The Anatomy of Public Corruption

Showing posts with label The Russia Files. Show all posts
Showing posts with label The Russia Files. Show all posts

Greedy CEOs also working with Russians

Share:

Dubious friends of Donald Trump: the Russians


Responsive Embed

Create a responsive video and scale it nicely to the parent element with an 16:9 aspect ratio

Hello, world!

This is a template for a simple marketing or informational website. It includes a large callout called the hero unit and three supporting pieces of content. Use it as a starting point to create something more unique.
Learn more
Bootstrap Thumbnail First
Card title
Cras justo odio, dapibus ac facilisis in, egestas eget quam. Donec id elit non mi porta gravida at eget metus. Nullam id dolor id nibh ultricies vehicula ut id elit.
Action Action
Bootstrap Thumbnail Second
Card title
Cras justo odio, dapibus ac facilisis in, egestas eget quam. Donec id elit non mi porta gravida at eget metus. Nullam id dolor id nibh ultricies vehicula ut id elit.
Action Action
Bootstrap Thumbnail Third
Card title
Cras justo odio, dapibus ac facilisis in, egestas eget quam. Donec id elit non mi porta gravida at eget metus. Nullam id dolor id nibh ultricies vehicula ut id elit.
Action Action
Share:

Molly's Game and the Russian Mafia near the World Poker Tour Murders of Ernie Scherer Jr. and his wife

Molly's Game 

Connecting Russians to the murders near the 2007 World Poker Tour games 

 

Share:

How The Russian Mafia used H-1b visas to penetrate Corporate America connect to Mormon Murders

Vadim Trincher ~ World Poker Tournaments 

The Big Winner likely had help -


col-3
col-9
c
Share:

The Contra Costa Story - Murders, Arson, Fires, Witness Killings and Racketeering

Connecting A long List of Murders to the Bribery Scandal

The Dubious Phone Call and Time Wasting Project
The folks at TPG will have to answer to my Whistleblower Complaints on the truly odd collection of RFPs emanating from companies connected to Richard Blum, William McGlashan, CBRE, Regency Centers, Trammel Crow, Lennar, Catellus.

My story is about witness murders, private equity, mergers and acquisitions linked back to the Matter of Bennett v. Southern Pacific lost in 1989.  It was a winnable case as long the witnesses testified.  


Card image

Ken Salazar

Former Colorado State Attorney General, jurisdiction over the JonBenet Ramsey investigation, Former interior Secretary of the Interior under Clinton but the worst best part is he was in charge of Hillary Clinton's Transistion team. That process is reserved for the winners. Losers go home.
See Profile

Card image

FBI Agent Frank Doyle Jr.

Head West Bomb School operated by the San Francisco FBI, same FBI Agent connected to shootings at Mainframe Designs owned by Pete Bennett. Arrived during Bennett v. Southern Pacific in 1989. Bennett was honored to the Head of the FBI Bomb School, trainer of the Walnut Creek Bomb to investigate several attempts on Bennett's life that began in the 80s, all the way up to 2018. Hell Yeah!
See Profile

Card image

Card image

CHP Officer Youngstrom

Officer Kenyon Youngstrom is one of many officers murdered in the invetigations around Bennett. We met several times in a Walnut Creek Starbucks. I met friends of Chris Lacey when released from jail in Butte County. They said no way, he was a pawn in a H-1b visa interview and perfectly positioned to be 680, pulled over and then Youngstrom took over the stop. This was a fatal offcer mistake there was a sniper on the hill above the stop.
See Profile


Card image

Vadim Trincher

Arrested in connection the Russian Money Laundering scandal that unfolded in the Trump Towers. Prosecutred by Southern District of New York DA Preet Baharra
See Profile
Card image
Card image

Love Lafayette?

The City of Lafayette is good hands today but a July 2011 attempt vehicular homicide on Bennett's life remains an open investigation.
See Profile



Card image

Alicia Driscoll and Jineva

Found murdered in June 2005 labeled murder suicide, was friends with Pete Bennett, called with can you and your boys come over for backyard picnic? She never called
See Profile



Card image

The Strack Family

The dubious murder suicide connected to a trust forgery, connected to Pete Bennett with numerous murder suucide victims near him.
See Profile


Card image

Chris Wenzel

The Council of Thiefs, TPG Growth
See Profile
Card image

The Mormon Card

The Secret Service Listened
See Profile
Card image

CEO Steve Burd

Learn About Mainframe Designs Cabinets & Fixtures and murdered employees
See Profile


Card image

William McGlashan

CEO of TGP Growth Indicted
See Profile


Card image

Richard Stanford Kopf

General Counsel of Southern Pacific and Fremoont Group
See Profile




Card image

The Howard Twins

Born and Raised in Danville, Torched in Danville, Tortured in Danville, Defrauded
See Profile



Card image

Attorney John Nejedly

The Nice Guy ! Born and Raised in Walnut Cree, Candidate in Danville, College Trustee, Liked Peets Coffee, dubious fate to the butter end.
See Profile



Card image

DA Mark Peterson

Overlord of dead witnesess forcing Pete Bennett to lose millions.
See Profile

Card image

DA Mark Peterson

Overlord of dead witnesess forcing Pete Bennett to lose millions.
See Profile
xxxx12
Share:

Columbus Nova - A Muellerized Russian Prawn for the unfounded facts of Justice

Connecting Success Factors to Bennett

The Dubious Phone Call and Time Wasting Project
The folks at TPG will have to answer to my Whistleblower Complaints on the truly odd collection of RFPs emanating from companies connected to Richard Blum, William McGlashan, CBRE, Regency Centers, Trammell Crow, Lennar, Catellus.

My story is about witness murders, private equity, mergers and acquisitions linked back to the Matter of Bennett v. Southern Pacific lost in 1989.  It was a winnable case as long the witnesses testified.  
xxxx2
Columbus Nova Statement In Response to Inaccurate Media Reports

Columbus Nova is an investment management company solely owned and controlled by Americans. After the inauguration, the firm hired Michael Cohen as a business consultant regarding potential sources of capital and potential investments in real estate and other ventures. Reports that Viktor Vekselberg used Columbus Nova as a conduit for payments to Michael Cohen are false. The claim that Viktor Vekselberg was involved or provided any funding for Columbus Nova's engagement of Michael Cohen is patently untrue. Neither Viktor Vekselberg nor anyone else outside of Columbus Nova was involved in the decision to hire Cohen or provided funding for his engagement.

Additionally, contrary to recent reports, Columbus Nova LLC and Renova U.S. Management, LLC (operated under the Columbus Nova umbrella) are not now, nor have ever been, owned by any foreign entity or person. In fact, since its founding nearly 20 years ago, Columbus Nova has been and continues to be 100% owned by Americans.

As reported in May 2018 by The New York Times, the Renova Group is Columbus Nova’s biggest client. When Columbus Nova formed a management company under the name Renova U.S. Management, its largest client at the time was a Renova Group company. Throughout its existence, Columbus Nova has managed assets on behalf of Renova Group companies and other clients. Columbus Nova itself is not now, and has never been, owned by any foreign entity or person including Viktor Vekselberg or the Renova Group. The same is true with regard to all investment management companies under the Columbus Nova umbrella.
xxxx12
Share:

The Trump Tower Russian mafia scandal and the paradise campfire

The Hacking Stories

No Police Report

Card image cap

Pete Bennett purchased BLU Phone from Fry's Electronics in Concord California (Closed) and sim card for T-mobile prepaid. The phone didn't last long but during usage Bennett experienced strange issues with volume, unusual bursts of latentcy with moments of freezing, page lock severe volumne issues.

Trump Fires

Between my PG & E story 8 maybe 9 years in the making connected to the theft of 20, 000 pages of sensitive PG & E documents that would be like things like Maps, elevations of Pipelines, locations of main point of entries mpoe

In 2011 while heading to Hillside Covenant Church with my son I was I was arrested for child support out of Butte County.

I was assured that when they took my car and my laptop that everything would be okay, I I went to jail for 2 days when I was released and my son was gone.

It's been 7 years and 5 7 yea d
Share:

The Russian Breach of AT&T Managed Contracts to Federal Government

AT&T Lines



While calling FERC.gov, House Whistleblower, Benghazi Committee and other agencies I kept noticing issues with the calls.  One afternoon I hung, rebooted where I discovered my phone had been temporarily attached to switches which accidently reformatted my calls.


This occurred between April 2016 and July 2016 - the phone was stolen like everything else.  . 

















AT&T : Federal Contracts Awarded by Federal Agencies in Oklahoma (Sept. 5)

share with twitter share with LinkedIn share with facebook
share via e-mail
0
09/05/2018 | 02:36pm EDT

WASHINGTON, Sept. 5 -- The following federal contracts were announced by federal agencies based in Oklahoma.
***
MILITARY $185,993 Federal Contract Awarded to AT&T
TINKER AIR FORCE BASE, Oklahoma, Sept. 5 -- Southwestern Bell Telephone Co. dba AT&T, Dallas, Texas, won a $185,993 federal contract from the U.S. Air Force Space Command for local telecommunications services for McConnell AFB, Kansas.
Agency contact: Julie A. Cody, 405/734-7586, julie.cody@us.af.mil. CLASSD; NAICS517311.
***
MILITARY $128,204 Federal Contract Awarded to Tanager Telecommunications
TINKER AIR FORCE BASE, Oklahoma, Sept. 4 -- Tanager Telecommunications LLC, Stevenson, Washington, won a $128,204 federal contract from the U.S. Air Force Space Command for local telecommunications services for the Portland Air National Guard in Oregon.
Agency contacts: Katie B. Cockerill, katie.cockerill@us.af.mil; or Richard A. Weber, 405/734-9907, richard.weber.11@us.af.mil. CLASSD; NAICS517311.
***
MILITARY $27,500 Federal Contract Awarded to Lobo Ventures
TINKER AIR FORCE BASE, Oklahoma, Sept. 5 -- Lobo Ventures Ltd., San Antonio, Texas, won a $27,500 federal contract from the Defense Logistics Agency for fluid passage bolts.
Agency contact: Teresa Merhout, 804/279-5591, teresa.merhout@dla.mil. CLASS47; NAICS332996.
***
MILITARY $16,413 Federal Contract Awarded to Honeywell International
TINKER AIR FORCE BASE, Oklahoma, Sept. 4 -- Honeywell International Inc., South Bend, Indiana, won a $16,413 federal contract from the U.S. Air Force Materiel Command for mechanical power transmission equipment.
Agency contact: James Headington, 405/734-1984, james.headington.1@us.af.mil. CLASS30; NAICS336412.


TARGETED NEWS SERVICE: Myron Struck, editor; 703/304-1897; editor@targetednews.com; https://targetednews.com
© 2018 Targeted News Service, source News Service


Share:

USDOJ: Russian-American Organized Crime Enterprise Operating International Sportsbook That Laundered More Than $100 Million

The Russian and Chinese Hackers

Pete Bennett is former programmer for PG&E, Bank of America, Wells Fargo Bank and AT&T
He is unpaid for a series of projects linked to 9/11, PG&E San Bruno and 20,000 pages of PG&E documents consisting of detailed maps, sub station, gas transmission, fiber optic entry points but most important enough detail to kill millions.

The #campfire was a warm up. Stock up water, food and be prepared for the energy disruption event of your lifecycle.




U.S. Attorney's Office
Southern District of New York
(212) 637-2600

April 30, 2014
Two Defendants Sentenced for Participating in Racketeering Conspiracy with Russian-American Organized Crime Enterprise Operating International Sportsbook That Laundered More Than $100 Million

Preet Bharara, the United States Attorney for the Southern District of New York, announced that ANATOLY GOLUBCHIK was sentenced yesterday in Manhattan federal court to five years in prison, and VADIM TRINCHER was also sentenced today to five years in prison for participating in a racketeering conspiracy in connection with their roles as members of a Russian-American organized crime enterprise. GOLUBCHIK and TRINCHER were also each ordered to forfeit more than $20 million in cash, investments, and real property. They were charged in April 2013 along with 32 other alleged members and associates of two Russian-American organized crime enterprises in an indictment that included racketeering, money laundering, extortion, and various gambling offenses. GOLUBCHIK and TRINCHER were sentenced by U.S. District Judge Jesse M. Furman.
Manhattan U.S. Attorney Preet Bharara said: “The sentences meted out to Anatoly Golubchik and Vadim Trincher are just and appropriate penalties for the roles the defendants played in this far-reaching, Russian-American organized crime ring. I’d like to thank the Federal Bureau of Investigation, the New York City Police Department, and the Internal Revenue Service for their tireless efforts in working to ensure that the members of this underground enterprise were held to account for their crimes.”
According to the indictment, other documents filed in Manhattan federal court, and statements made at various proceedings in this case, including today’s sentencing:
The Taiwanchik-Trincher Organization (the “Organization”) was a criminal enterprise with strong ties to Russia and Ukraine. The enterprise operated a high-stakes, illegal sports gambling business out of New York City that catered primarily to Russian oligarchs living in Ukraine and Russia. GOLUBCHIK and TRINCHER were U.S.-based participants in the enterprise. GOLUBCHIK and TRINCHER booked sports bets that reached into the millions of dollars and laundered the proceeds of the Organization’s international sportsbook. Between 2006 and April 2012, the enterprise laundered approximately $100 million in proceeds from their gambling operation in Russia and Ukraine through shell companies and bank accounts in Cyprus; and of this $100 million, approximately $50 million was subsequently sent from Cyprus into the United States. Once the money had been transferred to the United States, it was either laundered through additional shell companies or invested in legitimate investments, such as hedge funds and real estate.
The Taiwanchik-Trincher Organization operated under the protection of Alimzhan Tokhtakhounov, who is known as a “Vor,” a term translated as “Thief-in-Law,” that refers to a member of a select group of high-level criminals from the former Soviet Union. Tokhtakhounov used his status as a Vor to resolve disputes with clients of the high-stakes illegal gambling operation with implicit and sometimes explicit threats of violence and economic harm. Between December 2011 and February 2013, Tokhtakhounov was paid at least approximately $12 million for his services by the Taiwanchik-Trincher Organization. Tokhtakhounov is also under indictment in the Southern District of New York for his alleged involvement in bribing officials at the 2002 Winter Olympics held in Salt Lake City, Utah. Tokhtakhounov is a fugitive and is still being sought.
***
Twenty-eight defendants in this case have pled guilty and two have entered into deferred prosecution agreements. The defendants who have pled to date have agreed to forfeit, in total, more than $68 million. The following defendants have pled guilty, and have been sentenced or await sentencing:
  • Bryan Zuriff pled guilty to gambling charges on July 26, 2013, and was sentenced on November 25, 2013.
  • William Barbalat pled guilty to gambling charges on August 14, 2013, and was sentenced on December 16, 2013.
  • Kirill Rapoport pled guilty to gambling charges on August 16, 2013, and was sentenced on December 19, 2014.
  • Edwin Ting and Justin Smith pled guilty to gambling charges on September 4, 2013, and were sentenced on January 21, 2014, and January 6, 2014, respectively.
  • Dmitry Druzhinsky and David Aaron pled guilty to gambling charges on October 4, 2013, and were sentenced on April 18, 2014, and February 14, 2014, respectively.
  • Alexander Zaverukha pled guilty to gambling charges on October 10, 2013, and is scheduled to be sentenced on May 1, 2014.
  • Nicholas Hirsch pled guilty to conspiring to commit wire fraud on October 16, 2013, and was sentenced on February 25, 2014.
  • Anatoly Shteyngrob pled guilty to conspiring to commit money laundering on October 17, 2013, and is scheduled to be sentenced on June 10, 2014.
  • Yugeshwar Rajkumar pled guilty to gambling charges on October 18, 2013, and was sentenced on March 25, 2014.
  • Stan Greenberg pled guilty to conspiring to commit racketeering on October 22, 2013, and is scheduled to be sentenced on May 2, 2014.
  • Arthur Azen pled guilty to conspiring to commit money laundering and conspiring to collect extensions of credit by extortionate means on November 5, 2013, and was sentenced on April 9, 2014.
  • Hillel Nahmad pled guilty to gambling charges on November 12, 2013, and was sentenced on April 30, 2014.
  • Vadim Trincher pled guilty to conspiring to commit racketeering on November 14, 2013, and was sentenced on April 30, 2014.
  • Eugene Trincher pled guilty to gambling charges on November 14, 2013, and is scheduled to be sentenced on June 9, 2014.
  • Anatoly Golubchik pled guilty to conspiring to commit racketeering on November 15, 2013, and was sentenced on April 29, 2014.
  • Illya Trincher pled guilty to gambling charges on November 15, 2013, and is scheduled to be sentenced on May 8, 2014.
  • Ronald Uy pled guilty to structuring financial transactions on November 25, 2013, and was sentenced on March 27, 2014.
  • Moshe Oratz pled guilty to gambling charges on December 3, 2013, and was sentenced on April 9, 2014.
  • Michael Sall pled guilty to interstate travel in aid of an unlawful activity (illegal gambling) and Jonathan Hirsch pled guilty to gambling charges on December 4, 2013. Sall was sentenced on April 18, 2014, and Hirsch is scheduled to be sentenced on May 9, 2014.
  • Noah Siegel pled guilty to gambling charges on December 5, 2013, and was sentenced on April 10, 2014.
  • Molly Bloom pled guilty to gambling charges on December 12, 2013, and is scheduled to be sentenced on May 2, 2014.
  • Alexander Katchaloff pled guilty to gambling charges on January 16, 2014, and is scheduled to be sentenced on May 20, 2014.
  • Donald McCalmont, John Jarekci, a/k/a “John Hanson,” and Abraham Mosseri pled guilty to making a fraudulent tax statement, to failing to file a tax return, and causing a financial institution to participate in a lottery related matter, respectively, on January 24, 2014, and are scheduled to be sentenced on May 29, 2014, May 28, 2014, and May 21, 2014, respectively.
  • William Edler and Peter Feldman entered into deferred prosecution agreements on April 11, 2014.
Mr. Bharara praised the investigative work of the Federal Bureau of Investigation, the New York City Police Department, and the Internal Revenue Service.
The case is being prosecuted by the Office’s Violent and Organized Crime Unit. Assistant U.S. Attorneys Harris M. Fischman, Joshua A. Naftalis, Peter J. Skinner, and Kristy J. Greenberg of the Violent and Organized Crime Unit are in charge of the prosecution. Assistant
U.S. Attorney Alexander Wilson of the Office’s Money Laundering and Asset Forfeiture Unit is responsible for the forfeiture aspects of the case.
This content has been reproduced from its original source .
Share:

The Scherer Murders and Russian Mob of Trump Towers

Story Pending
Pete Bennett | Twitter | F: petercbennett LI: petercbennett




A little snippet.  The timing of the Scherer Murders leads to the Mormon Community.  The involved Mormon units are Mitt Romney, Danville Stake, The Oakland Temple and millions stolen.



Share:

Sources: FBI investigation continues into 'odd' computer link between Russian bank and Trump Organization


Sources: FBI investigation continues into 'odd' computer link between Russian bank and Trump Organization




(CNN)Federal investigators and computer scientists continue to examine whether there was a computer server connection between the Trump Organization and a Russian bank, sources close to the investigation tell CNN.
Questions about the possible connection were widely dismissed four months ago. But the FBI's investigation remains open, the sources said, and is in the hands of the FBI's counterintelligence team -- the same one looking into Russia's suspected interference in the 2016 election.
One U.S. official said investigators find the server relationship "odd" and are not ignoring it. But the official said there is still more work for the FBI to do. Investigators have not yet determined whether a connection would be significant.
The server issue surfaced again this weekend, mentioned in a Breitbart article that, according to a White House official, sparked President Trump's series of tweets accusing investigators of tapping his phone.
CNN is told there was no Foreign Intelligence Surveillance Act warrant on the server.
The FBI declined to comment. The White House did not respond to a request for comment.
In addition, companies involved have provided CNN with new explanations that at times conflict with each other and still don't fully explain what happened.
The story -- of a possible connection between computer servers -- is a strange tale because there are no specific allegations of wrongdoing and only vague technical evidence.
Internet data shows that last summer, a computer server owned by Russia-based Alfa Bank repeatedly looked up the contact information for a computer server being used by the Trump Organization -- far more than other companies did, representing 80% of all lookups to the Trump server.
It's unclear if the Trump Organization server itself did anything in return. No one has produced evidence that the servers actually communicated.
Slate and The New York Times were first to report the unusual server activity.
The Times said the FBI had concluded there could be an "innocuous explanation." And cybersecurity experts told CNN this isn't how two entities would communicate if they wanted to keep things secret.
But for those who have studied the data, the activity could suggest an intent to communicate by email during a period of time when ties between the Trump Organization and Russia are being closely scrutinized because of Russia's alleged involvement in hacking the emails of the Democratic National Committee and Hillary Clinton campaign chief John Podesta.
This issue intrigued a dozen computer researchers at a recent business conference in Washington, D.C. that pulled together the world's top network operators, the ones who help run the internet. To them, it's a strange coincidence that merits further scrutiny.
Another computer researcher, Richard Clayton of Cambridge University, said it's just plain weird.
"It's not so much a smoking gun as a faint whiff of smoke a long way away. Maybe there's something else going on. It's hard to tell," said Clayton, who has independently examined the scant evidence available.
What is known:
Last year, a small group of computer scientists obtained internet traffic records from the complex system that serves as the internet's phone book. Access to these records is reserved for highly trusted cybersecurity firms and companies that provide this lookup service.
These signals were captured as they traveled along the internet's Domain Name System (DNS).
These leaked records show that Alfa Bank servers repeatedly looked up the unique internet address of a particular Trump Organization computer server in the United States.
In the computer world, it's the equivalent of looking up someone's phone number -- over and over again. While there isn't necessarily a phone call, it usually indicates an intention to communicate, according to several computer scientists.
What puzzled them was why a Russian bank was repeatedly looking up the contact information for mail1.trump-email.com.
Publicly available internet records show that address, which was registered to the Trump Organization, points to an IP address that lives on an otherwise dull machine operated by a company in the tiny rural town of Lititz, Pennsylvania.
From May 4 until September 23, the Russian bank looked up the address to this Trump corporate server 2,820 times -- more lookups than the Trump server received from any other source.
As noted, Alfa Bank alone represents 80% of the lookups, according to these leaked internet records.
Far back in second place, with 714 such lookups, was a company called Spectrum Health.
Spectrum is a medical facility chain led by Dick DeVos, the husband of Betsy DeVos, who was appointed by Trump as U.S. education secretary.
Together, Alfa and Spectrum accounted for 99% of the lookups.
This server behavior alarmed one computer expert who had privileged access to this technical information last year. That person, who remains anonymous and goes by the moniker "Tea Leaves," obtained this information from internet traffic meant to remain private. It is unclear where Tea Leaves worked or how Tea Leaves obtained access to the information.
Tea Leaves gave that data to a small band of computer scientists who joined forces to examine it, several members of that group told CNN, which has also reviewed the data.
Possible explanations
The corporations involved have different theories to explain the server activity. But they haven't provided proof -- and they don't agree.
Alfa Bank has maintained that the most likely explanation is that the server communication was the result of spam marketing. Bank executives have stayed at Trump hotels, so it's possible they got subsequent spam marketing emails from the Trump Organization. Those emails might have set off defensive cybersecurity measures at the bank, whose servers would respond with a cautious DNS lookup. Alfa Bank said it used antispam software from Trend Micro, whose tools would do a DNS lookup to know the source of the spam.
Alfa Bank said it brought U.S. cybersecurity firm Mandiant to Moscow to investigate. Mandiant had a "working hypothesis" that the activity was "caused by email marketing/spam" on the Trump server's end, according to representatives for Alfa Bank and Mandiant. The private investigation is now over, Alfa Bank said.
Computer scientists agree that such an explanation is possible in theory. But they want to see evidence.
Alfa Bank and Mandiant could not point to marketing emails from the time period in question. "Mandiant has found evidence of an old marketing campaign, which... is too old to be relevant," Alfa Bank said in a statement.
CNN reached out to the Trump Organization with detailed technical questions but has not received answers.
Cendyn is the contractor that once operated marketing software on that Trump email domain. In February, it provided CNN a Trump Organization statement that called the internet records "incomplete" and stressed that they do not show any signs of "two-way email communication." That statement lends credibility to the spam marketing theory, because it says the Trump server was set up in 2010 to deliver promotional marketing emails for Trump Hotels. But Cendyn acknowledged that the last marketing email it delivered for Trump's corporation was sent in March 2016, "well before the date range in question."
Spectrum Health told CNN it "did find a small number of incoming spam marketing emails" from "Cendyn, advertising Trump Hotels." But it pointed to emails sent in 2015, long before the May-through-September 2016 time period examined by scientists. Spectrum Health said that it "has not been contacted by the FBI or any government agency on this matter."
Having the Trump Organization server set up for marketing also doesn't explain why Alfa Bank and Spectrum would stand out so much.
"If it were spam, then a lot of other organizations would be doing DNS lookups. There would be evidence of widespread connectivity with devices," said L. Jean Camp, a computer scientist at Indiana University who has studied the data.
Cendyn has also provided another possible explanation, suggesting a highly technical case of mistaken identity.
Cendyn routinely repurposes computer servers -- like the one used by the Trump Organization.
Cendyn's software, like its event planning tool Metron, sends email and thus relies on the 20 different email servers rented by the company. After "a thorough network analysis," Cendyn has said that it found a bank client had used Metron to communicate with AlfaBank.com.
But Alfa Bank starkly denies "any dealings with Cendyn." And, it says, it's unlikely that it received any emails from that server. "Mandiant investigated 12 months of email archives and it found no emails to or from any of the IP addresses given to us by the media."
On Wednesday, Cendyn provided another explanation to CNN. Cendyn claims the Trump Hotel Collection ditched Cendyn and went with another email marketing company, the German firm Serenata, in March 2016. Cendyn said it "transferred back to" Trump's company the mail1.trump-email.com domain.
Serenata this week told CNN it was indeed hired by Trump Hotels, but it "never has operated or made use of" the domain in question: mail1.trump-email.com.
Upon hearing that Cendyn gave up control of the Trump email domain, Camp, said: "That does not make any sense to me at all. The more confusing this is, the more I think we need an investigation."
Other computer experts said there could be additional lookups that weren't captured by the original leak. That could mean that Alfa's presence isn't as dominant as it seems. But Dyn, which has a major presence on the internet's domain name system, spotted only two such lookups — from the Netherlands on August 15.
Alfa Bank insists that it has no connections to Trump. In a statement to CNN, Alfa Bank said neither it, bank cofounder Mikhail Fridman and bank president Petr Aven "have had any contact with Mr. Trump or his organizations. Fridman and Aven have never met Mr. Trump nor have they or Alfa Bank had any business dealings with him. Neither Alfa Bank nor its officers have sent Mr. Trump or his organization any emails, information or money. Alfa Bank does not have and has never had any special or exclusive internet connection with Mr. Trump or his entities."
Scientists now silent
The bank told CNN it is now trying to identify the person or entity who disseminated this internet traffic. "We believe that DNS traffic in mainland Europe was deliberately captured - in a manner that is unethical and possibly illegal -- in order to manufacture the deceit," it said.
Fear has now silenced several of the computer scientists who first analyzed the data.
Tea Leaves refused to be interviewed by CNN and is now "hiding under a rock," according to an intermediary contact.
Paul Vixie, who helped design the very DNS system the internet uses today, was quoted in the Slate story saying that Alfa Bank and the Trump Organization "were communicating in a secretive fashion." Vixie declined to go on the record with CNN.
Even the skeptics have unanswered questions.
Robert Graham is a cybersecurity expert who wrote a widely circulated blog post in November that criticized computer scientists for premature conclusions connecting the Trump Organization and Alfa Bank.
But he's still wondering why Alfa Bank and Spectrum Health alone dominated links to this Trump server.
"It's indicative of communication between Trump, the health organization and the bank outside these servers," he told CNN. "There is some sort of connection I can't explain, and only they are doing it. It could be completely innocent."
Share:

Anchor links for post titles

Popular Posts

Blog Archive

Labels

Recent Posts

Popular Posts

Labels

Recent Posts

Pages

Labels

Blog Archive

Recent Posts