Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: SERKIT

He might not have touched a server. He would likely have downloaded the emails from a computer to a USB flash drive.


1,164 posted on 08/03/2018 5:03:44 PM PDT by Defiant (I may be deplorable, but I'm not getting in that basket.)
[ Post Reply | Private Reply | To 1146 | View Replies ]


To: Defiant

https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/

There was no hack of the Democratic National Committee’s system on July 5 last year—not by the Russians, not by anyone else. Hard science now demonstrates it was a leak—a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNC’s system. This casts serious doubt on the initial “hack,” as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.
Forensic investigations of documents made public two weeks prior to the July 5 leak by the person or entity known as Guccifer 2.0 show that they were fraudulent: Before Guccifer posted them they were adulterated by cutting and pasting them into a blank template that had Russian as its default language. Guccifer took responsibility on June 15 for an intrusion the DNC reported on June 14 and professed to be a WikiLeaks source—claims essential to the official narrative implicating Russia in what was soon cast as an extensive hacking operation. To put the point simply, forensic science now devastates this narrative.

https://nypost.com/2017/08/15/new-report-claims-dnc-hack-was-an-inside-job-not-russia/

A blogger named “The Forensicator” analyzed the “last modified” times in one set of documents released by Guccifer 2.0. Based on the size of the documents and the times they were downloaded, Forensicator calculated that a hacker was able to copy the files at a speed of more than 20 megabytes per second.

That is faster than consumer internet services in the United States can upload documents.

As a result, Forensicator concluded that the documents could not have been copied over the internet. Instead, someone with physical access to the network must have copied them in person to a USB drive, the blogger concluded.

“This theory assumes that the hacker downloaded the files to a computer and then leaked it from that computer,” said Rich Barger, director of security research at Splunk.


1,166 posted on 08/03/2018 5:14:46 PM PDT by edzo4 ("Well I truly would be thrilled if all/most of the Q stuff turns out to be real")
[ Post Reply | Private Reply | To 1164 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson