Look for the words "a sensible step."
Just what I said. It says that instead of doing a full probe they could have done a preliminary one instead and wouldn't have made fools of themselves. Durham does not endorse what the FBI did.
Look for the words "a sensible step."
Just what I said. It says that instead of doing a full probe they could have done a preliminary one instead and wouldn't have made fools of themselves. Durham does not endorse what the FBI did.
Text from page 295
In implementing these standards, the FBI could have taken one or more of the
following sensible steps:
• Under the least intrusive standard, rather than opening an investigation with a broad
scope ("to determine whether individual(s) associated with the Trump campaign are
witting of and/or coordinating activities with the Government of Russia"), the FBI
should have focused, at least at the beginning, on Papadopoulos, the alleged source
of the information from Australia. On the other hand, the Paragraph Five
information was not only connected to Papadopoulos, but also to the campaign as an
alleged recipient of "some kind of suggestion from Russia."
• Under the FBI's guidelines, the investigation could have been opened more
appropriately as an assessment or preliminary investigation. FBI investigations
opened as preliminary investigations, short offull investigations, include time limits and
a narrower range of authorized techniques to mitigate risk and avoid unnecessary
intrusion. If necessary and appropriate, a lower level of investigative activity may be
escalated under the guidelines by converting to a full investigation with supervisory
approval.
• In the subsequent investigation of Page under the Crossfire Hurricane umbrella, the
FBI could have used additional, less intrusive techniques before seeking authority to
conduct electronic surveillance under FISA. The paucity of information collected on
key aspects of Page's activities would support such an approach.
Regardless of an investigator's preference for any of these steps, there are now additional
requirements that apply to the opening of an investigation like Crossfire Hurricane. The
Sensitive Investigations lvlemorandum requires the Attorney General to approve the opening
of such an investigation. That an investigation like Crossfire Hurricane should require a
concurring decision by the Department, rather than any one component or entity, seems
appropriate.
Stretch guys! Don’t wanna pull anything!
They could have also come out at any time and said there was nothing to this, and closed the book on it.
They didn’t because they knew who they were protecting and that it was total garbage so it went on and on and there was no accountability
Stretch
Two most important things to glean from this:
1) Obama greenlit the operation. A sitting president allowed an illegal spying operation on the opposition candidate. Nothing comes close to this in our nations history. Truly the stuff of dictatorships.
2) The DNC hack was a lie. There is absolutely no proof this took place. Which means Seth Rich was murdered.
Show proof the DNC was hacked - You can't and you know it.
John Podesta's gmail account was compromised when he fell for a phishing expedition. The intelligence community assessed the Russians to have been the perps. In particular the hacking group known as Fancy Bear. Wikileaks later disseminated those emails.
A cybersecurity firm named Dell SecureWorks reached the same conclusion and reported some of those conclusions in June 2016.
That isn't the DNC hack buddy - Try again.
And we all know how good the IC is when it comes to pinning blame on RUSSIA!!!!
You seem to be making an obscure distinction between the hacks of Podesta's gmail, the DNC, and a third hack at the DCCC (Democratic Congressional Campaign Committee). I don't think there is any doubt that Fancy Bear and other Russian operatives broadly targeted individuals and entities associated with the Clinton campaign. If you want to hang your hat on some obscure distinction between the DNC hacks and the others be my guest. Long live the saga of Seth Rich.
That’s quite the pivot.
I’d probably do that too if I was too yellow to just admit I was duped, again
The U.S. Democratic party's governing body, the Democratic National Committee (DNC), uses the dnc.org domain for its staff email. Between mid-March and mid-April 2016, TG-4127 created 16 short links targeting nine dnc.org email accounts. CTU researchers identified the owners of three of these accounts; two belonged to the DNC's secretary emeritus, and one belonged to the communications director. Four of the 16 short links were clicked, three by the senior staff members. As of this publication, dnc.org does not use the Google Apps Gmail email service. However, because dnc.org email accounts were targeted in the same way as hillaryclinton.com accounts, it is likely that dnc.org did use Gmail at that time and later moved to a different service.
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign
This is from SecureWorks in June 2016. As assessment that is also shared by US intelligence.
[tw]1658462571266195459[/tw]
Wake up people - The country is being taken from us.