So, libs, what say you to this?

Do you think the DNC emails leaked were the work of


  • Total voters
    36
Prove it. No one else can in the government because no one has examined the servers. But you just get hold of the DNC and ask nicely if you can examine the servers and get back to us with your proof.

You don't necessarily need the physical servers to determine if there was a hack.
 
Prove it. No one else can in the government because no one has examined the servers. But you just get hold of the DNC and ask nicely if you can examine the servers and get back to us with your proof.

You don't necessarily need the servers to determine if there was a hack.
then why did the FBI and the DHS ask for it and were denied?
 
then why did the FBI and the DHS ask for it and were denied?

I don't know they're processes. What I do know is that you don't need to have the servers in your physical possession to determine if there was a hack.
 
I picked up this article at another forum. This is the much more likely scenario than a big Russian/Trump ridiculous conspiracy theory. What do you think?

A New Report Raises Big Questions About Last Yearā€™s DNC Hack

It is now a year since the Democratic National Committeeā€™s mail system was compromisedā€”a year since events in the spring and early summer of 2016 were identified as remote hacks and, in short order, attributed to Russians acting in behalf of Donald Trump. A great edifice has been erected during this time. President Trump, members of his family, and numerous people around him stand accused of various corruptions and extensive collusion with Russians. Half a dozen simultaneous investigations proceed into these matters. Last week news broke that Special Counsel Robert Mueller had convened a grand jury, which issued its first subpoenas on August 3. Allegations of treason are common; prominent political figures and many media cultivate a case for impeachment.

The presidentā€™s ability to conduct foreign policy, notably but not only with regard to Russia, is now crippled. Forced into a corner and having no choice, Trump just signed legislation imposing severe new sanctions on Russia and European companies working with it on pipeline projects vital to Russiaā€™s energy sector. Striking this close to the core of another nationā€™s economy is customarily considered an act of war, we must not forget. In retaliation, Moscow has announced that the United States must cut its embassy staff by roughly two-thirds. All sides agree that relations between the United States and Russia are now as fragile as they were during some of the Cold Warā€™s worst moments. To suggest that military conflict between two nuclear powers inches ever closer can no longer be dismissed as hyperbole.

All this was set in motion when the DNCā€™s mail server was first violated in the spring of 2016 and by subsequent assertions that Russians were behind that ā€œhackā€ and another such operation, also described as a Russian hack, on July 5. These are the foundation stones of the edifice just outlined. The evolution of public discourse in the year since is worthy of scholarly study: Possibilities became allegations, and these became probabilities. Then the probabilities turned into certainties, and these evolved into what are now taken to be established truths. By my reckoning, it required a few days to a few weeks to advance from each of these stages to the next. This was accomplished via the indefensibly corrupt manipulations of language repeated incessantly in our leading media.

We are urged to accept the word of institutions and senior officials with long records of deception.

Lost in a year that often appeared to veer into our peculiarly American kind of hysteria is the absence of any credible evidence of what happened last year and who was responsible for it. It is tiresome to note, but none has been made available. Instead, we are urged to accept the word of institutions and senior officials with long records of deception. These officials profess ā€œhigh confidenceā€ in their ā€œassessmentā€ as to what happened in the spring and summer of last yearā€”this standing as their authoritative judgment. Few have noticed since these evasive terms first appeared that an assessment is an opinion, nothing more, and to express high confidence is an upside-down way of admitting the absence of certain knowledge. This is how officials avoid putting their names on the assertions we are so strongly urged to acceptā€”as the record shows many of them have done.

We come now to a moment of great gravity.

There has been a long effort to counter the official narrative we now call ā€œRussiagate.ā€ This effort has so far focused on the key events noted above, leaving numerous others still to be addressed. Until recently, researchers undertaking this work faced critical shortcomings, and these are to be explained. But they have achieved significant new momentum in the past several weeks, and what they have done now yields very consequential fruit. Forensic investigators, intelligence analysts, system designers, program architects, and computer scientists of long experience and strongly credentialed are now producing evidence disproving the official version of key events last year. Their work is intricate and continues at a kinetic pace as we speak. But its certain results so far are two, simply stated, and freighted with implications:

  • There was no hack of the Democratic National Committeeā€™s system on July 5 last yearā€”not by the Russians, not by anyone else. Hard science now demonstrates it was a leakā€”a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNCā€™s system. This casts serious doubt on the initial ā€œhack,ā€ as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.

the article, which I read in full, has sort of been debunked...

Also, the Russian embassy homes in / near D.C. were shut down and diplomats kicked out because our gvt believed they, the Russians in these embassy homes, were involved with the DNC theft and leaks and it was reported that they had super duper spying equipment in them...

These Russian embassy centers could have easily had a server fast enough to download the files in the 87 seconds the article mentions.

But this article is neither conclusive proof nor strong evidence. Itā€™s the extremely long-winded product of a crank, and itā€™s been getting attention only because it appears in a respected left-wing publication like The Nation. Anyone hoping to read it for careful reporting and clear explanation is going to come away disappointed, however.

If you want to get to the actual claims being made, youā€™ll have to skip the first 1,000 or so words, which mostly consist of breathtakingly elaborate throat-clearing. (ā€œ[H]ouses built on sand and made of cards are bound to collapse, and there can be no surprise that the one resting atop the ā€˜hack theory,ā€™ as we can call the prevailing wisdom on the DNC events, appears to be in the process of doing so.ā€) About halfway through, you get to the crux of the article: A report, made by an anonymous analyst calling himself ā€œForensicator,ā€ on the ā€œmetadataā€ of ā€œlocked filesā€ leaked by the hacker Guccifer 2.0.

This should, already, set off alarm bells: An anonymous analyst is claiming to have analyzed the ā€œmetadataā€ of ā€œlocked filesā€ that only this analyst had access to? Still, if Iā€™m understanding it correctly, Lawrenceā€™s central argument (which, again, rests on the belief that Forensicatorā€™s claims about ā€œmetadataā€ are meaningful and correct) is that the initial data transfer from the DNC occurred at speeds impossible via the internet. Instead, he and a few retired intel-community members and some pseudonymous bloggers believe the data was transferred to a USB stick, making the infiltration a leak from someone inside the DNC, not a hack.

The crux of the whole thing ā€” the opening argument ā€” rests on the fact that, according to ā€œmetadata,ā€ the data was transferred at about 22 megabytes per second, which Lawrence and Forensicator claim is much too fast to have been undertaken over an internet connection. (Most connection speeds are measured at megabits per second, not megabytes; 22 megabytes per second is 176 megabits per second.) Most households donā€™t get internet speeds that high, but enterprise operations, like the DNC ā€” or, uh, the FSB ā€” would have access to a higher but certainly not unattainable speed like that.

If thatā€™s your strongest evidence, your argument is already in trouble. But the real problem isnā€™t that thereā€™s a bizarre claim about internet speed that doesnā€™t hold up to scrutiny. Itā€™s that Lawrence is writing in techno-gibberish that falls apart under even the slightest scrutiny. You could try to go on, but to what end? As an example: Lawrence writes that ā€œresearchers penetrated what Folden calls Gucciferā€™s top layer of metadata and analyzed what was in the layers beneath.ā€ What on earth is that supposed to mean? We donā€™t know what ā€œmetadataā€ weā€™re talking about, or why it comes in ā€œlayers,ā€ and all Iā€™m left with is the distinct impression that Lawrence doesnā€™t either. Even if you wanted to take this seriously enough to engage with, you canā€™t, because it only intermittently makes sense. There may be evidence out there, somewhere, that a vast conspiracy theory has taken place to cover up a leak and blame Russia. But itā€™s going to need to be at least comprehensible.
The Nation Article About the DNC Hack Is Too Incoherent to Even Debunk
 
3. During all of this Julian Assange had declared Seth Rich was his inside leaker.
Lie.

Bullshit.

What a fucking parroting hack you are.

Now be a good little boy and get back in line to be lied to again.
 
EXCLUSIVE: Cybersecurity experts who were first to conclude that Putin hacked presidential election ABANDON some of their claims against Russia - and refuse to co-operate with Congress
  • Claims of Russian interference in the presidential election through hacking Democratic emails have been long-running scandal
  • First link between hacking and Vladimir Putin was made by CrowdStrike, Irvine, CA, based firm hired by the Democratic National Committee
  • It concluded in June 2016 Moscow spies had hacked DNC - before embarrassing emails were published - setting off Russian election scandal
  • Cybersecurity firm examined DNC's servers, something FBI was not allowed to do, and its conclusion has been repeated by the intelligence community
  • DailyMail.com reveals it has had to abandon key claims in another report on hacking by same Russians it blamed for DNC attack
  • It used unproven claims by a pro-Putin blogger to wrongly conclude Russian hackers had helped to virtually wipe out Ukrainian artillery
  • CrowdStrike is also refusing to testify in public to the House Intelligence Committee on what it knows and declined to speak to DailyMail.com


Read more: New questions over claim Russia hacked the election | Daily Mail Online
Follow us: @MailOnline on Twitter | DailyMail on Facebook
 
This is exactly why I am trying to purge these fucking pseudocon hacks from the conservative movement. They are destroying the conservative and Republican brand.

Here's the thing, fuckwads. Bearing false witness, especially against a MURDER VICTIM WHO CANNOT DEFEND HIMSELF, is NOT a conservative or Republican or Christian value.

You fucking motherfuckers lecture about America being founded on Judeo-Christian values, and then you sick fucking pricks violate one of the top ten laws in the bible. REPEATEDLY. Even after being told by the fuckwads who hoaxed you that they hoaxed you.

Fuck you all. Every one of you fucking hypocrites.
.
 
I picked up this article at another forum. This is the much more likely scenario than a big Russian/Trump ridiculous conspiracy theory. What do you think?

A New Report Raises Big Questions About Last Yearā€™s DNC Hack

It is now a year since the Democratic National Committeeā€™s mail system was compromisedā€”a year since events in the spring and early summer of 2016 were identified as remote hacks and, in short order, attributed to Russians acting in behalf of Donald Trump. A great edifice has been erected during this time. President Trump, members of his family, and numerous people around him stand accused of various corruptions and extensive collusion with Russians. Half a dozen simultaneous investigations proceed into these matters. Last week news broke that Special Counsel Robert Mueller had convened a grand jury, which issued its first subpoenas on August 3. Allegations of treason are common; prominent political figures and many media cultivate a case for impeachment.

The presidentā€™s ability to conduct foreign policy, notably but not only with regard to Russia, is now crippled. Forced into a corner and having no choice, Trump just signed legislation imposing severe new sanctions on Russia and European companies working with it on pipeline projects vital to Russiaā€™s energy sector. Striking this close to the core of another nationā€™s economy is customarily considered an act of war, we must not forget. In retaliation, Moscow has announced that the United States must cut its embassy staff by roughly two-thirds. All sides agree that relations between the United States and Russia are now as fragile as they were during some of the Cold Warā€™s worst moments. To suggest that military conflict between two nuclear powers inches ever closer can no longer be dismissed as hyperbole.

All this was set in motion when the DNCā€™s mail server was first violated in the spring of 2016 and by subsequent assertions that Russians were behind that ā€œhackā€ and another such operation, also described as a Russian hack, on July 5. These are the foundation stones of the edifice just outlined. The evolution of public discourse in the year since is worthy of scholarly study: Possibilities became allegations, and these became probabilities. Then the probabilities turned into certainties, and these evolved into what are now taken to be established truths. By my reckoning, it required a few days to a few weeks to advance from each of these stages to the next. This was accomplished via the indefensibly corrupt manipulations of language repeated incessantly in our leading media.

We are urged to accept the word of institutions and senior officials with long records of deception.

Lost in a year that often appeared to veer into our peculiarly American kind of hysteria is the absence of any credible evidence of what happened last year and who was responsible for it. It is tiresome to note, but none has been made available. Instead, we are urged to accept the word of institutions and senior officials with long records of deception. These officials profess ā€œhigh confidenceā€ in their ā€œassessmentā€ as to what happened in the spring and summer of last yearā€”this standing as their authoritative judgment. Few have noticed since these evasive terms first appeared that an assessment is an opinion, nothing more, and to express high confidence is an upside-down way of admitting the absence of certain knowledge. This is how officials avoid putting their names on the assertions we are so strongly urged to acceptā€”as the record shows many of them have done.

We come now to a moment of great gravity.

There has been a long effort to counter the official narrative we now call ā€œRussiagate.ā€ This effort has so far focused on the key events noted above, leaving numerous others still to be addressed. Until recently, researchers undertaking this work faced critical shortcomings, and these are to be explained. But they have achieved significant new momentum in the past several weeks, and what they have done now yields very consequential fruit. Forensic investigators, intelligence analysts, system designers, program architects, and computer scientists of long experience and strongly credentialed are now producing evidence disproving the official version of key events last year. Their work is intricate and continues at a kinetic pace as we speak. But its certain results so far are two, simply stated, and freighted with implications:

  • There was no hack of the Democratic National Committeeā€™s system on July 5 last yearā€”not by the Russians, not by anyone else. Hard science now demonstrates it was a leakā€”a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNCā€™s system. This casts serious doubt on the initial ā€œhack,ā€ as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.

the article, which I read in full, has sort of been debunked...

Also, the Russian embassy homes in / near D.C. were shut down and diplomats kicked out because our gvt believed they, the Russians in these embassy homes, were involved with the DNC theft and leaks and it was reported that they had super duper spying equipment in them...

These Russian embassy centers could have easily had a server fast enough to download the files in the 87 seconds the article mentions.

But this article is neither conclusive proof nor strong evidence. Itā€™s the extremely long-winded product of a crank, and itā€™s been getting attention only because it appears in a respected left-wing publication like The Nation. Anyone hoping to read it for careful reporting and clear explanation is going to come away disappointed, however.

If you want to get to the actual claims being made, youā€™ll have to skip the first 1,000 or so words, which mostly consist of breathtakingly elaborate throat-clearing. (ā€œ[H]ouses built on sand and made of cards are bound to collapse, and there can be no surprise that the one resting atop the ā€˜hack theory,ā€™ as we can call the prevailing wisdom on the DNC events, appears to be in the process of doing so.ā€) About halfway through, you get to the crux of the article: A report, made by an anonymous analyst calling himself ā€œForensicator,ā€ on the ā€œmetadataā€ of ā€œlocked filesā€ leaked by the hacker Guccifer 2.0.

This should, already, set off alarm bells: An anonymous analyst is claiming to have analyzed the ā€œmetadataā€ of ā€œlocked filesā€ that only this analyst had access to? Still, if Iā€™m understanding it correctly, Lawrenceā€™s central argument (which, again, rests on the belief that Forensicatorā€™s claims about ā€œmetadataā€ are meaningful and correct) is that the initial data transfer from the DNC occurred at speeds impossible via the internet. Instead, he and a few retired intel-community members and some pseudonymous bloggers believe the data was transferred to a USB stick, making the infiltration a leak from someone inside the DNC, not a hack.

The crux of the whole thing ā€” the opening argument ā€” rests on the fact that, according to ā€œmetadata,ā€ the data was transferred at about 22 megabytes per second, which Lawrence and Forensicator claim is much too fast to have been undertaken over an internet connection. (Most connection speeds are measured at megabits per second, not megabytes; 22 megabytes per second is 176 megabits per second.) Most households donā€™t get internet speeds that high, but enterprise operations, like the DNC ā€” or, uh, the FSB ā€” would have access to a higher but certainly not unattainable speed like that.

If thatā€™s your strongest evidence, your argument is already in trouble. But the real problem isnā€™t that thereā€™s a bizarre claim about internet speed that doesnā€™t hold up to scrutiny. Itā€™s that Lawrence is writing in techno-gibberish that falls apart under even the slightest scrutiny. You could try to go on, but to what end? As an example: Lawrence writes that ā€œresearchers penetrated what Folden calls Gucciferā€™s top layer of metadata and analyzed what was in the layers beneath.ā€ What on earth is that supposed to mean? We donā€™t know what ā€œmetadataā€ weā€™re talking about, or why it comes in ā€œlayers,ā€ and all Iā€™m left with is the distinct impression that Lawrence doesnā€™t either. Even if you wanted to take this seriously enough to engage with, you canā€™t, because it only intermittently makes sense. There may be evidence out there, somewhere, that a vast conspiracy theory has taken place to cover up a leak and blame Russia. But itā€™s going to need to be at least comprehensible.
The Nation Article About the DNC Hack Is Too Incoherent to Even Debunk

So far the metadata analysis which has been analyzed by former Top intelligence officials has revealed that the "hack" was an inside job and that the data was copied to a thumb drive and that this all occurred on the East Coast and not in Russia or any other country. This is the only physical proof that has been submitted as to where the hacks have come from. It is definitely more proof than the Russian conspiracy theory. Lol. Metadata doesn't lie.
 
then why did the FBI and the DHS ask for it and were denied?

I don't know they're processes. What I do know is that you don't need to have the servers in your physical possession to determine if there was a hack.

I wonder if they used bleach bit before smashing the servers like Hillary.

LMAO! These tards are so corrupt it makes Trump look like a friggin saint
 
I picked up this article at another forum. This is the much more likely scenario than a big Russian/Trump ridiculous conspiracy theory. What do you think?

A New Report Raises Big Questions About Last Yearā€™s DNC Hack

It is now a year since the Democratic National Committeeā€™s mail system was compromisedā€”a year since events in the spring and early summer of 2016 were identified as remote hacks and, in short order, attributed to Russians acting in behalf of Donald Trump. A great edifice has been erected during this time. President Trump, members of his family, and numerous people around him stand accused of various corruptions and extensive collusion with Russians. Half a dozen simultaneous investigations proceed into these matters. Last week news broke that Special Counsel Robert Mueller had convened a grand jury, which issued its first subpoenas on August 3. Allegations of treason are common; prominent political figures and many media cultivate a case for impeachment.

The presidentā€™s ability to conduct foreign policy, notably but not only with regard to Russia, is now crippled. Forced into a corner and having no choice, Trump just signed legislation imposing severe new sanctions on Russia and European companies working with it on pipeline projects vital to Russiaā€™s energy sector. Striking this close to the core of another nationā€™s economy is customarily considered an act of war, we must not forget. In retaliation, Moscow has announced that the United States must cut its embassy staff by roughly two-thirds. All sides agree that relations between the United States and Russia are now as fragile as they were during some of the Cold Warā€™s worst moments. To suggest that military conflict between two nuclear powers inches ever closer can no longer be dismissed as hyperbole.

All this was set in motion when the DNCā€™s mail server was first violated in the spring of 2016 and by subsequent assertions that Russians were behind that ā€œhackā€ and another such operation, also described as a Russian hack, on July 5. These are the foundation stones of the edifice just outlined. The evolution of public discourse in the year since is worthy of scholarly study: Possibilities became allegations, and these became probabilities. Then the probabilities turned into certainties, and these evolved into what are now taken to be established truths. By my reckoning, it required a few days to a few weeks to advance from each of these stages to the next. This was accomplished via the indefensibly corrupt manipulations of language repeated incessantly in our leading media.

We are urged to accept the word of institutions and senior officials with long records of deception.

Lost in a year that often appeared to veer into our peculiarly American kind of hysteria is the absence of any credible evidence of what happened last year and who was responsible for it. It is tiresome to note, but none has been made available. Instead, we are urged to accept the word of institutions and senior officials with long records of deception. These officials profess ā€œhigh confidenceā€ in their ā€œassessmentā€ as to what happened in the spring and summer of last yearā€”this standing as their authoritative judgment. Few have noticed since these evasive terms first appeared that an assessment is an opinion, nothing more, and to express high confidence is an upside-down way of admitting the absence of certain knowledge. This is how officials avoid putting their names on the assertions we are so strongly urged to acceptā€”as the record shows many of them have done.

We come now to a moment of great gravity.

There has been a long effort to counter the official narrative we now call ā€œRussiagate.ā€ This effort has so far focused on the key events noted above, leaving numerous others still to be addressed. Until recently, researchers undertaking this work faced critical shortcomings, and these are to be explained. But they have achieved significant new momentum in the past several weeks, and what they have done now yields very consequential fruit. Forensic investigators, intelligence analysts, system designers, program architects, and computer scientists of long experience and strongly credentialed are now producing evidence disproving the official version of key events last year. Their work is intricate and continues at a kinetic pace as we speak. But its certain results so far are two, simply stated, and freighted with implications:

  • There was no hack of the Democratic National Committeeā€™s system on July 5 last yearā€”not by the Russians, not by anyone else. Hard science now demonstrates it was a leakā€”a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNCā€™s system. This casts serious doubt on the initial ā€œhack,ā€ as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.

the article, which I read in full, has sort of been debunked...

Also, the Russian embassy homes in / near D.C. were shut down and diplomats kicked out because our gvt believed they, the Russians in these embassy homes, were involved with the DNC theft and leaks and it was reported that they had super duper spying equipment in them...

These Russian embassy centers could have easily had a server fast enough to download the files in the 87 seconds the article mentions.

But this article is neither conclusive proof nor strong evidence. Itā€™s the extremely long-winded product of a crank, and itā€™s been getting attention only because it appears in a respected left-wing publication like The Nation. Anyone hoping to read it for careful reporting and clear explanation is going to come away disappointed, however.

If you want to get to the actual claims being made, youā€™ll have to skip the first 1,000 or so words, which mostly consist of breathtakingly elaborate throat-clearing. (ā€œ[H]ouses built on sand and made of cards are bound to collapse, and there can be no surprise that the one resting atop the ā€˜hack theory,ā€™ as we can call the prevailing wisdom on the DNC events, appears to be in the process of doing so.ā€) About halfway through, you get to the crux of the article: A report, made by an anonymous analyst calling himself ā€œForensicator,ā€ on the ā€œmetadataā€ of ā€œlocked filesā€ leaked by the hacker Guccifer 2.0.

This should, already, set off alarm bells: An anonymous analyst is claiming to have analyzed the ā€œmetadataā€ of ā€œlocked filesā€ that only this analyst had access to? Still, if Iā€™m understanding it correctly, Lawrenceā€™s central argument (which, again, rests on the belief that Forensicatorā€™s claims about ā€œmetadataā€ are meaningful and correct) is that the initial data transfer from the DNC occurred at speeds impossible via the internet. Instead, he and a few retired intel-community members and some pseudonymous bloggers believe the data was transferred to a USB stick, making the infiltration a leak from someone inside the DNC, not a hack.

The crux of the whole thing ā€” the opening argument ā€” rests on the fact that, according to ā€œmetadata,ā€ the data was transferred at about 22 megabytes per second, which Lawrence and Forensicator claim is much too fast to have been undertaken over an internet connection. (Most connection speeds are measured at megabits per second, not megabytes; 22 megabytes per second is 176 megabits per second.) Most households donā€™t get internet speeds that high, but enterprise operations, like the DNC ā€” or, uh, the FSB ā€” would have access to a higher but certainly not unattainable speed like that.

If thatā€™s your strongest evidence, your argument is already in trouble. But the real problem isnā€™t that thereā€™s a bizarre claim about internet speed that doesnā€™t hold up to scrutiny. Itā€™s that Lawrence is writing in techno-gibberish that falls apart under even the slightest scrutiny. You could try to go on, but to what end? As an example: Lawrence writes that ā€œresearchers penetrated what Folden calls Gucciferā€™s top layer of metadata and analyzed what was in the layers beneath.ā€ What on earth is that supposed to mean? We donā€™t know what ā€œmetadataā€ weā€™re talking about, or why it comes in ā€œlayers,ā€ and all Iā€™m left with is the distinct impression that Lawrence doesnā€™t either. Even if you wanted to take this seriously enough to engage with, you canā€™t, because it only intermittently makes sense. There may be evidence out there, somewhere, that a vast conspiracy theory has taken place to cover up a leak and blame Russia. But itā€™s going to need to be at least comprehensible.
The Nation Article About the DNC Hack Is Too Incoherent to Even Debunk

So far the metadata analysis which has been analyzed by former Top intelligence officials has revealed that the "hack" was an inside job and that the data was copied to a thumb drive and that this all occurred on the East Coast and not in Russia or any other country. This is the only physical proof that has been submitted as to where the hacks have come from. It is definitely more proof than the Russian conspiracy theory. Lol. Metadata doesn't lie.

I also heard that the hacker on the East Coast was discovered to be from Alaska, a state purchased from Russia long ago.

Coincidence?
 
The Nationā€˜s Patrick Lawrence wrote a lengthy review of the findings made by various computer experts formerly with the NSA. Published this week, the left-wing magazineā€™s report notes two bases for their conclusion: (1) hard science shows that a remote hack of the DNC servers resulting in the breach that actually occurred would have been technologically impossible; (2) forensic review of the initial Guccifer 2.0 documents proves that they are poorly-disguised cut-and-paste jobsā€“forgeriesā€“intended to finger Russia.

Lawrence, by way of the expertsā€™ findings, concludes that the so-called ā€œhackā€ was actually an inside job by someone with internal access to the DNCā€™s computer network. In other words, the DNC has (or had) a leak.

The report mostly relies on the work of Veteran Intelligence Professionals for Sanity (VIPS), which was founded in 2003 in order to push back against the false claims of Iraqi WMD emanating from the second Bush White House. Despite mostly being ignored by the media so far, VIPS diligently set to work on unraveling the cocoon of misinformation surrounding Russiagate and the DNC hack narrative.

Four members of VIPS are currently concentrating on the task. They are: (1) William Binney, the NSAā€™s former technical leader who also designed many of the programs now in use by the agency; (2) Kirk Wiebe, a former senior analyst with the NSAā€™s SIGINT Automation Research Center; (3) Edward Loomis, the former technical director at the NSAā€™s Office of Signal Processing; and (4) Ray McGovern, former chief of the CIAā€™s Soviet Foreign Policy Branch.

First, VIPS noted, the NSA has the technical prowess to root out exactly what happened because their publicly known programs alone are capable of capturing any and all electronic transfers of data. As VIPS noted, ā€œIf NSA cannot produce such evidenceā€”and quicklyā€”this would probably mean it does not have any.ā€

Thatā€™s a drum VIPS has been beating for awhile, but, of course, thatā€™s not hard evidence. There simply wasnā€™t much of anyā€“until very recently. Those recent documents undergird the reportā€™s first contentionā€“the technological impossibility of the DNC breach having been a long-distance hack. Lawrence describes the impossibility like this:

ā€œThe metadata established several facts in this regard with granular precision: On the evening of July 5, 2016, 1,976 megabytes of data were downloaded from the DNCā€™s server. The operation took 87 seconds. This yields a transfer rate of 22.7 megabytes per second. These statistics are matters of record and essential to disproving the hack theory. No Internet service provider, such as a hacker would have had to use in mid-2016, was capable of downloading data at this speed.ā€

What is the top possible speed? Somewhere around 16 megabytes per second. According to Skip Folden, a former IBM program manager and independent analyst, 22.7 megabytes per second is beyond unlikely under the circumstancesā€“unless youā€™re downloading the files directly using a storage device like a USB drive. He said:

ā€œA speed of 22.7 megabytes is simply unobtainable, especially if we are talking about a transoceanic data transfer. Transfer rates of 23 MB/s are not just highly unlikely, but effectively impossible to accomplish when communicating over the Internet at any significant distance. Further, local copy speeds are measured, demonstrating that 23 MB/s is a typical transfer rate when using a USBā€“2 flash device (thumb drive).ā€

As to the reportā€™s second contentionā€“that the Guccifer 2.0 documents were tainted to cast curious eyes toward Russiaā€“Folden notes that a simple peeling away of the documentsā€™ top layer of metadata shows the sloppy and intentional misattribution.

The report is lengthy and doesnā€™t stop there. Lawrence notes multiple additional problems with the now-broken narrative: CrowdStrike is essentially an arm of the DNC itself; Dmitri Alperovitch, CrowdStrikeā€™s co-founder and chief technology officer is consumed by Russophobia; the FBI has never once examined the DNCā€™s servers by themselves; that famous Intelligence Community Assessment breathlessly reported as the cumulative work of 17 national security agencies was actually the work of three ā€œhand-pickedā€ analysts.

Lawrence even raises the possibility that Guccifer 2.0 was a whole-cloth creation of the DNC used to deflect away from the leakā€™s contents and send everyone scrambling to find Russians underneath all the nationā€™s laptops and ashtrays.

That question, for now, will have to remain unanswered, but it looks like the official story is swiftly crumbling away.
 
You know what's really funny about this?

The tards are actually arguing that they don't believe there could be a commie inside the DNC working for Russia.

:lol::lol::lol::lol:
 
c - both is also possible.


personally I don't care. I maintain and have all along that this "Rooooshins!" narrative was pumped up by the left to stick a perpetual thorn in Trump's ass, and that's exactly what it's done.
 
c - both is also possible.


personally I don't care. I maintain and have all along that this "Rooooshins!" narrative was pumped up by the left to stick a perpetual thorn in Trump's ass, and that's exactly what it's done.

I suppose, but there is no actual evidence to support a Russian hack job, and there IS evidence to support an insider leak.
 
That's not what the article says. The article says exactly what I said. But you keep going with your "The Russians" delusion. I couldn't care less. Intelligent people will read and consider the article instead of dismissing it due to partisanship and silly ideological differences.
I've read the article, but that is all I have been able to find on the topic. Where has VIPS published the totality of their findings? No white paper, abstract, summary, peer review or outline with methodology from these 'professionals'?

According to the article, VIPS disclosed portions of their findings over the period from January to July with the earliest being to President Obama just before he left office. Where is a credible paper of of their findings? They've certainly had time to produce one replete with their findings. Or why not even an outline of their findings as a basis for their conclusions. For instance, how did VIPS get their hands on the metadata? Did the NSA, CIA or FBI supply it from their evidence from an ongoing investigation? That wouldn't pass any smell test nor does their claim at this time without much more information and PROOF.

I've looked since yesterday since the first OP on this jumped up on the forum. It's not credible until there is firm evidence to shitcan the findings of the 17 Intelligence agencies confirming Russian involvement.

There are links in the link. Click on them.
I looked at the added links and there was NOTHING there regarding your OP and I wasn't going to waste time.

So you have nothing in response? Don't want to respond to my post because you are unble to make a response? Got it!!!!

Most leftwingnuts admit the "17" total was fake news.
Who's got their hand up your nether regions Puppet Boi? Piss Off you trolling POS!
 
"The CIA put a Russian watermark on the leak after the fact for the DNC."




11. ā€œItā€™s clear,ā€ another forensics investigator wrote, ā€œthat metadata was deliberately altered and documents were deliberately pasted into a Russianified [W]ord document with Russian language settings and style headings.ā€

Time stamps in the metadata provide further evidence of what happened on July 5. The stamps recording the download indicate that it occurred in the Eastern Daylight Time Zone at approximately 6:45 pm. This confirms that the person entering the DNC system was working somewhere on the East Coast of the United States.


They found that the first five files Guccifer made public had each been run, via ordinary cut-and-paste, through a single template that effectively immersed them in what could plausibly be cast as Russian fingerprints. They were not: The Russian markings were artificially inserted prior to posting. ā€œItā€™s clear,ā€ another forensics investigator self-identified as HET, wrote in a report on this question, ā€œthat metadata was deliberately altered and documents were deliberately pasted into a Russianified [W]ord document with Russian language settings and style headings.ā€


The list of the CIAā€™s cyber-tools WikiLeaks began to release in March and labeled Vault 7 includes one called Marble that is capable of obfuscating the origin of documents in false-flag operations and leaving markings that point to whatever the CIA wants to point to."
A New Report Raises Big Questions About Last Yearā€™s DNC Hack
 

Forum List

Back
Top