- 21) The true nature of the problem, obviously, is not that Russians made us vote for @POTUS. It is that the entire world could see what was in the Democrats’ e-mails.1 reply9 retweets4 likes
- 22) “the [Democratic] caucus server, run by then-caucus Chairman Rep. Xavier Becerra, was secretly copied by authorities after the House Inspector General (IG) identified suspicious activity on it, but the Awans’ physical access was not blocked.”1 reply4 retweets2 likes
- 23) The Awans of course are Pakistani spies. Who had total access to Congressional Democrats’ email. Nothing to see there, folks.1 reply3 retweets4 likes
- 25) They figure out that something is wrong. They copy the servers’ contents. They let Awan continue to use it. And then it just disappears.1 reply5 retweets6 likes
- 26) We are talking about CONGRESS here, people. Who is running the show here???1 reply2 retweets5 likes
- 27) “But after, the report reads, the server appears to have been secretly replaced with one that looked similar.”1 reply2 retweets2 likes
- 28) Let’s imagine that you run a 7-11 franchise. And the video surveillance footage shows that someone is stealing from the cash register. WOULDN’T YOU PUT SOME DISTANCE THERE?1 reply2 retweets5 likes
- 29) The deliberations of Congress must be secure. Who allowed IT personnel to sneakily remove such vital evidence? Who allowed Congress to employ a Pakistani national to administer its IT? Where is his security clearance?2 replies2 retweets4 likes
- 30) “The memo called for firing the Pakistani-born aides, revoking all their computer accounts, and changing the locks on any door they had access to.”1 reply2 retweets3 likes
- 31) Member of Congress Debbie Wasserman Schultz—who hails from Broward County FL—called the investigation into Imran Awan “Islamophobic.”1 reply4 retweets5 likes
- 32) Broward of course is where Parkland happened, where they didn’t count the votes in @realDonaldTrump’s favor till the very end, and where a prosecutor recently died with no leads in the case. @JaredBeck1 reply8 retweets10 likes
- 33) @JaredBeck who led the voter fraud lawsuit against the DNC referred to the death of this prosecutor in requesting an order of protection in District Court.1 reply3 retweets4 likes
- 34) May 18, 2017: Debbie Wasserman Schultz warned the Chief of the U.S. Capitol Police, Matthew Verderosa, that there would be “consequences” for his stubborn insistence on following procedure and holding computer evidence that could implicate Imran Awan. https://youtu.be/PDqNhZqzVi41 reply2 retweets4 likes
- 35) “I think you’re violating the rules when you conduct your business that way and should expect that there will be consequences,” she says.1 reply2 retweets2 likes
- 36) Schultz insists that the laptop in question be returned to the member of Congress even though the CHIEF OF THE CAPITOL POLICE is telling her there are “extenuating circumstances,” meaning evidence of a crime.1 reply2 retweets2 likes
- 36) Schultz either cannot or will not admit that there is a difference between your PERSONAL computer and the computer you use in your PROFESSIONAL capacity as a member of Congress.1 reply2 retweets2 likes
- (Sorry, I double counted 36)1 reply1 retweet0 likes
- 38) This tendency, to conflate what you do in your official capacity with your private life, is at the core of the problem with the corrupt Establishment.1 reply5 retweets5 likes
- 39) The law is very specific about this. A government employee “shall not use his public office for private gain.”1 reply4 retweets5 likes
- 40) The funds, resources, personnel and property you have access to for the sake of doing your job are not your personal piggy bank. This is simple and obvious to everyone—except the ones violating the law.1 reply3 retweets5 likes
- 41) Now here’s a question for you. If the Democrats are so worried about foreign interference in our government, why do they leave their data in the hands of a Pakistani spy?2 replies5 retweets5 likes
- 42) If the media is so concerned about Russia Russia Russia, why don’t they investigate all the foreign entities that no doubt feasted on the contents of Hillary Clinton’s server/s, the DNC server, and the server used by the Democratic caucus that was compromised?1 reply3 retweets4 likes
- 43) The Democrats, who seem to think that Vladimir Putin secretly controls President Trump, can’t be bothered to ask why President Obama’s response to known Russian propaganda/trolling/hacking was so incredibly weak.1 reply2 retweets9 likes
- 44) Why don’t the Democrats ask how it is that the Secretary of State was funneling CLASSIFIED e-mails HOME TO HER MAID to print?1 reply3 retweets3 likes
- 45) Why don’t they ask how the Secretary of State had a little contracting firm setting up servers in the bathroom? Where people make a number 2?1 reply4 retweets4 likes
- 46) Hillary Clinton and Debbie Wasserman Schultz both defied the barrier between professional and personal — over and over again. This is a crucial problem when it comes to cybersecurity. People are always the weakest link.1 reply2 retweets6 likes
- 47) Do you know how John Podesta’s e-mails we’re breached, and scattered all over the world by Wikileaks?1 reply1 retweet2 likes
- 48) His password was...”password.”1 reply2 retweets5 likes
- 49) When a hacker sent Podesta an email saying his Google password had been compromised and needed to be changed, Podesta was suspicious and sent it to his staff.1 reply2 retweets3 likes
- 50) Am employee thought it was suspicious, and meant to say “that’s ILLEGITIMATE.” But instead the person typed “LEGITIMATE.”1 reply1 retweet2 likes
- 51) The Democrats we are dealing with here are Baby Boomers who don’t know anything about computers.1 reply1 retweet2 likes
- 52) And yet (God is in charge) computers basically run our entire world.1 reply1 retweet2 likes
- 53) Apple has a great new commercial out for the iPhone X. It focuses on the stress of remembering passwords. You should pay Apple to recognize your face.1 reply1 retweet0 likes
- 54) The reason our country is in trouble is not because Russians make good propaganda.1 reply1 retweet1 like
- 55) We are in trouble because the people we have elected to Congress need a basic class in IT.1 reply1 retweet6 likes
- 56) We are in trouble because the Swamp is so lost in law school politeness, because everybody knows everybody. If someone may have compromised classified information or government IT security, there is no delay. Remove them from official computers!2 replies1 retweet3 likes
- 57) DC people are very good at generating 600 page reports that bury the lead. According to the IG report: 1. An FBI agent noted evidence of crimes against children. This was not pursued. 2. Hillary Clinton had numerous email addresses.2 replies4 retweets3 likes
- 58) Now, let’s put our brains to work.1 reply1 retweet0 likes
59) If Anthony Weiner’s computer stored files showing crimes against children, the files are probably implicate Hillary Clinton and are most likely held by multiple sources, both within and outside the US government.
They are blackmail material.
1 reply3 retweets2 likes
- 60) If Hillary Clinton’s email was viewable on the open market (much like the email of the DNC and separately the Democratic Caucus of the House of Representatives) due to shitty IT security, it’s also blackmailable.1 reply1 retweet2 likes
- 61) The Democrats are the ones whose e-mails are exposed.1 reply2 retweets3 likes
- 62) The Democrats, being shitty at cybersecurity, didn’t realize the risk they were putting themselves in with all their stupid mix-professional-and-personal e-mails.1 reply1 retweet3 likes
- 63) They didn’t care about our national security, either.1 reply1 retweet2 likes
- 64) And they did not realize that No Such Agency really truly does have it all. Even if they tried to communicate using draft emails in Gmail. (Whooaaa so brilliant!) (Thank you Q for that info.)1 reply3 retweets2 likes
- 65) The Democrats are defeated. And that’s why they are going down hard. (End.)1 reply2 retweets2 likes
- @threadreaderapp unroll1 reply0 retweets0 likes
New conversation