David Brock is a Clinton loyalist, apparatchik for the Democrat Party as founder of Media Matters, and the former boyfriend of Comet Ping Pong owner James Alefantis who, though a “mere” pizza restaurateur, was named by GQ magazine as 49th among the 50 most powerful people in Washington, D.C.
8 months ago in September 2016, someone hacked into Correct the Record — a Hillary super PAC founded by Brock — and obtained the transcript of a conversation between Brock and three other Democrat operatives the morning after the first presidential debate on Sept. 26 between Donald Trump and Hillary Clinton. The transcript was posted on Reddit and other sites.
Although the Sept. 26 debate was rigged to favor Hillary by outfitting her podium with a teleprompter (see “Hillary used a teleprompter during first debate with Trump”), the post-debate polls all had Trump as the winner, which prompted the morning-after chat between Brock and the three Democrat operatives:
- efink: Elliot Fink, HR office manager/executive assistant of Correct the Record
- cshaw: Connor Shaw (?), Special Projects, Correct the Record.
The chat is interesting and significant for at least two reasons:
(1) Referring to Hillary Clinton as “the sick thing,” Brock et al. were surprised by how good Hillary or her imposter looked in the debate (“whoever that was, she looked pretty good. how tf did they do that?” “i can’t talk. very hush hush.”) because just “a couple of weeks” before the debate, Hillary had performed poorly on two cognitive impairment tests:
- A score of 3 on AMTS — Abbreviated Mental Test Score, a 10-question test to access elderly patients for the possibility of dementia. A score of 7-8 or less suggests cognitive impairment at the time of testing, although further and more formal tests are necessary to confirm a diagnosis of dementia, delirium or other causes of cognitive impairment.
- A score of 22 on MMSE — Mini-Mental State Examination, a 30-point questionnaire that is used extensively in clinical and research settings to measure cognitive impairment and to screen for dementia. Any score below 24 can indicate severe (≤9 points), moderate (10–18 points) or mild (19–23 points) cognitive impairment.
(2) Panicking that Hillary had lost the debate (“we’re losing 100%”; “Trump made her look like a girl.”), and recognizing that Trump’s supporters are “enthusiastic” and “organized,” Brock et al. vowed they “have to stop the bleeding” and must “hit back hard” with new methods because “the usual means” of online trolling (“disruption scripts” and “down-voting”) “isn’t working” and because Trump supporters are sub-human “deplorables”.
Brock et al. said “we need to start hurting people” by deploying NSA spy software, specifically FOXACID, on Reddit, Twitter, 4chan and 8chan posters, identifying their leaders, getting their IP addresses, doxing (obtain personal information of an Internet poster, including real name, known aliases, address, phone number, SSN, credit card number, etc.), tracking their online activities , and infecting their computers with “magic lanterns” — viruses that log the keystrokes of the infected computer. For all of which Brock said “we have full clearance. Word of God.”
FOXACID is a National Security Agency (NSA) software designed to hack into target computers with spam and QUANTUM — a program where servers deployed at key places on the Internet backbones impersonate legitimate Web sites and trick the target’s browser into visiting a FOXACID server. If the target’s browser is exploitable, further permanent “implants” (rootkits etc.) are deployed in the target computer, e.g. OLYMPUSFIRE for Windows, which give complete remote access to the infected machine.
The chat ended with Brock ordering the three operatives to compile a list of information on more than a thousand online posters. After Brock logged off the chat, one of the operatives asked what Brock would do with the information they’ll give him on the Trump supporters, the ominous answer was:
“google Seth Rich and shut up about it.“
Seth Rich, a DNC staffer believed to have provided thousands of damaging DNC emails to WikiLeaks, was murdered on July 10, 2½ months before the Trump-Hillary debate.
Below is the transcript of the Brock et al. chat:
Begin Transcript ekim [5:52 AM]
ekim [5:52 AM] set the channel purpose: clean up this mes
brock [5:52 AM] joined post-debate from an invitation by @ekim
brock [5:53 AM] go round up the others. i need some coffee.
ekim [5:53 AM] will do
efink [5:54 AM] motherfucker.
brock [5:54 AM] good morning to u to fink.
efink [5:55 AM] the only good thing about it was that whoever that was, she looked pretty good. how tf did they do that?
brock [5:56 AM] i can’t talk. very hush hush. still, we’ve lost every online poll and we need to get tough here. get this under control.
[5:56] still, i hope we put the sick thing to bed.
[5:56] i hope.
efink [5:57 AM] me 2. do i have time for coffee?
brock [5:57 AM] we’re all gonna need a lot of coffee.
ekim [5:58 AM] shaw is on his way sir.
[5:59] i don’t see what’s so bad. She looked really healthy! I thought she did GREAT!
efink [5:59 AM] she was scoring 3 on AMTS a couple of weeks ago and 22 on mmse. Yeah, whoever that was was normal.
[6:00] but the telemetry sucks. look at all the snap onlines: we’re losing 100%
[6:00] romney v obama numbers
ekim [6:01 AM] but those don’t mean anything
efink [6:01 AM] it means they’re enthusiastic. organized. if they can swarm a poll whats to stop them swarming a voting booth?
[6:01] it also creates a counter-nar. the free press will sniff it. we have to stop the bleeding.
ekim [6:01 AM] k
efink [6:02 AM] don’t worry. we have something. GET SHAW OUT OF BED.
[6:02] i’m going for coffee.
cshaw [6:05 AM] hello!
[6:06] hi Liz.
[6:06] I see we’re not happy :disappointed:
brock [6:06 AM] Not at all.
cshaw [6:06 AM] I read the round-up. It looked good?
brock [6:07 AM] the round up my burning ass. I’m talking about the real world. Trump made her look like a girl. Today we hit back. We hit back hard.
efink [6:07 AM] one sec.
[6:10] okay. guys, this is 18-2381 stuff. Got it?
cshaw [6:10 AM] yes
ekim [6:10 AM] yes sir.
efink [6:11 AM] alright. we need to move beyond the disruption scripts and down-voting. we need to start hurting people and that’s what this is about. This is about winning because we’ll never get a chance at this again. everything is justified. David?
brock [6:11 AM] dramatic.
[6:13] fuck–okay. so the Trump team is an emergent order. thirty million little chan and reddit assholes that bump around and then congeal to vote in a poll or push a meme or make a hashtag trend or whatever. This is new. It isn’t like fighting a centrally organized campaign.
[6:13] It’s more like fighting a disease.
[6:14] So what we need to do is break the pattern. The usual means isn’t working. Trump’s too charismatic. Morale is too high. This is an army of chaos folks.
[6:14] so we have full clearance. Word of God.
[6:15] Fink–let’s do this. I have a plane to catch.
efink [6:16 AM] uploaded and commented on an image: foxacid.jpg 1 Comment FOXACID
ekim [6:16 AM] Ew.
cshaw [6:16 AM] i like it! wtf is it??
efink [6:17 AM] This is manna from heaven, kids.
[6:18] We have the use of an NSA intrusion package. We are going to find the thought leaders. the meme-generators. the shit-posters. I need a target analysis for reddit, twitter, and the chans by tomorrow 5 PM.
[6:18] You will monitor, identify, and using the FA [foxacid] software set we have, identify/dox.
cshaw [6:18 AM] that will dox them??
efink [6:20 AM] It will man-on-the-side for the anon boards and intercept traffic. We can use that for IP addresses and loading tracking software and magic lantern onto their devices. Once we have them compromised
[6:20] David? How many do we need?
brock [6:21 AM] I want 150 from 4chan, whatever you can get from 8. I want 1000 top reddit drivers exposed and I want content analysis for their posts. I want the people who are really driving their narrative.
[6:22] I need all that in a packet by tomorrow afternoon with lexical analysis, proof of compromise. I want clips of memes. I want to up-vote patterns. All this has to be inside the US too. We can’t use externals.
cshaw [6:23 AM] It won’t work outside the US?
efink [6:23 AM] It works fine outside the us you idiot. That’s NSA stuff.
brock [6:24 AM] WE don’t work outside the US. Do you think this is fucking bean-bag?
[6:24] We are going to disrupt them before this shit goes any further.
[6:24] if they don’t have leaders, we’re going to get their thought leaders.
cshaw [6:24 AM] like pajama boy!
brock [6:25 AM] I AM NOT N THE MOOD cshaw
cshaw [6:25 AM] sorry
efink [6:26 AM] just get us the target profiles. Hit the numbers. Give us a matrix for each of them. Okay? PII, influence grid, recent activity, Q-rate. Like that.
[6:26] You know what to do.
cshaw [6:26 AM] Yes sir.
ekim [6:26 AM] What are we going to do with that?
brock [6:27 AM] dof u really want tio fucking know, kim?
ekim [6:27 AM] i’m good.
brock [6:28 AM] u better be. I am going to get a plane. You will be up ALL NIGHT. Keep the lab LOCKED. Fink bring in pizza or whatever to keep the kids going.
[6:28] I am out.
cshaw [6:28 AM] does it have to be We the Pizza?
efink [6:29 AM] Brock LIKES WtP. What do you want?
ekim [6:29 AM] Sushi. Sushi would be nice.
efink [6:30 AM] what do you think this is, the Trump campaign. We’re getting pizza from We.
[6:30] Get those files together.
ekim [6:30 AM] I’m on it. Do you know what brock is going to do with them? I do kind of want to know, sir.
efink [6:31 AM] google Seth Rich and shut up about it.
cshaw [6:31 AM] OOg.
[6:32] well, they are deplorable. idk. I think we should have done this a long time ago.
efink [6:32 AM] get working kids. I’ll check back in a couple. Have something for Brock before he hits the ground. k?
ekim [6:33 AM] I’m sick of We the Pizza.
cshaw [6:33 AM] me2.
ekim [6:33 AM] :confused:
Update (June 7, 2017):
In a series of comments (see below), blogger Max Insider of a hoax fake-news site called RealTrueNews — which is neither real nor true nor news — claims that he concocted the David Brock chat transcript and blames his deception on Trump supporters. See his December 27, 2016 fake post: “Inside Correct the Record: Post-Debate PLOT!“.
Notwithstanding Max Insider’s claim (whose alias is yet another lie as he is no “insider” of anything but hoaxes) that the Brock transcript is a hoax, it should be pointed out that the NSA in fact does engage in the nefarious activities described in the transcript — those of “doxing” online posters and deploying FoxAcid to attack and infect their computers. The following is from a UK Guardian article on Oct. 4, 2013:
“Secret servers and a privileged position on the internet’s backbone used to identify users and attack target computers
The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA’s application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world.
According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The trick identified Tor users on the internet and then executes an attack against their Firefox web browser.
The NSA refers to these capabilities as CNE, or computer network exploitation.
The first step of this process is finding Tor users. To accomplish this, the NSA relies on its vast capability to monitor large parts of the internet. This is done via the agency’s partnership with US telecoms firms under programs codenamed Stormbrew, Fairview, Oakstar and Blarney.
The NSA creates “fingerprints” that detect http requests from the Tor network to particular servers. These fingerprints are loaded into NSA database systems like XKeyscore, a bespoke collection and analysis tool which NSA boasts allows its analysts to see “almost everything” a target does on the internet….
After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user’s computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems.
Once the computer is successfully attacked, it secretly calls back to a FoxAcid server, which then performs additional attacks on the target computer to ensure that it remains compromised long-term, and continues to provide eavesdropping information back to the NSA.“