtontimes.com/news/2016/dec/14/craig-murray-says-source-of-hillary-clinton-campai/

01

Both Murray and Assange have repeatedly stated that they did not get the information from the Russians. We therefore conclude that if the DNC was hacked (which it likely was), then it was hacked by the NSA using Cozy Bear and Fancy Bear as a cover – knowing that Cozy Bear and Fancy Bear were specifically written to fool consultants like Dimitri and Cloudstrike into thinking that it was a Russian hacking program. Obviously, the NSA is not going to give any of its information to Wikileaks. But in addition to these two hacks by Cozy Bear and Fancy Bear, a disgusted member of the DNC also got the information directly from the DNC database, put it on a jump drive and handed the jump drive to Craig Murray. In other words, we conclude that the DNC was hacked and also subjected to an insider leaker. Thus, Wikileaks claim that it was a leak is true. But their claim that it was not a hack may not be accurate as there is evidence of a hack.

Nearly 100 years ago, an American war hero named General Smedley Butler wrote a book called War is a Racket. He claimed that wars were being deliberately provoked in order to increase corporate profits. He said that the American people were being lied to by wealthy people who controlled the American press in order to provoke fear and get them to agree to go to war. Here is a link to his book. https://www.ratical.org/ratville/CAH/warisaracket.html


50 years later, another American war hero, General (and then President) Dwight Eisenhower, warned of a growing “military industrial complex” that was a threat to our democracy. Here is a link to his speech. https://www.youtube.com/watch?v=8y06NSBBRtY


Today, the US has more than 700 military bases around the world and numerous bases here in the US. Including secret spending for our new Global War on Terror, as mentioned at the start of this article, the US spends more than one trillion dollars per year on war – much more than the rest of the world combined. http://www.globalresearch.ca/the-worldwide-network-of-us-military-bases/5564

The purpose of this worldwide network of chaos is not to protect Americans but simply to increase corporate profits by sucking one trillion dollars a year out of the American economy – money that could have been used to provide free higher education and health care for every American. Because of this annual feast of a trillion dollars being shelled out, our elected officials have been corrupted with a vast bribery and kickback scheme that has turned our elections into a “pay to play” bidding war between various wealthy corporations. These same corporations monopolize the American media with the goal of scaring the American people into supporting this war machine into voting for war hawks willing to do the bidding of their corporate masters. This same “warfare as a business” model is now being used to create Permanent Cyber War on the Internet. Folks with websites need to be aware of this because you will certainly be caught in the crossfire of this cyber warfare machine.

01


Thus, the most important thing to know about the current campaign to launch a cyber war against Russia is that it will create massive corporate profits. In the summer of 2016, there was a conference on how to profit from the coming cyber war. This conference was documented in the following article:
https://theintercept.com/2016/08/19/nato-weapons-industry/


False Allegations have been used before to start wars… Doesn’t Anyone Remember the Gulf of Tonkin Incident?
This means that the US is about to start a cyber war with Russia over a hacking incident created by our own NSA. This is nearly identical to the Gulf of Tonkin incident that was used as an excuse by the US military to go to war against Vietnam in the 1960s. That incident turned out to be completely false. Yet millions of people died. The NSA claimed that there was a North Vietnamese attack on August 4 1964. But in 2003, former US Secretary of State Robert McNamara admitted that the the August 4 1964 attack never happened. Moreover, there is substantial evidence that it never happened. The Vietnamese leaders also have confirmed that it never happened. The entire Vietnam War disaster was based on a lie – just like the Iraq War was based on a lie. https://en.wikipedia.org/wiki/Gulf_of_Tonkin_incident


02


Why Would Our Own Government Lie to Us?

Many readers protested to our previous article asking why our own government would lie to us. I am not certain but I think it has something to do with making money. The Cyber Warfare Industry has become BIG BUSINESS accounting for billions of dollars in corporate sales and profits since 911. All of the attacks on US corporations have forced all of them to hire cyber consultants and buy expensive cyber products to protect their computers and data. There is a danger in developing such a business model as it could lead to nuclear war with Russia. It could also lead to some former NSA employees deciding to take down the US electric grid or US nuclear power plants. We therefore should understand cyber warfare and a business model and take steps to provide real security for our computers, databases and websites.

David Spring has a Master's Degree in Education from the University of Washington. He has taught adult education courses for more than 20 years at several colleges in Washington State including Bellevue College, Seattle Central Community College and Shoreline Community College. In recent years, David has gotten more deeply involved in computer and website security. He has written extensively about the history of Microsoft and the NSA. Here are links to his three most recent books:


Free Yourself from Microsoft and the NSA
https://freeyourselffrommicrosoftandthensa.org/


Learn Linux and LibreOffice
https://learnlinuxandlibreoffice.org/


Weapons of Mass Deception… The Billionaires Plan to Take Over Our Public Schools
https://weaponsofmassdeception.org/


David lives near Seattle Washington with his daughter Sierra Spring, his wife Elizabeth Hanson, her son Chris Hanson, several cats and four free gnomes.


David Spring, Elizabeth Hanson and our four free gnomes.



about




You can contact David at the following email address:

This email address is being protected from spambots. You need JavaScript enabled to view it.