Did the federal agents who were doing the hacking deliberately leave the signs to show that the culprit was one of Obama’s agencies?
#22 you have to understand the mentality of these Wyle E. Coyote type Super Geniuses.
They all are like Illary. They think everyone is a stupid as they are or worse. So no chance anyone would catch them.
You know the type. Like John Podesta that used p@ssw0rd as his email account login password.
From what I've heard and read, no. They are just inept and stupid like the rest of the 0bama regime, including the would-be 'Dick Tater' Hussein himself.
It was traced back through the IP address, though I'm not sure what alerted them that a hack attempt had been made.
No, in order to route information from one computer to another you need a from and to destination. The number was left as a byproduct. It is not too hard to back trace someone doing a port probe. You can download scripts or automated hacking programs from the jihad if you promise to only use them on Jews. Many teenagers desiring to be hackers but too lazy to study do so. We used to call them script kiddies.
If the hacking routine finds a vulnerability it will install a backdoor and notify the hacker wannabee...
A real hacker would have taken over a few servers and routed their control through those servers to run their port attacks from someone else’s computer to help hide their tracks.
Either way you look at it, at worst it is treason, at best stunning incompetence.
The problem I have with the choice is that if the hacker was good enough to route through DHS, they would not be running full blown port probes.
A competent operative would identify the operating system of the target and saved his cover server for a proper port unerability for that system. Full port probes are as subtle as a bull in a China shop,
This leaves me to conclude arrogant leftist Treason.
So, was this a lone wolf, or were the highest levels of DHS and their bosses involved. Everyone involved should be doing hard time in prison within a year, and DHS should be pruned severely if not cut off at the roots entirely. If heads do not roll from this, Americans can no longer trust the DHS.
In the least, if election hack terrorism operations can be run from INSIDE the DHS itself, then they are beyond worthless and their budget this year should reflect that.