Trump Helsinki Presser: DNC Server & Awan

POTUS dropped a major breadcrumb for us to look into when he stated: “What happened to the servers of the Pakistani gentleman that worked on the DNC? Where are those servers? They’re missing. Where are they?”

Putin dropped a bread crumb too when he stated: “For instance, we can bring up Mr. Browder in this particular case. Business associates of Mr. Browder have earned over $1.5 billion in Russia. They never paid any taxes. Neither in Russia nor in the United States. Yet, the money escapes the country. They were transferred to the United States. They sent huge amount of money, $400 million as a contribution to the campaign of Hillary Clinton.”

The MSM is creating a lot of noise to drown out these two huge bombshell drops. No mention of Awan, other than discrediting it thoroughly and calling it a conspiracy theory.

Trump had the world’s attention yesterday at the Helsinki presser – he intentionally drew attention to the DNC server and Pakistani Awan for a reason – for us to follow his que and investigate further.

Main points:
-Awans are paid 2X the median salary of congressional staffers in similar positions.
-Jackie Speier and Debbie Wasserman Schultz also requested top secret clearance for the Awan brothers. The Awans are Pakistani Nationals not US citizens.
-Awans worked under congressional members who work for top secret level congressional committees (DHS, Foreign affairs, Select intelligence committee).
-External Server

George Webb believes that the Awan Brothers used ‘dummy’ routers and wiretaps to procure sensitive government information that could be passed to operatives in conflict zones as a sort of warning system for the rat-lines. These rat-lines include drug smuggling, human trafficking, organ harvesting, information, and weapons.

How Russians Used X-Agent to get Imran Awan’s iPhones on Capital Hill

From RT article:

The brothers, Abid, Jamal and Imran Awan, worked as shared employees for various members of the House, covering committees relating to intelligence, terrorism and cybersecurity, which included the House Committee on Foreign Affairs, the Committee on Homeland Security and the Subcommittee on Tactical Air and Land Forces of the Armed Services Committee.
(cannot link)

“… There is a possibility that Seth Rich was not the one who leaked the information, but that the DNC bigwigs THOUGHT he was, in which case, by neither confirming nor denying that Seth Rich was the leaker, it may be that letting the DNC continue to think it was him is being done in protection of the actual leaker. Seth Rich could also have been killed for unrelated reasons, perhaps Imran Awan thought he was on to his doings. …”

“… Don’t forget this Twitter post by Wikileaks on October 30, 2016: Podesta: “I’m definitely for making an example of a suspected leaker whether or not we have any real basis for it.” …”

“… Did Imram Awan leak the documents exposing that the DNC was colluding with the Clintons and rigging the primaries and convention in her favor? After all, that’s where this all began. …”

“… That was when Hillary came up with the idea to try to blame the Russians for the leaks and thus lead the world close to nuclear war for her own personal ambition. …”

“… The DNC was caught in the act of rigging the Primaries. Fact. …”

“… And someone inside hacked their computers for all those emails, too. That’s why they didn’t turn over their computers to the F.B.I. because it would bear that out. …”

“… Aside from the obvious crimes of espionage and certainly extortion and fraud, why was Imran Awan trying to flee the country just after Seth Rich’s assassination? Was Rich spilling the beans about Debbie Schultz’s Pakistani mole and not just the Hillary scam? …”

Mueller Indicts 12 Russian Intel Officials For Hacking DNC, Hillary Campaign

4. By in or around April 2016, the Conspirators also hacked into the computer networks of the Democratic Congressional Campaign Committee (“DCCC”) and the Democratic National Committee (“DNC”). The Conspirators covertly monitored the computers of dozens of DCCC and DNC employees, implanted hundreds of files containing malicious computer code (“malware”), and stole emails and other documents from the DCCC and DNC.

5. By in or around April 2016, the Conspirators began to plan the release of materials stolen from the Clinton Campaign, DCCC, and DNC.

6. Beginning in or around June 2016, the Conspirators staged and released tens of thousands of the stolen emails and documents. They did so using fictitious online personas, including “DCLeaks” and “Guccifer 2.0.”

7. The Conspirators also used the Guccifer 2.0 persona to release additional stolen documents through a website maintained by an organization (“Organization Iй), that had previously posted documents stolen from U.S. persons, entities, and the U.S. government The Conspirators continued their U.S. election-interference operations through in or around November 2016.

8. To hide their connections to Russia and the Russian government, the Conspirators used false identities and made false statements about their identities. To further avoid detection, the Conspirators used a network of computers located across the world, including in the United States, and paid for this infrastructure using cryptocurrency.

Hacking into the DNC Network

26. On or about April 18, 2016, the Conspirators hacked into the DNC’s computers through their access to the DCCC network. The Conspirators then installed and managed different types of malware (as they did in the DCCC network) to explore the DNC network and steal documents, a. On or about April 18, 2016, the Conspirators activated X-Agent’s keylog and screenshot functions to steal credentials of a DCCC employee who was authorized
to access the DNC network. The Conspirators hacked into the DNC network from the DCCC network using stolen credentials.

By in or around June 2016, they gained access to approximately thirty-three DNC computers.

In or around April 2016, the Conspirators installed X Agent malware on tho DNC network, including the same versions installed on the DCCC network.

MALYSHEV and his co-conspifators monitored the X-Agent malware from the AMS panel and captured data from the victim computers. The AMS panel collected thousands of keylog and screenshot results from the DCCC and DNC computers, such as a screenshot and keystroke capture of DCCC Employee 2 viewing the DCCC’s online banking information.

Theft of DCCC and DNC Documents

27. The Conspirators searched for and identified computers within the DCCC and DNC networks that stored information related to the 2016 U.S. presidential election, for example, on or about April 15, 2016, the Conspirators searched one hacked DCCC computer for terms that included “hillary,” “cruz,” and “trump.” The Conspirators also copied select DCCC folders, including “Benghazi Investigations.” The Conspirators targeted computers containing information such as opposition research and field operation plans for the 2016 elections.
28. To enable them to steal a large number of documents at once without detection, the Conspirators used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks. The Conspirators then used other GRU malware, known as “X-Tunncl,” to move the stolen documents cutside the DCCC and DNC networks through encrypted channels.

a. For example, on or about April 22, 2016, the Conspirators compressed gigabytes of data from DNC computers, including opposition research. The Conspirators later moved the compressed DNC data using X-Tunnel to a GRU-leased computer located in Illinois.

b. On or about April 28, 2016, the Conspirators connected to and tested the same computer located in Illinois. Later that day, the Conspirators used X-Tunnel to connect to that computer to steal additional documents from the DCCC network.

We are primarily funded by readers. Please subscribe and donate to support us!

29. Between on or about May 25, 2016 and June 1, 2016, the Conspirators hacked the DNC Microsoft Exchange Server and stole thousands of emails from the work accounts of DNC employees. During that time, YERMAKOV researched PowerShell commands related to accessing and managing the Microsoft Exchange Server.

30. On or about May 30, 2016, MALYSHEV accessed the AMS panel in order to upgrade custom AMS software on die server. That day, the AMS panel received updates from approximately thirteen different X-Agent malware implants on DCCC and DNC computers.

31. During the hacking of the DCCC and DNC networks, the Conspirators covered their tracks by Intentionally deleting logs and computer flies. For example, on or about May 13, 2016, the Conspirators cleared the event logs from a DNC computer. On or about June 20, 2016, the Conspirators deleted logs from the AMS panel that documented their activities on the panel, including the login history. Efforts to Remain on the X’CC and PNC Networks

32. Despite the Conspirators’ efforts to hide their activity, beginning in or around May 2016, both the DCCC and DNC became aware that they had been hacked and hired a security company (“Company 1”) to identify the extent of the intrusions. By in or around June 2016, Company 1 took steps to exclude intruders from the networks. Despite these efforts, a Linux-based version of X-Agent, programmed to communicate with the GRU-registercd domain, remained on the DNC network until in or around October 2016.

33. In response to Company Ts efforts, the Conspirators took countermeasures to maintain access to the DCCC and DNC

More info & continued here:​_as_neoconservative_in_foreigh_policy.shtml

Also from link above – Russia did garner a lot of information and it wasn’t just the DNC rigging of the primaries:

[Jul 03, 2018] Russia has a lot of information about Lybia that could dig a political grave for Hillary. They did not release it

“… The fact of the matter is, if Russia wanted to do, cause lot of difficulty to the American election they could have. Instead, they went and talked privately to us. So when the government says Russia intercepted stuff that was very important to us, I’m being very fuzzy about it, it wasn’t about the election. They told us that there were certain people in America doing things that were very deleterious to the War on Terrorism for personal and financial gain, and they could have blown it publicly but they went internally to us.” …”

“… I haven’t listened to that particular interview yet, but can say the the HRC emails with Sid Blumenthal show the reason we got in bed with Sarkozy (and Britain) to destroy Libya was: …”

“… To steal the nationalized oil …”

“… To steal the hundreds of tons of gold and silver. …”

“… To prevent Libya from developing a pan-African gold dinar and development bank to complete with the Federal Reserve petrodollar and the IMF. …”

“… I can also say that Hersh documented that Ambassador Stevens was an arms dealer, smuggling Libyan military weapons into Syria to finish the “regime change” operation still ongoing there. Also, HRC knew her “rebels” were hunting down and murdering any black Libyans they could find even before Gaddafi was anally bayonet raped. …”



Remember this?:

Then-SecState Hillary Sent 10 Russian Spies Back to Moscow Before FBI Had Chance to Question

From Daily Caller:

Russian intelligence targeted Hillary Clinton before she became secretary of state in 2009, FBI documents show.
New FBI information about corruption in a Clinton-approved uranium deal with Russia raises questions about Clinton’s actions after the FBI broke up a deep-cover Russian spy ring in 2010.

For a decade, the FBI ran an operation called Ghost Stories to monitor and rip apart a deep-cover Russian agent network. Ghost Stories tracked a ring Russian spies who lived between Boston and Washington, D.C., under false identities. It was one of the FBI’s most elaborate and successful counterintelligence operations in history.


ussia was working with HRC, the Obama administration. Deep State is projecting – everything they are accusing Trump of doing is what they did.

“So here are the key facts: The FBI found that Russian intelligence had targeted Hillary Clinton before and during her time as secretary of state. Clinton’s spokespersons denied that this was so. Clinton opposed the Magnitsky sanctions on officials tied to Putin. After her husband received a half-million dollars in Moscow from a Kremlin-connected investment bank, Clinton moved with unusual speed to whisk the ring of 10 Russian spies out of the country and back to Moscow. She had the lopsided swap take place over a long summer weekend, before the FBI was finished with the spies, and before the spies could stand trial. While the FBI was separately investigating Russians involved with buying Uranium One, she approved the sale of American uranium to Russia’s nuclear weapons agency. Principals in the sale then plowed $145 million into her family foundation and projects.

Several questions come to mind. Precisely what did the FBI know about Russia’s spy service targeting Hillary Clinton and her inner circle? Why did Clinton deny through spokespersons that she had been a Russian target? Why did she work so feverishly to get the spies out of the United States and back to Russia? Why has the FBI leadership not been more vocal in touting one of its greatest counterintelligence successes ever? And why did nobody in the FBI leadership raise this issue during the 2016 Russian election meddling controversy?…

Before the Obama administration approved a controversial deal in 2010 giving Moscow control of a large swath of American uranium, the FBI had gathered substantial evidence that Russian nuclear industry officials were engaged in bribery, kickbacks, extortion and money laundering designed to grow Vladimir Putin’s atomic energy business inside the United States, according to government documents and interviews.”

Then-SecState Hillary Sent 10 Russian Spies Back to Moscow Before FBI Had Chance to Question

FBI uncovered Russian bribery plot before Obama administration approved controversial nuclear deal with Moscow

Hillary Clinton’s Russian Ghost Stories

eta – yes, I believe Putin is laughing at us. He knows full well that HRC, Kerry, Obama and his administration was compromised.

h/t ElleMira


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.