You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Home Front: Politix
GREATEST HITS, 21: Report says DNC files were copied, not hacked, 5 days before murder of Seth Rich
2017-12-26
[WorldTribune] A report by an IT specialist gives detailed information on how Democratic National Committee (DNC) files that were given to WikiLeaks were copied locally, contradicting the narrative that the DNC was hacked by Russia.

The leaked DNC emails detailed efforts by the committee to rig the Democratic primary in favor of Hillary Clinton.

Private investigators have claimed there is evidence that DNC staffer Seth Rich was the source WikiLeaks used to obtain the emails, which were copied on July 5, 2016. Rich was murdered on July 10, 2016.

The DNC Chairwoman Debbie Wasserman Schultz as well as Chief executive Amy Dacey and Chief Financial Officer Brad Marshall all resigned after the devastating release of hacked emails from the committee.

Key findings in the report by the IT specialist known as The Forensicator:

  • On 7/5/2016 at approximately 6:45 PM Eastern time, someone copied the data that eventually appears on the "NGP VAN" 7zip file (the subject of this analysis). This 7zip file was published by a persona named Guccifer 2, two months later on September 13, 2016.

  • Due to the estimated speed of transfer (23 MB/s) calculated in this study, it is unlikely that this initial data transfer could have been done remotely over the Internet.

  • The initial copying activity was likely done from a computer system that had direct access to the data. "Direct access" means that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high speed network (LAN).


  • This initial copying activity was done on a system where Eastern Daylight Time (EDT) settings were in force. Most likely, the computer used to initially copy the data was located somewhere on the East Coast.

  • The data was likely initially copied to a computer running Linux, because the file last modified times all reflect the apparent time of the copy and this is a characteristic of the Linux ’cp’ command (using default options).

  • A Linux OS may have been booted from a USB flash drive and the data may have been copied back to the same flash drive, which will likely have been formatted with the Linux (ext4) file system.

Analysts believe the most important aspect in The Forensicator’s report is the "estimated speed of transfer (23 MB/s)" at which the documents were copied. Analysts say it’s "inconceivable" the DNC documents could have been copied at such speed from a remote location.

Disobedient Media noted that "The Forensicator concluded that the chance that the files had been accessed and downloaded remotely over the Internet were too small to give this idea any serious consideration. He explained that the calculated transfer speeds for the initial copy were much faster than can be supported by an Internet connection.

"This is extremely significant and completely discredits allegations of Russian hacking made by both Guccifer 2.0 and Crowdstrike."
Posted by:Anomalous Sources

#9  Wasn't there an article or something about four months ago that said the DNC files were copied, not hacked???

I wonder why someone on one of those Congressional committees hasn't brought this up?
Posted by: Sock Puppet of Doom   2017-12-26 19:34  

#8  We're not talking about computer geniuses here, Speaking. Whatever means were used to copy that data from the host server, it's the system administrator's fault and also the fault of whoever was dumb enough to hire him (cough, Debbie, cough, cough, Wasserman, HACK!!!, Schultz, cough, cough). Blaming Trump and the Russians is so damn ludicrous that only the mainstream media could take it seriously. If your company is a victim of industrial espionage via the Internet, the CIO gets fired. If the CIO keeps his or her job after that the shareholders need to raise hell and then the CEO gets fired. You certainly don't want simpletons like that trying to run the country.

And it is truly amazing what you can do these days with USB memory sticks. A lot of mid sized companies could probably put their entire database on one of those things. I was personally amazed the first time I ever booted a Linux OS from one. The possibilities are astounding but the IT staff needs to keep those USB ports secure and anybody caught with an unauthorized memory stick gets promptly escorted to the parking lot minus the stick.

Finally, if the data went over the Internet, it didn't have to go just from the local host server's I/O bus and the local fiber optic network. That was just the beginning. There would have been an unknown number of intermediate nodes and cables between the host and the client covering several thousands of miles if the client was in Russia. All that takes time.
Posted by: Abu Uluque   2017-12-26 18:26  

#7  I am amazed that a system admin would leave a server vulnerable to USB sticks when the defense is so trivial. The DNC must have hired a bunch of Pakistani spies to administer their systems. Oh yeah ...
Posted by: P. Speaking for B.   2017-12-26 17:24  

#6  Yeah, the Left is going to construct a scenario in which the fastest possible fiber-optic lines are in use, barely available in America, and say "naah naah you can't prove it naah naah".

23 MB/s is crazy fast, hardly possible over Comcast or any of the other ISPs. It was a local copy to a USB stick.
Posted by: Herb McCoy7309   2017-12-26 17:16  

#5  Read this last Fall. Simple answer is maybe.

The internet data download would depend on the host server's bus, NIC and internet throughput. Without having the hardware specs it is impossible to tell.
Posted by: Woodrow   2017-12-26 13:25  

#4   Vince Ricardo: Are you interested in joining? The benefits are terrific. The trick is not to get killed. That's really the key to the benefit program.
Posted by: Hupusonter Oppressor of the Brontosaurs5491   2017-12-26 09:26  

#3  Hey there fella, care if we have a look there inside your gym bag ?
Posted by: Besoeker   2017-12-26 08:55  

#2  Seth's brother was trying to get in touch with Israeli cell phone digital forensics CellBrite after Seth's death. However, if the data passed through to the Samsung Micro card the phone would not have the data. And who knows if WikiLeaks are the ones that ended up with the card.
Posted by: Ulaigum Ebbineng7056   2017-12-26 01:31  

#1  Samsung 16GB Class 6 Micro SDHC up to 24MB/s with Adapter (MB-MS16DA/AM)

The transfer rate indicates the data copied was possibly copied onto the above memory card in a smart phone that was attached to the database server or a local network server with access to the DNC database. That would eliminate tracing to an IP address of a pc.
Posted by: Ulaigum Ebbineng7056   2017-12-26 01:25  

00:00