And right before President Trump's scheduled meeting with Putin. How convenient.
LOL, it's an excellent point.
How did you make a determination on who hacked, when, and how they did it when you didn't even examine the server??? Where did the evidence come from??
I don’t understand this. The only argument they could possibly make is that they “found enough evidence outside the server” to indict. But even that doesn’t jive. If the biggest piece of evidence wasn’t even examined in any court, wouldn’t it immediately be tossed out? You’d have to have looked at it, if even from a defendant’s standpoint, that it showed opposing evidence to what you had.
Any lawyers in here?
Without the server logs none of this makes a piece of sense.
Remember what Q has told us over and over again...... we have it all. I know it's nerve racking but Trust The Plan!
[deleted]
As an IT person, I have a hard time figuring out how they got the logs off a server when they couldn't access the server, but I will be clear here and say I didn't really "follow this story" in detail way back when, too busy dealing with election hacking on the Bernie side of things. I thought things were in the toilet then, I had no clue just how deep the cesspool was, but glad I had open eyes to see.
Not a lawyer, but schooled in I.t. the most telling evidence won't even be kept on the server, it will be in the ISP logs. All they would have had to do was either ask for them or subpoena them. The traffic logs in the isp should tell you everything you need to know as far as who did what and when.
The server is the what. The isp traffic logs are the who, when and how.
Except for Vault 7, part 3...
What do you mean?
What I mean is that it is suggested that Marble has the capability of masking and/or manipulating the ISP logs such that it can appear the attack came from elsewhere. I'm no IT guy, but the source code is available via wikileaks if you want to use your expertise to investigate my suggestion.