The Persistant Lie regarding the external hack of the DNC Servers

A new report  <https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/> states categorically that the Democratic National Committee (DNC) was not hacked by Russians–or anyone else–as frequently alleged by the mainstream media, liberal intelligentsia and anti-Trump politicians.

AP


The Nation‘s investigative journalist, Lawrence wrote a lengthy review in the left wing magazine about the findings authored by four computer experts formerly, with the NSA and other signals and IT security organisations. Namely William Binny (NSA); Skip Folden IBM Program Manager; Edward Loomis Jr. NSA; and  KirkWeibe NSA. The published findings in ‘The Nation’ this week, notes two bases for their conclusion:

(1) hard science shows that a remote hack of the DNC servers resulting in the breach that actually occurred would have been technologically impossible;

(2) forensic review of the initial Guccifer 2.0 documents proves that they are poorly-disguised cut-and-paste jobs–forgeries–intended to finger Russia.
Lawrence, by way of the experts’ findings, concludes that the so-called “hack” was actually an inside job by someone with internal access to the DNC’s computer network. In other words, the DNC has (or had) a leak.[…]

The IT Forensics group who carried out this analysis has credentials and background beyond reproach. The  VIPS’ membership include:-

FOR THE STEERING GROUP, VETERAN INTELLIGENCE PROFESSIONALS FOR SANITY…   VIPS

William Binney, former NSA Technical Director for World Geopolitical & Military Analysis; Co-founder of NSA’s Signals Intelligence Automation Research Center

Skip Folden, independent analyst, retired IBM Program Manager for Information Technology US (Associate VIPS)

Matthew Hoh, former Capt., USMC, Iraq & Foreign Service Officer, Afghanistan (associate VIPS)

Larry C Johnson, CIA & State Department (ret.)

Michael S. Kearns, Air Force Intelligence Officer (Ret.), Master SERE Resistance to Interrogation Instructor

John Kiriakou, Former CIA Counterterrorism Officer and former Senior Investigator, Senate Foreign Relations Committee

Linda Lewis, WMD preparedness policy analyst, USDA (ret.)

Lisa Ling, TSgt USAF (ret.) (associate VIPS)

Edward Loomis, Jr., former NSA Technical Director for the Office of Signals Processing

David MacMichael, National Intelligence Council (ret.)

Ray McGovern, former U.S. Army Infantry/Intelligence officer and CIA analyst

Elizabeth Murray, former Deputy National Intelligence Officer for Middle East, CIA

Coleen Rowley, FBI Special Agent and former Minneapolis Division Legal Counsel (ret.)

Cian Westmoreland, former USAF Radio Frequency Transmission Systems Technician and Unmanned Aircraft Systems whistleblower (Associate VIPS)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA

Sarah G. Wilton, Intelligence Officer, DIA (ret.); Commander, US Naval Reserve (ret.)

Ann Wright, U.S. Army Reserve Colonel (ret) and former U.S. Diplomat

“The metadata established several facts in this regard with granular precision:

On the evening of July 5, 2016, 1,976 megabytes of data were downloaded from the DNC’s server. The operation took 87 seconds. This download volume and timing yields a transfer rate of 22.7 megabytes per second. Please grab a calculator and satisfy yourself if you don’t believe this. These statistics are matters of record and essential to disproving the hack theory. No Internet service provider, such as a hacker, would have had the capability to download this date in the time admitted in the record at the transfer rates available in mid-2016.


What is the top possible speed? Somewhere around 16 megabytes per second. According to Skip Folden, a former IBM program manager and independent analyst, 22.7 megabytes per second is beyond unlikely under the circumstances–unless you’re downloading the files directly using a storage device like a USB drive. He said:
“A speed of 22.7 megabytes is simply unobtainable, especially if we are talking about a transoceanic data transfer. Transfer rates of 23 MB/s are not just highly unlikely, but effectively impossible to accomplish when communicating over the Internet at any significant distance.

Further, local copy speeds are measured, demonstrating that 23 MB/s is a typical transfer rate when using a USB–2 flash device (thumb drive).”
As to the report’s second contention–that the Guccifer 2.0 documents were tainted to cast curious eyes toward Russia–Folden notes that a simple peeling away of the documents’ top layer of metadata shows the sloppy and intentional misattribution.

The VIPS published three open letters detailing their analysis using proven data from the public record in the Congress.

Given that there is an extremely high probability that the DNC IT attack was an inside job carried out by an unknown individual or individuals on the servers within the DNC building on July 5 2016. The strong possibility that the shooting death of Seth Rich, who worked at the DNC; had access to the DNC servers through his job as DNC Voter Expansion Data Director; and was murdered on July 10 2016 is linked. The initial shooting happened at 0416 on the morning of July 10 when Rich was shot two times in the back at close range. It appeared that Rich was attempting to evade two individuals who were attacking him, causing bruising to his wrists and arms. The DC Metro Police  described the shooting as related to a bungled attempted at theft. None of Rich’s valuables were stolen however. 

AP

When DC Metro Police arrived at the scene Rich was conscious, though shocked, but not in pain. When asked his address he mistakenly gave a former long term address, which can be explained by his shocked state. He was transported to hospital and scheduled for surgery but was not considered fatally wounded at that point. Prior to surgery a group of DC Metro detectives and other police arrived at the A&E ward and demanded to be allowed to interview Rich before he entered surgery. Part of the ward was cleared by DC Metro Police to give privacy to the detectives carrying out the interview. No medical staff were allowed to be present. After a reported 15-20 minutes DC Metro Police emerged from the isolated A&E Ward and told medical staff that Seth Rich had expired during questioning. There was no call for assistance from a  ‘medical ‘Crash Team’ by the Police present and they quickly left the scene.

The official autopsy of Seth Rich remains unavailable and the actual cause of his death remains in question. The reason for the large DC Police presence at the hospital A&E remains unexplained, as does the clearing of part of the A&E of staff during the Police questioning of Rich. No request for information regarding police actions in the A&E or questions to DC Metro Police asking why no medical ‘Crash Team was called by police when it appeared that rich was expiring.

The murder of Seth Rich remains open, and several rewards for information leading to his killers has been offered. The meme regarding the Seth Rich murder has been progressively ‘modified’ regarding his admission, in a shocked but coherent state, to the hospital A&E, being strenuously downplayed and now seldom mentioned. The current meme appears to suggest that Rich died at the crime scene at 0416, and the hours between his shooting and his eventual death at the hospital A&E, whilst being questioned by DC Metro Police, downplayed or ‘forgotten’. The FBI has an open investigation into the murder of Seth Rich.