Twitter | Search | |
Adam Carter
Just a bunch of other random things that have served as hints or stuck out as anomalies.
Reply Retweet Like More
Kim Dong-LOL Jun 21
Replying to @with_integrity
Why does no one listen to your evidence?
Reply Retweet Like
Adam Carter Jun 23
Replying to @KimDongLOL
6 months ago, I thought CS were beyond all suspicion,. So, I suspect on the surface, my findings have probably seemed outlandish to some.
Reply Retweet Like
outsh1ned Jun 23
They're just uninformed. Why are you suggesting Crowdstrike are suspect in relation to G2? They didn't tie him to anything, he did...
Reply Retweet Like
outsh1ned Jun 23
..and CS were only relevant to 1 if 13 targets G2 had hacked emails for. A different firm exposed the other 12. Your conspiracy doesn't work
Reply Retweet Like
Kim Dong-LOL Jun 23
Doesn't preclude it being a misdirection in damage control of whistleblower leak to
Reply Retweet Like
Adam Carter Jun 23
Replying to @outsh1ned @KimDongLOL
Which 13 targets are these?
Reply Retweet Like
Adam Carter Jun 23
Replying to @outsh1ned @KimDongLOL
Because they had access to the network, made specious/conflicting claims, avoided giving FBI access & didn't make disk images... and...
Reply Retweet Like
outsh1ned Jun 23
All 12 in DCleaks was found in the APT28 phishing campaign analysed by ESET.
Reply Retweet Like
outsh1ned Jun 23
13th was Podesta. Which passed to Wikileaks instead was enough to baffle you about where other 1/13th of these hacks came from or it wasn't
Reply Retweet Like
outsh1ned Jun 23
None of that would help them influence the part where G2 has all the non-DNC staff emails. Why reference CS/Seth if they're not the answer?
Reply Retweet Like
outsh1ned Jun 23
Your G2 theories can't participate in same 'OMG Seth' BS everyone else is because that relies on pretending only DNC exists and G2 doesn't.
Reply Retweet Like