So, libs, what say you to this?

Do you think the DNC emails leaked were the work of


  • Total voters
    36
Why would the dnc leak that info ?

If it wasn't a hack, why do fed law enforcement agencies say it was a hack ?
 
Anything to deter away from Manfort getting raided..

Manafort had stopped working for the Trump Campaign before Trump had got the GOP nomination, so Manafort had no part in the 2016 Trump Campaign when it actually started ie. when he got the GOP nomination, prior to that Trump was running against all the other Republican candidates and not Hillary.
 
I have no doubt that somewhere along the way, Wikileaks went to work for Russia, if not from day one. I even said this on this forum before the 2016 campaign. It has always been obvious to me Assange is a marxist fuckwad.
 
Copied, Not Hacked

As indicated above, the independent forensic work just completed focused on data copied (not hacked) by a shadowy persona named “Guccifer 2.0.” The forensics reflect what seems to have been a desperate effort to “blame the Russians” for publishing highly embarrassing DNC emails three days before the Democratic convention last July. Since the content of the DNC emails reeked of pro-Clinton bias, her campaign saw an overriding need to divert attention from content to provenance – as in, who “hacked” those DNC emails? The campaign was enthusiastically supported by compliant “mainstream” media; they are still on a roll.

“The Russians” were the ideal culprit. And, after WikiLeaks editor Julian Assange announced on June 12, 2016, “We have emails related to Hillary Clinton which are pending publication,” her campaign had more than a month before the convention to insert its own “forensic facts” and prime the media pump to put the blame on “Russian meddling.” Mrs. Clinton’s PR chief Jennifer Palmieri has explained how she used golf carts to make the rounds at the convention. She wrote that her “mission was to get the press to focus on something even we found difficult to process: the prospect that Russia had not only hacked and stolen emails from the DNC, but that it had done so to help Donald Trump and hurt Hillary Clinton.”

Independent cyber-investigators have now completed the kind of forensic work that the intelligence assessment did not do. Oddly, the “hand-picked” intelligence analysts contented themselves with “assessing” this and “assessing” that. In contrast, the investigators dug deep and came up with verifiable evidence from metadata found in the record of the alleged Russian hack.

They found that the purported “hack” of the DNC by Guccifer 2.0 was not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external storage device – a thumb drive, for example) by an insider. The data was leaked to implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the FBI.

The Time Sequence

June 12, 2016: Assange announces WikiLeaks is about to publish “emails related to Hillary Clinton.”

June 14, 2016: DNC contractor Crowdstrike, (with a dubious professional record and multiple conflicts of interest) announces that malware has been found on the DNC server and claims there is evidence it was injected by Russians.

June 15, 2016: “Guccifer 2.0” affirms the DNC statement; claims responsibility for the “hack;” claims to be a WikiLeaks source; and posts a document that the forensics show was synthetically tainted with “Russian fingerprints.”

We do not think that the June 12, 14, & 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been about to publish and to “show” that it came from a Russian hack.

The Key Event

July 5, 2016: In the early evening, Eastern Daylight Time, someone working in the EDT time zone with a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is much faster than what is physically possible with a hack.

It thus appears that the purported “hack” of the DNC by Guccifer 2.0 (the self-proclaimed WikiLeaks source) was not a hack by Russia or anyone else, but was rather a copy of DNC data onto an external storage device.

“Obfuscation & De-obfuscation”

Mr. President, the disclosure described below may be related. Even if it is not, it is something we think you should be made aware of in this general connection. On March 7, 2017, WikiLeaks began to publish a trove of original CIA documents that WikiLeaks labeled “Vault 7.” WikiLeaks said it got the trove from a current or former CIA contractor and described it as comparable in scale and significance to the information Edward Snowden gave to reporters in 2013.


Democratic presidential nominee Hillary Clinton at the third debate with Republican nominee Donald Trump. (Photo credit: hillaryclinton.com)

No one has challenged the authenticity of the original documents of Vault 7, which disclosed a vast array of cyber warfare tools developed, probably with help from NSA, by CIA’s Engineering Development Group. That Group was part of the sprawling CIA Directorate of Digital Innovation – a growth industry established by John Brennan in 2015.

Scarcely imaginable digital tools – that can take control of your car and make it race over 100 mph, for example, or can enable remote spying through a TV – were described and duly reported in the New York Times and other media throughout March. But the Vault 7, part 3 release on March 31 that exposed the “Marble Framework” program apparently was judged too delicate to qualify as “news fit to print” and was kept out of the Times.

The Washington Post’s Ellen Nakashima, it seems, “did not get the memo” in time. Her March 31 article bore the catching (and accurate) headline: “WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations.”

The WikiLeaks release indicated that Marble was designed for flexible and easy-to-use “obfuscation,” and that Marble source code includes a “deobfuscator” to reverse CIA text obfuscation.

More important, the CIA reportedly used Marble during 2016. In her Washington Post report, Nakashima left that out, but did include another significant point made by WikiLeaks; namely, that the obfuscation tool could be used to conduct a “forensic attribution double game” or false-flag operation because it included test samples in Chinese, Russian, Korean, Arabic and Farsi.

The CIA’s reaction was neuralgic. Director Mike Pompeo lashed out two weeks later, calling Assange and his associates “demons,” and insisting; “It’s time to call out WikiLeaks for what it really is, a non-state hostile intelligence service, often abetted by state actors like Russia.”

Mr. President, we do not know if CIA’s Marble Framework, or tools like it, played some kind of role in the campaign to blame Russia for hacking the DNC. Nor do we know how candid the denizens of CIA’s Digital Innovation Directorate have been with you and with Director Pompeo. These are areas that might profit from early White House review.

Putin and the Technology

We also do not know if you have discussed cyber issues in any detail with President Putin. In his interview with NBC’s Megyn Kelly, he seemed quite willing – perhaps even eager – to address issues related to the kind of cyber tools revealed in the Vault 7 disclosures, if only to indicate he has been briefed on them. Putin pointed out that today’s technology enables hacking to be “masked and camouflaged to an extent that no one can understand the origin” [of the hack] … And, vice versa, it is possible to set up any entity or any individual that everyone will think that they are the exact source of that attack.”

urpose is to spread truth around and, when necessary, hold to account our former intelligence colleagues.
Well, I started an opinion poll so that you can vote on which you believe is the most likely scenario, the Russians did it or it was an inside job. Here is a link, so vote please. :) Thank you.

Do you believe . . .
Seriously?? What do you think an unscientific poll with a 99 point margin of error means?

1233796371590.gif

It's just for my own curiosity. I want to see how many suckers who believe "The Russians are coming" actually exist in the real world! :D
 
I first thought Seth Rich was killed for being the leaker. But since the stories on Debbie Wasserman Shultz I'm thinking Seth Rich was killed for knowing who the leaker was. The fact the DNC would knowingly hire islamic terrorists is a huge concern.
 
Even Fox News has admitted the Seth Rich hoax was fake. But the thing about tards is that once you write something on the blank slate of their minds, you can never never never get them to erase it.

It's all part of the whole tard package.
 
I first thought Seth Rich was killed for being the leaker. But since the stories on Debbie Wasserman Shultz I'm thinking Seth Rich was killed for knowing who the leaker was. The fact the DNC would knowingly hire islamic terrorists is a huge concern.

Leftists support Islamists, within split seconds Leftists defend Islam and Islamists and also deflect every time there's an Islamic terrorist attack, so people should not be shocked that Leftist political parties are involved with Islamists and those who are actual Islamist terrorists.
 
Even Fox News has admitted the Seth Rich hoax was fake. But the thing about tards is that once you write something on the blank slate of their minds, you can never never never get them to erase it.

It's all part of the whole tard package.

Tards gonna tard.
 
The metadata is where the information is coming from, that and the expert opinions of the computer experts who have NOTHING to gain or lose. Not only computer experts but also experts at dealing with Russians in the past and dealing with Russian spies and their MO, etc. These are experts who used to work in the government in some capacity who are analyzing the data independently.
 
The CIA put a Russian watermark on the leak after the fact for the DNC. but there is ZERO evidence the information ever went to Russia....transfer-speed wasn't anywhere near where it would have been if it had gone to Moscow.
 
The metadata is where the information is coming from, that and the expert opinions of the computer experts who have NOTHING to gain or lose. Not only computer experts but also experts at dealing with Russians in the past and dealing with Russian spies and their MO, etc. These are experts who used to work in the government in some capacity who are analyzing the data independently.
so crowdstrike lied?
 

Forum List

Back
Top