- Law Cases
by Sharon Rondeau
(Nov. 20, 2012) — The Hill has reported by way of a French cyber publication that American computers hacked into those of former French President Nicolas Sarkozy shortly before the election which unseated him and installed a socialist.
Fox News has also reported the accusations.
The French magazine, L’Express, contains an article titled “Cyberguerre: comment les Américains ont piraté l’Élysée,” which translates to “Cyberwar: How Americans Have Hacked the Elysee.”
The cover of the magazine reads after translation, “Cyber War: How the Elysee was Pirated.”
The subtitle of the article beginning with the word “Exclusif” translates to “EXCLUSIVE. In May, the team of Nicolas Sarkozy was the victim of a cyber espionage operation hypersophistiquée. The sources agree Express: kick just … American friend. Revelations about an attack that is part of a global battle.”
It appears that the word “hypersophistiquee” does not translate, but one might conclude that it means “hyper-sophisticated” or “highly sophisticated.”
The second paragraph translates to “The Express can reveal that hackers have not only managed to get to the heart of French political power, but they were able to search the computers close adviser of Nicolas Sarkozy. Secret notes were recovered from hard drives, but also strategic plans. Real work pro worthy of James Bond, Skyfall. And, as so often in this type of attack, human negligence is the cause of the disaster.”
The subheading and next paragraph mean:
The computer secretary general of the Elysee looted
It all started on Facebook. The attackers were first identified on the social network, the profile of people working at the presidential palace. Pretending to be friends, they were then invited by e-mail, to connect to the intranet of the Castle. Except that the link led to a fake web page – a replica of the Elysee. The victims have seen the fire, and when appeared on the screen, a message asking for their username and password they gave them in good faith. A technique well known to hackers, allowing them to retrieve the numeric keys to invite in peace in the holy of holies.
And the next, with some words apparently missing:
Once inside, the hackers installed spy software that has spread from one computer to another. Sophisticated, this “worm” that has infected some machines. And not just that: those most influential advisers of the government … and the Secretary General, Xavier Musca. Nicolas Sarkozy was there, he escaped. And because he did not have a PC. Unfortunately for the attackers, malicious code left footprints. “These puppets operated by son invisible infected machines communicate with their teacher to take their orders, decrypts an expert, Olivier Caleff, safety manager Cert-Devoteam, a security firm. When trying to trace these son on the Internet, often on servers located abroad. “
To avoid copyright infringement, we will not reproduce the entire translated article here. Readers can copy the paragraphs and paste the into Google translator or another translation service to read the entire article.
However, the last sentence in the paragraph beginning with the French word “Quitte” translates to “Nevertheless, the attitude of the Obama administration raises many questions.”
Since the November 6, 2012 American election, many analysts, bloggers, and at least two editors of online newspapers, The Post & Email and WorldNetDaily, have stated that they believe the results were arrived at by cheating on the part of the Obama campaign. Obama’s top adviser, Valerie Jarrett, appeared confident that Obama would win re-election when she said that there would be “payback” for those who had not supported them. In March, Obama had whispered to then-Russian President Dmitry Medvedev that he would “have more flexibility” after the election, appearing to indicate his confidence that he would be returned to office.
Blogger and researcher Martha Trowbridge, who believes that Obama is the son of Malcolm X and JoAnn Newman and runs the Citizens Bureau of Investigation (CBI), is convinced that votes were flipped invisibly from Romney to Obama in numbers large enough to swing enough key states’ results to show an Obama win. Shortly after the election, an apparent Obama supporter communicated to her on Twitter, “If you understood us, you would know how to beat us.”
Business Insider has reported that last April, Wikileaks revealed that in 2008, John McCain was aware that “Democrats stuffed ballot boxes in Pennsylvania and Ohio on election night, but McCain chose not to pursue voter fraud…” Wikileaks produced what it claimed was an email marked “internal use only” by the Obama campaign which read, “After discussions with his inner circle, which explains the delay in his speech, McCain decided not to pursue the voter fraud in PA and Ohio, despite his staff’s desire to make it an issue. He said no. Staff felt they could get a federal injunction to stop the process. McCain felt the crowds assembled in support of Obama and such would be detrimental to our country and it would do our nation no good for this to drag out like last go around, coupled with the possibility of domestic violence.”
Ohio and Pennsylvania are states which Mitt Romney’s campaign thought he could win. On Election night, Republican strategist Karl Rove asked Fox News to reconsider its call of Ohio for Obama at an early stage of the vote tabulations. Pundit George Will, political strategist Dick Morris and U.S. News and World Report’s Michael Barone had all predicted a Romney “landslide” which turned out to be a significant win for Obama, despite his difficulties at energizing his base just two weeks before the election.
The University of Colorado, which has correctly predicted presidential winners for the last 30 years, was confident that Romney would win.
The Post & Email and CBI hves called for a forensic investigation and CPA audit of the 2012 election results, and the 2008 results also appear to be inaccurate because of ballot-stuffing and video evidence of fraud during the caucuses.
The Obama regime has committed war crimes against Libya by violating the War Powers Act; violated the Posse Comitatus Act by ordering U.S. soldiers to deploy as law enforcers in an Alabama town in 2009; been accused of treason by thousands of American citizens and members of the military; disenfranchised the military vote by failing to implement its own law mandating that voting centers for members of the military be established; labeled those seeking to uphold the U.S. Constitution potentially violent “sovereign citizens;” allowed its head, Obama, to chair the United Nations Security Council in violation of Article I, Section 9 of the U.S. Constitution; allowed four Americans to die in a terrorist attack in Libya and then lied about it; committed character assassination; and addressed the eligibility question by releasing an image which was later pronounced a forgery by a law enforcement investigation. The regime has released classified national security information and might have hacked numerous opponents’ websites, including this one. Either he or his sycophants have established numerous websites to discourage opposition and disseminate propaganda.
The French article states that the hackers of Sarkozy’s computer system “left footprints.” When Department of Homeland Security Secretary Janet Napolitano was asked by L’Express about the hacking allegations, she responded, “Let me answer the following. I had the opportunity to say repeatedly in the past during my meetings before the ministers of your government. We have no more important partner than France, we have no ally larger than France. We cooperate in many areas related to security. And I’m here to further strengthen these links and develop new ones.”
Napolitano denied that the Flame virus, which the French claim could have been used to penetrate their computer system, was developed by the U.S.
That is what The Post & Email and others are seeking in the course of a forensic audit of the 2012 election. If Obama’s computer programmers can hack France’s computers, are they capable of hacking our own to steal an election or two?
Update, November 21, 2012: The U.S. has “categorically denied” involvement in the hacking of the French computer system.
Tags: 2008 Election, 2012 election, ballot-stuffing, CPA audit, cyber war, Department of Homeland Security, Dick Morris, election-rigging, forensic investigation, George Will, hacking, Janet Napolitano, John McCain, L'Express, Libya, Malcolm X, Michael Barone, Mitt Romney, Nicolas Sarkozy, Obama regime, Ohio, Pennsylvania, propaganda, sovereign citizen, the Elysee, treason, U.S. Constitution, U.S. military, University of Colorado, Wikileaks