Jump to content

How John Podesta was hacked.... Hillarious stuff


Recommended Posts

As I have been saying, the latest Wikileaks dump is full of hilarious shit. One example is that we learned how Podesta was hacked. Was it some elaborate Russian super spy network? No. It was from some South Pacific atoll.

 

He was phished by one of those "change your password scams" the rest of us delete. How stupid can these people be?

 

OCTOBER 28--So how did John Podesta’s e-mail account get hacked?

The answer to that question came into embarrassing focus this morning with the latest Wikileaks dump of correspondence stolen from the Gmail account of Hillary Clinton’s campaign chairman.

 

On March 19, a Saturday, Podesta received an e-mail--purportedly from Google--warning him that, “Someone has your password.” The alert (seen above) informed Podesta that a sign-in attempt from an IP address in Ukraine was thwarted and that, “You should change your password immediately.”

The e-mail, addressed "Hi John," included a blue “CHANGE PASSWORD” box to be clicked.

 

After the e-mail arrived in Podesta’s account, it appears that his chief of staff, Sara Latham, sought guidance from an IT worker with the Clinton campaign. After examining the “Someone has your password” e-mail, staffer Charles Delavan (seen at left) mistakenly assured Latham and Shane Hable, the campaign’s chief information officer, that, “This is a legitimate email. John needs to change his password immediately, and ensure that two-factor authorization is turned on his account.”

Delavan’s 9:54 AM e-mail included a link to an actual Google password change page. “It is absolutely imperative that this is done ASAP,” he added.

Latham then forwarded Delavan’s email to Podesta and campaign staffer Milia Fisher, who had access to Podesta’s Gmail account. “The gmail one is real,” wrote Latham, who instructed Fisher to change Podesta’s password since “Don’t want to lock him out of his in box!”

But instead of following the link provided by Delavan, it appears that Podesta or Fisher (pictured at right) clicked on the “CHANGE PASSWORD” box in the original “spear phishing” correspondence (a copy of which which was included in the e-mail chain that Saturday morning).

That link led to what appeared to be a legitimate Google page, but was actually a site designed by the hackers to capture a target’s log-in credentials. The link to the spoofed Gmail page included a lengthy underlying url with the .tk suffix, indicating that the domain created to trick Podesta was registered in Tokelau, a remote group of South Pacific atolls.

 

The hidden 293-character link included a string of characters containing the encoded Gmail address for Podesta (john.podesta@gmail.com).

The e-mails stolen in the Podesta hack and posted on Wikileaks show that the most recent correspondence is from March 21.

While Delavan protected his Twitter page following the publication of this story, he did offer the public some sage advice earlier this week. In an October 25 tweet, Delavan wrote, “don’t click on anything ever. delete your email account. move to the woods.” (1 page)

Link to comment
Share on other sites

original.jpg

14581387_584839571704158_819626352530295

"intent" appears Nowhere in the statute.

 

 

18 U.S.C. § 793 : US Code - Section 793:

Gathering, transmitting or losing defense information

(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer - Shall be fined under this title or imprisoned not more than ten years, or both.

 

 

She is Guilty of Felony Espionage.

Enjoy the White House

j5l94w.jpg

Link to comment
Share on other sites

Former Assistant FBI director James Kallstrom:

Bill and Hitlery Rotten Clinton

are a

"CRIME FAMILY"

whb_shush0306.jpg

The former FBI official said Sunday that Bill and Hitlery Rotten Clinton are part of a “Crime Family” and argued top officials hindered the investigation into Hitlery Rotten Clinton’s private email server while she was secretary of State.

“The Clintons, that’s a crime family, basically,” Kallstrom said. “It’s like organized crime. I mean the Clinton Foundation is a cesspool.”

Kallstrom, best known for leading the investigation into the explosion of TWA flight 800 in the late '90s, said that

 

Hitlery Rotten Clinton, the Democrat National Socialist presidential nominee, was a “pathological liar.”

 

He also blasted Attorney General Loretta Lynch, claiming that she impeded the investigation into Clinton’s private server.

 

“The problem here is this investigation was never a real investigation,” he said. “That’s the problem.

 

They never had a grand jury empanelled,

 

and the reason they never had a grand jury empanelled, I’m sure, is Loretta Lynch would not go along with that.”

 

“God forbid we put someone like that in the White House,”

he added of Clinton.

 

Kallstrom also said that FBI Director James Comey and the rest of the FBI’s leadership were responsible for holding back the investigation, not the rest of the bureau.

 

“The agents are furious with what’s going on, I know that for a fact,”

he said.

 

Clinton_Crime_zpseap2x1m7.jpg

53434501.png

Link to comment
Share on other sites

Most victims of scammers are senior citizens who tend to be conservative.

 

Next.

And how does this relate to the OP?

I heard some teenagers fished an ancient PC out of a dumpster behind Staples & ( when it dried out ), they cleaned Podesta's clock.

I think it had a K 6 processor - - - so old, it had parts made of stone.

Link to comment
Share on other sites

Most victims of scammers are senior citizens who tend to be conservative.

 

Next.

 

And how does this relate to the OP?

I heard some teenagers fished an ancient PC out of a dumpster behind Staples & ( when it dried out ), they cleaned Podesta's clock.

I think it had a K 6 processor - - - so old, it had parts made of stone.

 

progressive_threat_meter2.jpg

 

Link to comment
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...