Anonymous ID: 46e5ae March 7, 2019, 6:02 a.m. No.5556314   🗄️.is đź”—kun   >>6345

>>5556186

>>5556207

Former NSA experts say it wasn’t a hack at all, but a leak—an inside job by someone with access to the DNC’s system.

https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/

 

Metadata is information recorded in a file for archiving purposes and is not displayed when a file is open. It can include the last date a file is modified and note what software and devices were involved in creating the file, among other information.

When files are copied to a new device, the metadata can record the time each file finishes being duplicated as the time it was “last modified.”

 

A blogger named “The Forensicator” analyzed the "last modified" times in one set of documents released by Guccifer 2.0. Based on the size of the documents and the times they were downloaded, Forensicator calculated that a hacker was able to copy the files at a speed of more than 20 megabytes per second.

 

That is faster than consumer internet services in the United States can upload documents.

 

As a result, Forensicator concluded that the documents could not have been copied over the internet. Instead, someone with physical access to the network must have copied them in person to a USB drive, the blogger concluded.

https://thehill.com/policy/cybersecurity/346468-why-the-latest-theory-about-the-dnc-not-being-a-hack-is-probably-wrong

 

https://krebsonsecurity.com/2017/01/the-download-on-the-dnc-hack/

 

From Dec 29 2016

Actions in Response to Russian Malicious Cyber Activity and Harassment

Today, President Obama authorized a number of actions in response to the Russian government’s aggressive harassment of U.S. officials and cyber operations aimed at the U.S. election in 2016. Russia’s cyber activities were intended to influence the election, erode faith in U.S. democratic institutions, sow doubt about the integrity of our electoral process, and undermine confidence in the institutions of the U.S. government. These actions are unacceptable and will not be tolerated.

https://obamawhitehouse.archives.gov/the-press-office/2016/12/29/fact-sheet-actions-response-russian-malicious-cyber-activity-and

 

From Dec 29 2016

GRIZZLY STEPPE – Russian Malicious Cyber Activity

This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of

Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document

provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.

https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf

Anonymous ID: 46e5ae March 7, 2019, 6:20 a.m. No.5556472   🗄️.is đź”—kun

>>5556423

I think that we'll be the biggest help to normies by showing them what's going on in real time.

 

When Zuck goes down, they'll want to know why.

 

When the Mueller report comes out with no collusion, they'll want to know why. It's all huge and complicated - it's why Q started so long ago, so WE could understand and help show the way.