The fast and furious shenanigans of the Democrat National Party just keep on keeping on, and there is no shame in national Democrat leaders being caught once again in deliberate disinformation, deception, and degradation. All that is important to them is continuing to move their socialist-progressive agenda down the field; even if only yard-by-yard rather than in large junks. Move the agenda, move the agenda, continue to make transforming America into something America was never, ever intended to become is the goal, is the objective, and is the on-going work of Democrats. It simply does not matter how the goal is accomplished just get to the goal at any cost.
Creating a horrendous story of Russian hacking into private emails, confidential memos and work product, and creating the illusion that Mr. Trump and the Russians were co-conspirators has been on center stage since the day after the November elections when shock of all shocks was delivered by the voters of America defeating Democrat Hillary Clinton, and the Democrat National Party message and agenda. Still not recovered from this egregious unexpected event, the National Democrats (and it has trickled down to states) continue to play the victim violated by Russians who “hacked” into their computer system. Almost as quickly, each accusation is proven false beyond a doubt, but truth and facts never get in the way of Democrats. At worse they simply change the narrative, and continue marching toward their goal of a solidly socialistic society; with them in charge of course! Inventing the Russian hacking story the day after their devastating defeat last November seemed like a good idea at the time. While there were a few crumbs to demonstrate Russian attempts to hack into America, and reasonable suspicion to be sufficiently aware said plans/attempts existed and brought to Obama’s attention in 2014, there was “no credible and actionable intelligence to act on.” But truth and facts never get in the way of Democrats and a good story that is intended to elicit emotions. Even being confronted with the reality that their story lacked credibility only causes Democrats to shift slightly as they stay the course of implementing their agenda, their goals, and their utopian society.
Advertisement article continues below
Are you a Deplorable? Check out these "Deplorable" coffee mugs, and start your morning off right! Or maybe you want to build the wall! Be sure to check out the biggest and best conservative store on the Internet!
Well now comes a bombshell of a report mentioned below by Benny Johnson, independent investigative journalist, demonstrating what Forensic Computer Experts claim was never a hacking by Russians, but was an inside job in the DNC leaking data and other critical information and communications. No Russians. No Trump. Someone inside the Democrat National Committee Headquarters!
So…Hillary, shut-up! So…Chuck Schumer, shut-up! So…Nancy Pelosi, shut-up! And the same with your prostituted mouth pieces in the Main-stream media!
Bombshell Report on the DNC Hack by Forensic Experts Claims It Was an Inside Job, Not the Russians
By Benny Johnson on Independent Journal Review
Much of the past year, politically speaking, has been mired in the Russia scandal.
However, the countless multiple investigations — that are still ongoing — and nonstop political scapegoating have resulted in very little if any hard evidence.
The murky, obtuse, politically motivated rationale and grandstanding is beginning to test the tolerance of the public. It is also beginning to test those on the intellectual left, who have every reason to want President Donald Trump implicated in a crime to hasten his departure from office.
However, without evidence of a crime there can be no conviction.
Now, the infamous hack of the Democratic National Committee, the cornerstone of the Russia hacking allegations, indeed the root which holds together the very underpinnings of the scandal, has been blown wide open by a new bombshell report by Patrick Lawrence of The Nation, one of the country’s most liberal publications.
The report details at length for the first time solid evidence in the case, compiled through exhaustive interviews with forensic experts and former national security intelligence officers who are independently investigating the DNC “hack.”
The conclusion of the report: This was not a hack — a hack was impossible based on the evidence. This was instead an inside job by someone who directly downloaded information from the DNC servers onto a hard device and transported it, intending it to be released.
Here are the most compelling arguments in the report:
A large group of experts agree, there is no evidence to support a “hack” of the DNC.
There has been a long effort to counter the official narrative we now call “Russiagate.” This effort has so far focused on the key events noted above, leaving numerous others still to be addressed. Until recently, researchers undertaking this work faced critical shortcomings, and these are to be explained. But they have achieved significant new momentum in the past several weeks, and what they have done now yields very consequential fruit. Forensic investigators, intelligence analysts, system designers, program architects, and computer scientists of long experience and strongly credentialed are now producing evidence disproving the official version of key events last year. Their work is intricate and continues at a kinetic pace as we speak. But its certain results so far are two, simply stated, and freighted with implications:
There was no hack of the Democratic National Committee’s system on July 5 last year—not by the Russians, not by anyone else. Hard science now demonstrates it was a leak—a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNC’s system. This casts serious doubt on the initial “hack,” as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.
The transfer times of the files would be impossible without someone in the DNC building.
Forensicator’s first decisive findings, made public in the paper dated July 9, concerned the volume of the supposedly hacked material and what is called the transfer rate—the time a remote hack would require. The metadata established several facts in this regard with granular precision: On the evening of July 5, 2016, 1,976 megabytes of data were downloaded from the DNC’s server. The operation took 87 seconds. This yields a transfer rate of 22.7 megabytes per second.
These statistics are matters of record and essential to disproving the hack theory. No Internet service provider, such as a hacker would have had to use in mid-2016, was capable of downloading data at this speed. Compounding this contradiction, Guccifer claimed to have run his hack from Romania, which, for numerous reasons technically called delivery overheads, would slow down the speed of a hack even further from maximum achievable speeds.
What is the maximum achievable speed? Forensicator recently ran a test download of a comparable data volume (and using a server speed not available in 2016) 40 miles from his computer via a server 20 miles away and came up with a speed of 11.8 megabytes per second—half what the DNC operation would need were it a hack. […]
“A speed of 22.7 megabytes is simply unobtainable, especially if we are talking about a transoceanic data transfer,” Folden said. “Based on the data we now have, what we’ve been calling a hack is impossible.” Last week Forensicator reported on a speed test he conducted more recently. It tightens the case considerably. “Transfer rates of 23 MB/s (Mega Bytes per second) are not just highly unlikely, but effectively impossible to accomplish when communicating over the Internet at any significant distance,” he wrote. “Further, local copy speeds are measured, demonstrating that 23 MB/s is a typical transfer rate when using a USB–2 flash device (thumb drive).”
The person downloading the files was not in Europe or Russia, but on the East Coast of the United States.
Time stamps in the metadata provide further evidence of what happened on July 5. The stamps recording the download indicate that it occurred in the Eastern Daylight Time Zone at approximately 6:45 pm. This confirms that the person entering the DNC system was working somewhere on the East Coast of the United States. In theory the operation could have been conducted from Bangor or Miami or anywhere in between—but not Russia, Romania, or anywhere else outside the EDT zone. Combined with Forensicator’s findings on the transfer rate, the time stamps constitute more evidence that the download was conducted locally, since delivery overheads—conversion of data into packets, addressing, sequencing times, error checks, and the like—degrade all data transfers conducted via the Internet, more or less according to the distance involved.
The Russian “fingerprints” on the documents were put there on purpose:
In addition, there is the adulteration of the documents Guccifer 2.0 posted on June 15, when he made his first appearance. This came to light when researchers penetrated what Folden calls Guccifer’s top layer of metadata and analyzed what was in the layers beneath. They found that the first five files Guccifer made public had each been run, via ordinary cut-and-paste, through a single template that effectively immersed them in what could plausibly be cast as Russian fingerprints. They were not: The Russian markings were artificially inserted prior to posting. “It’s clear,” another forensics investigator self-identified as HET, wrote in a report on this question, “that metadata was deliberately altered and documents were deliberately pasted into a Russianified [W]ord document with Russian language settings and style headings.”
To be noted in this connection: The list of the CIA’s cyber-tools WikiLeaks began to release in March and labeled Vault 7 includes one called Marble that is capable of obfuscating the origin of documents in false-flag operations and leaving markings that point to whatever the CIA wants to point to. (The tool can also “de-obfuscate” what it has obfuscated.) It is not known whether this tool was deployed in the Guccifer case, but it is there for such a use.
No independent agency has ever been allowed access to the “hacked” DNC server.
The FBI has never examined the DNC’s computer servers—an omission that is beyond preposterous. It has instead relied on the reports produced by Crowdstrike, a firm that drips with conflicting interests well beyond the fact that it is in the DNC’s employ. Dmitri Alperovitch, its co-founder and chief technology officer, is on the record as vigorously anti-Russian. He is a senior fellow at the Atlantic Council, which suffers the same prejudice. Problems such as this are many.
“We continue to stand by our report,” CrowdStrike said, upon seeing the VIPS blueprint of the investigation. CrowdStrike argues that by July 5 all malware had been removed from the DNC’s computers. But the presence or absence of malware by that time is entirely immaterial, because the event of July 5 is proven to have been a leak and not a hack. Given that malware has nothing to do with leaks, CrowdStrike’s logic appears to be circular.
Experts in the field of intelligence gathering and hacking agree, this was not a Russian hack:
All those interviewed came in between 90 percent and 100 percent certain that the forensics prove out. I have already quoted Skip Folden’s answer: impossible based on the data. “The laws of physics don’t lie,” Ray McGovern volunteered at one point. “It’s QED, theorem demonstrated,” William Binney said in response to my question. “There’s no evidence out there to get me to change my mind.” When I asked Edward Loomis, a 90 percent man, about the 10 percent he held out, he replied, “I’ve looked at the work and it shows there was no Russian hack. But I didn’t do the work. That’s the 10 percent. I’m a scientist.”
I deeply encouraged the readers to look into this report and decide for themselves. However in the obtuse murkiness of the ongoing Russia saga, this first piece of hard, fact-based evidence is a refreshing glimmer of light.
Viewpoints expressed herein are of the article’s author(s), or of the person(s) or organization(s) quoted or linked therein, and do not necessarily represent those of True Conservative Pundit
Subscribe to my daily newsletter, and join hundreds of daily readers and receive news and relevant commentary
If you value what you see on True Conservative Pundit, please consider donating, any amount helps.
LYLE J. RAPACKI, Ph.D. is an Intelligence and Threat Assessment Specialist who has provided intelligence briefings and consultations to selected members of the Arizona State Legislature on Border Security, Deviant Movement Groups, and threats to State sovereignty from May 2010 thru April of 2018. Dr. Rapacki’s reports, briefings and consultations have enlarged to include elected and law enforcement officials across the country. Lyle believes he is now being directed to sound the Shofar of Warning to the Remnant Church of the challenges and threats directed ahead. He is the author of the successful Amazon Kindle booklet: “Our Forefathers truly Appealed to Heaven” $5 Kindle.