• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
  • Donate
  • Start
    • Contact
    • We Need Your Support (Donate)
    • Newsletter Signup
      • Daily
      • Weekly
    • Into the Storm (Hosted by Justin Deschamps)
    • Follow Our Social Media
    • Best Telegram Channels & Groups
    • Discernment 101
    • Media Archive (Shows, Videos, Presentations)
    • Where’s The Hope
  • Browse
    • Editor’s Top Content (Start Here)
    • Best Categories
      • Consciousness
      • Conspiracy
      • Disclosure
      • Extraterrestrials
      • History
      • Health
      • NWO Deep State
      • Philosophy
      • Occult
      • Self Empowerment
      • Spirituality
    • By Author
      • Justin Deschamps
        • Articles
        • Into The Storm (on EdgeofWonder.TV)
        • Awarewolf Radio (Podcast)
      • Adam AstroYogi Sanchez
      • Amber Wheeler
      • Barbara H Whitfield RT and Charles L Whitfield MD
      • Chandra Loveguard
      • Conscious Optimist
      • Marko De Francis
      • Lance Schuttler
        • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
      • Ryan Delarme
      • Will Justice
  • Products
    • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
    • Earth Science & Energy
    • Free Energy
    • AI and Transhumanism
    • Space
    • Nikola Tesla
    • ET
      • Ancient Technology
      • Crop Circles
      • UFOs
    • Conspiracy
      • Anti NWO Deep State
      • Domestic Spying
      • Freemasonry
      • Law & Legal Corruption
      • Mass Mind Control
      • NWO Conspiracy
      • Police State and Censorship
      • Propaganda
      • Snowden Conspiracy
      • Social Engineering
    • Misc.
      • Council on Foreign Relations
      • Music Industry
      • Paranormal
      • Pedagate and Pedophilia
      • Q Anon
      • Secret Space Program
      • White Hat
  • Sign Up
  • Election Fraud
  • Partners
    • EMF Harmonized
    • Ascent Nutrition

Stillness in the Storm

An Agent for Consciousness Evolution

  • Our Story
  • Support Us
  • Contact
  •  Sunday, February 1, 2026
  • Store
  • Our Social
    • BitChute
    • CloutHub
    • Gab
    • Gab TV
    • Gettr
    • MeWe
      • MeWe Group
    • Minds
    • Rumble
    • SubscribeStar
    • Telegram
      • Best Telegram Channels and Groups
    • Twitter (Justin Duchamps)
    • YouTube

Special Prosecutor John Durham Reportedly Investigating 2016 DNC Phantom Server “Hack”

Friday, March 11, 2022 By Stillness in the Storm 1 Comment

Spread the love

(Jim Hoft) A breaking report by Margot Cleveland at The Federalist reveals Special Prosecutor John Durham is also investigating the alleged 2016 DNC server hack.

Related UFC Fighter Unleashes on War Hawks in Washington, Tells Tucker a Lot of ‘Elites Are Guilty of Treason’

Source – The Gateway Pundit

by Jim Hoft, March 10th, 2022

Recall, the DNC in the Spring of 2016 claimed their servers were hacked by Russian hacking groups dubbed ‘Fancy Bear’ and ‘Cozy Bear.’

The FBI, under Director Comey’s leadership at the time, asked the DNC to hand over their servers as part of the government’s investigation into the hacking.

The DNC refused to give the FBI their servers and outsourced the investigation to Crowdstrike.

Crowdstrike never offered any evidence to prove Russia hacked the DNC emails and sent them to WikiLeaks.

According to emails obtained by The Federalist, the same Georgia Tech researcher embroiled in the Alfa Bank hoax is being investigated in his role in the “origins” of the Democratic National Committee hacker scandal.

In May 2020 The Gateway Pundit reported that intel company Crowdstrike had no information that Russia hacked the DNC. According to folklore and fake news media Crowdstrike had proof that the DNC servers were hacked in 2016 and the information was then forwarded to WikiLeaks.

This was always a lie that was repeatedly promoted by the fake news.

According to our earlier report — Documents from the Intel Community that were held up by corrupt liar, Rep. Adam Schiff, show incredible information that destroys the Deep State’s many lies.  The biggest lie was the Russia collusion sham based on the tale that Russia hacked the DNC and then gave the hacked emails to WikiLeaks, who in turn released them before the 2016 election to hurt Hillary Clinton.

Aaron Mate reported at the time.

This takes me back to the qualified, ambiguous Mueller language I highlighted in my @RCInvestigates report "Crowdstrikeout." The attribution of DNC hacking to Russia is tentative & appears at least partly based on inference, not hard evidence. (https://t.co/04tKUmNw4Q)

— Aaron Maté (@aaronjmate) May 8, 2020

Mueller stuck in the word “appear” in his report when suggesting Crowdstrike determined Russia stole DNC emails because there was zero proof of this:

There's a quote from Assange — maybe someone can find it, I can't rn — saying that it's possible that many different actors, including state actors, got inside the DNC system, but that doesn't mean they actually stole (aka exfiltrated) the emails Wikileaks later released.

— Aaron Maté (@aaronjmate) May 8, 2020

On March 8, 2020 and before on June 16, 2019, we presented arguments against the Mueller gang’s assertion that the DNC was hacked by Russians.

Cyber expert Yaacov Apelbaum posted an incredible report with information basically proving that the DNC was not hacked by the Russians.

Apelbaum’s first argument is this –

According to the WaPo (using CrowdStrike, DOJ, and their other usual hush-hush government sources in the know), the attack was perpetrated by a Russian unit lead by Lieutenant Captain Nikolay Kozachek who allegedly crafted a malware called X-Agent and used it to get into the network and install keystroke loggers on several PCs. This allowed them to see what the employees were typing and take screenshots of the employees’ computer.

This is pretty detailed information, but if this was the case, then how did the DOJ learn all of these ‘details’ and use them in the indictments without the FBI ever forensically evaluating the DNC/HRC computers? And since when does the DOJ, an organization that only speaks the language of indictments use hearsay and 3rd parties like the British national Matt Tait (a former GCHQ collector and a connoisseur of all things related to Russian collusion), CrowdStrike, or any other evidence lacking chain of custody certification as a primary source for prosecution?

A second point by Apelbaum was –

… that three of the Russian GRU officers on the DOJ wanted list were allegedly working concurrently on multiple non-related projects like interfering with the 2016 United States elections (both HRC and DNC) while at the same time they were also allegedly hacking anti-doping agencies (Images 2-3).

Above are pictures of the individuals the FBI says were working on both the DNC/HRC email hacking and the Olympic doping projects.

The same guys were working on both projects which is all but impossible. (Do we really know if they’re even Russians?)

Apelbaum argues –

The fact that the three had multiple concurrent high impact and high visibility project assignments is odd because this is not how typical offensive cyber intelligence teams operate. These units tend to be compartmentalized, they are assigned to a specific mission, and the taskforce stays together for the entire duration of the project.

Next Apelbaum questioned the Mueller gang’s assertion that the ‘hacker’ named Guccifer 2.0 was a Russian –

Any evidence that Guccifer 2.0 is Russian should be evaluated while keeping these points in mind:

  1. He used a Russian VPN service to cloak his IP address, but did not use TOR. Using a proxy to conduct cyber operations is a SOP [Standard Operating Procedure] in all intelligence and LEA [Law Enforcement Agency] agencies. [i.e. Russia would have masked their VPN service]

  2. He used the AOL email service that captured and forwarded his IP address and the same AOL email to contact various media outlets on the same day of the attack. This is so overt and amateurish that its unlikely to be a mistake and seems like a deliberate attempt to leave traceable breadcrumbs.

  3. He named his Office User account Феликс Эдмундович (Felix Dzerzhinsky), after the founder of the Soviet Secret Police. Devices and accounts used in offensive cyberspace operations use random names to prevent tractability and identification. Why would anyone in the GRU use this pseudonym (beside the obvious reason) is beyond comprehension.

  4. He copied the original Trump opposition research document and pasted it into a new .dotm template (with an editing time of about 2 minutes). This resulted in a change of the “Last Modified by” field from “Warren Flood” to “Феликс Эдмундович” and the creation of additional Russian metadata in the document. Why waste the time and effort doing this?

  5. About 4 hours after creating the ‘Russian’ version of the document, he exported it to a PDF using LibreOffice 4.2 (in the process he lost/removed about 20 of the original pages). This was most likely done to show additional ‘Russian fingerprints’ in the form of broken hyperlink error messages in Russian (Images 4 and 5). Why bother with re-formatting and converting the source documents? Why not just get the raw data out in the original format ASAP?

Apelbaum next discusses Guccifer 2.0 –

In June 21, 2016, Lorenzo Franceschi-Bicchierai from Vice Motherboard interviewed a person who identified himself as “Guccifer 2.0”. During their on-line chat session, the individual claimed that he was Romanian (see transcript of the interview below). His poor Romanian language skills were later used to unmask his Russian identify.

…I’m not a scientific linguist nor do I even know where to find one if my life depended on it, but I’m certain that you can’t reliably determine nationality based on someone impersonating another language or from the use of fake metadata in files. This elaborate theory also has the obvious flaw of assuming that the Russian intelligence services are dumb enough to show up to an interview posing as Romanians without actually being able to read and write flaunt Romanian.

After providing a couple more examples of why the Russian story doesn’t stick, Apelbaum closes with this –

The bottom line is that if we want to go beyond the speculative trivia, the pseudo science, and the bombastic unverified claims, we have to ask the real tough questions, mainly: is Guccifer 2.0 even the real attacker and how did he circumvent all of the logs during several weeks of repeated visits while downloading close to 2 GB of data?

According to The Federalist:

While it has been known since Sussmann’s indictment dropped in September 2021 that the Georgia Tech researchers had allegedly reviewed the Alfa Bank data and one of the white papers Sussmann provided to the FBI, there was previously no known connection to the government’s investigation into the DNC hack. However, one email contained in a cache of documents obtained on March 9 from Georgia Tech pursuant to a Right-To-Know request reveals Antonakakis’ involvement in the investigation into the hack of the DNC…

…Antonakakis reviewed the Alfa Bank white paper Hillary Clinton’s campaign lawyer later allegedly provided to the FBI in an effort to implicate Trump in a Russia conspiracy. This same man professes that data-driven scientific attribution is politically unbiased—even though Antonakakis believed “a DNS expert would poke several holes” in the hypothesis underlying the white paper given the government…

… The public storyline until now had been that CrowdStrike, the cybersecurity firm Sussmann hired in April 2016, had concluded Russians had hacked the DNC server, and that the FBI, which never examined the server, concurred in that conclusion. Intelligence agencies and former Special Counsel Robert Mueller likewise concluded that Russian agents were behind the DNC hack, but with little public details provided.

It now appears that DARPA had some role in that assessment, or rather Antonakakis did on behalf of DARPA, which leads to a whole host of other questions, including whether DARPA had access to the DNC server and data and, if so, from whom did the DOD’s research arm get that access? Was it Sussmann?

Most intriguingly, why is Special Counsel Durham concerned with the DARPA connection and the DNC hack or hacker in the first place?

Please consider becoming a $10 a month donor. 

(Donate HERE)

About The Author

Jim Hoft

Jim Hoft is the founder and editor of The Gateway Pundit, one of the top conservative news outlets in America. Jim was awarded the Reed Irvine Accuracy in Media Award in 2013 and is the proud recipient of the Breitbart Award for Excellence in Online Journalism from the Americans for Prosperity Foundation in May 2016.

Stillness in the Storm Editor: Why did we post this?

The news is important to all people because it is where we come to know new things about the world, which leads to the development of more life goals that lead to life wisdom. The news also serves as a social connection tool, as we tend to relate to those who know about and believe the things we do. With the power of an open truth-seeking mind in hand, the individual can grow wise and the collective can prosper.

– Justin

Not sure how to make sense of this? Want to learn how to discern like a pro? Read this essential guide to discernment, analysis of claims, and understanding the truth in a world of deception: 4 Key Steps of Discernment – Advanced Truth-Seeking Tools.


Stillness in the Storm Editor’s note: Did you find a spelling error or grammatical mistake? Send an email to [email protected], with the error and suggested correction, along with the headline and url. Do you think this article needs an update? Or do you just have some feedback? Send us an email at [email protected]. Thank you for reading.

Source:

https://www.thegatewaypundit.com/2022/03/special-prosecutor-john-durham-reportedly-investigating-2016-dnc-phantom-server-hack/

Featured Image

DIRECT DONATION

Support our work! (Avoid Big Tech PayPal and Patreon)

Filed Under: News, Politics Tagged With: dnc, John Durham, news, Phantom Server, Special Prosecutor, The Gateway Pundit, video

Notices and Disclaimers

We need $2000 per month to pay our costs. Help us one time or recurring. (DONATE HERE)

To sign up for RSS updates, paste this link (https://stillnessinthestorm.com/feed/) into the search field of your preferred RSS Reader or Service (such as Feedly or gReader).

Subscribe to Stillness in the Storm Newsletter

“It is the mark of an educated mind to be able to entertain a thought without accepting it.” – Aristotle

This website is supported by readers like you.

If you find our work of value, consider making a donation. 

Stillness in the Storm DISCLAIMER: All articles, videos, statements, claims, views and opinions that appear anywhere on this site, whether stated as theories or absolute facts, are always presented by Stillness in the Storm as unverified—and should be personally fact checked and discerned by you, the reader. Any opinions or statements herein presented are not necessarily promoted, endorsed, or agreed to by Stillness, those who work with Stillness, or those who read Stillness. Any belief or conclusion gleaned from content on this site is solely the responsibility of you the reader to substantiate, fact check, and no harm comes to you or those around you. And any actions taken by those who read material on this site is solely the responsibility of the acting party. You are encouraged to think carefully and do your own research. Nothing on this site is meant to be believed without question or personal appraisal.

Content Disclaimer: All content on this site marked with “source – [enter website name and url]” is not owned by Stillness in the Storm. All content on this site that is not originally written, created, or posted as original, is owned by the original content creators, who retain exclusive jurisdiction of all intellectual property rights. Any copyrighted material on this site was shared in good faith, under fair use or creative commons. Any request to remove copyrighted material will be honored, provided proof of ownership is rendered. Send takedown requests to [email protected].

What is our mission? Why do we post what we do?

Our mission here is to curate (share) articles and information that we feel is important for the evolution of consciousness. Most of that information is written or produced by other people and organizations, which means it does not represent our views or opinions as managing staff of Stillness in the Storm. Some of the content is written by one of our writers and is clearly marked accordingly. Just because we share a CNN story that speaks badly about the President doesn’t mean we’re promoting anti-POTUS views. We’re reporting on the fact as it was reported, and that this event is important for us to know so we can better contend with the challenges of gaining freedom and prosperity. Similarly, just because we share a pro/anti-[insert issue or topic] content, such as a pro-second amendment piece or an anti-military video doesn’t mean we endorse what is said. Again, information is shared on this site for the purpose of evolving consciousness. In our opinion, consciousness evolves through the process of accumulating knowledge of the truth and contemplating that knowledge to distill wisdom and improve life by discovering and incorporating holistic values. Thus, sharing information from many different sources, with many different perspectives is the best way to maximize evolution. What’s more, the mastery of mind and discernment doesn’t occur in a vacuum, it is much like the immune system, it needs regular exposure to new things to stay healthy and strong. If you have any questions as to our mission or methods please reach out to us at [email protected].

Reader Interactions

Comments

  1. Nolan Parker says

    Wednesday, May 18, 2022 at 12:45

    Here,let me Help YEW,, the data transfer Rate was Too High for the Hack to have been from outside. The only way to move data that quickly is to be Sitting at the Terminal.
    Seth Rich was watching the same show I was. Others got more votes, but Hillary got either More delegates or Super Delegates.. And he was pissed.
    The victim of a violent robbery was delivered to the hospital with All of his possessions.
    You can Do the math.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Search Our Archives

FUNDRAISER!

Latest Videos

Guarding Against Bio Tech and EMF - Fix The World Project | Just In Stillness

From around the web

News “they” don’t want you to see

Newsletter

You can unsubscribe anytime. For more details, review our Privacy Policy.

Thank you!

You have successfully joined our subscriber list.

.

We Need Your Support

Support our work!

Weekly Newsletter Sign UP

Only want to see emails once a week? Sign up for the Weekly Newsletter here: SIGN UP. (Make sure you send an email to [email protected] to confirm the change or it won’t work).

Latest Videos

Footer

  • Menus
  • Internship Program
  • RSS
  • Social Media
  • Media
  • Privacy Policy

Copyright © 2026 · Privacy Policy · Log in · Built by

This website wouldn't be the same without the ethical web hosting provided by Modern Masters. Modern Masters ethically serves small businesses in metaphysical, paranormal, healing, spirituality, homesteading, acupuncture and other related fields. Get the perfect website for your sacred work at Modern Masters.