Count 1, items 6 & 7 of the Mueller’s July 13, 2018 Indictment states that the Russian Main Intelligence Directorate of the General Staff…
justice.gov/file/1080281/d…
It goes on to say that the Conspirators, around June 2016, used Guccifer 2.0 persona to release “stolen documents” through a website maintained by “Organization 1” (Wikileaks) and continued to do so until November 2016.
The IC Report on January 6, 2018 states from July 2015 “Russian intelligence Services” gained access to DNC networks and maintained that…
dni.gov/files/document…
IC Report signatories were CIA Director John Brennan, FBI Director Jim Comey, NSA Chief Admiral Rogers, and Director of National Intelligence James Clapper.
Does this not sound like TWO different “operations they're trying to report?” A series in 2015 and another in 2016? 2015 done by “Russian Intelligence Services” and 2016 done by “GRU?”
Aha! Here we go. Maybe the DNC Lawsuit filed April 20, 2018 against Trump, Wikileaks, and others can help us out with this debacle.
"General Allegation” #220 out of 233 (ahaha, yeah, really):
assets.documentcloud.org/documents/4443…
Well, sounds pretty straight forward. 2 “separate and independent” “hacks” done in 2 different years; 2015 & 2016.
June 27, 2017 James Clapper, the former director of national intelligence, told CNN that US intelligence had been aware of the intrusions since the beginning in the summer of 2015.
cnn.com/2017/06/27/pol…
The first quiet warning of the Russian operation came in September 2015, when an agent from the FBI's Washington Field Office notified the Democratic National Committee.
The DNC technician, an outsourced employee, did scan the system networks but found nothing.
The FBI tells CNN it made repeated attempts to alert more senior DNC staff.
In November 2015, the FBI called again with even more alarming news: a DNC computer was now transmitting information back to Russia.
Clapper makes an important distinction, both nation states and non-nation state entities ...including criminals use simple spear phishing emails.
IC Report states first wave of attacks came in July, 2015. FBI started notifying the DNC of the attacks in September, 2015 and continued to do so up to November, 2015. DNC’s “outsourced” IT dude scanned their systems and didn’t find anything. ¯\_(ツ)_/¯
Miraculously the DNC’s “computer tech” finally discovers the breach in April, 2016, thereby prompting the DNC to hire a private, 3rd party company, Crowdstrike ...
DNC executives maintained that they were not made aware by the FBI of any “hacking” attempts between September, 2015 and November 2015.
Where’s the information from 2015!?! I sure as hell can’t find any. It’s like 2015 disappeared and only 2016 exists.
Where’s the server? We wants the servers, Lebowski.
Okay, I think we all can now realize there are TWO, count ‘em, TWO different phases of "attacks", on 2 separate occasions deemed “independent” in the DNC lawsuit, between 2015 and 2016. Hmm, well that’s interesting. The MSM sure doesn’t make these distinctions, do they …
Keep in mind, there are, as I see it, 4 sets of servers. 1) Hillary’s private servers. 2) DNC’s servers. 3) DCCC’s servers. 4) Democratic Caucasus Servers from the the farce investigation we know as the Awan case.
Guccifer 2.0 is listed as a persona of Russia’s GRU in the indictment, attributed to Unit 74455 in Moscow, whom “assisted in the release, promotion and publication of anti-Clinton content on social media accounts operated by the GRU, utilizing DCLeaks .com and Wikileaks)
July 8, 2018 - Well, here’s William “Bill” Binney, Former Technical Director of the NSA, Army veteran where he served in the Army Security Agency specializing in “Signals Intelligence”, 40 year veteran data analyst with the bulk of his career analyzing large amounts of data…
Binney states that by request from Mike Pompeo, he performed this analysis.
The video link above, Binney outlines his analysis of the Guccifer 2.0 releases and explains his findings, but we'll go through them right quick.
Binney explains, in high level detail, how he calculated the rate of transfer during upload of the stolen documents by looking at the time stamps of the files and measuring the bytes or bits between each file transfer.
Important Note by me: The timestamp IS NOT an indication of where the file originated. Any system can set any timezone, or if using your host system with a Virtual Machine, you can have 2 timezone settings or more. Put a pin in that.
Binney states that the highest rate of transfer they achieved was 49.1 megabytes per second utilizing a 1 gigabyte [.zip] file. Binney goes on to say that “we knew that couldn’t go across the network.” That means over the internet those transfer rates are not achievable.
Binney tested the 1G file transfer speeds with the Netherlands, Albania, Blegrade, and the UK. Binney states the fastest rate of transfer he achieved was 12 megabtes per second, and that came from a data center in New Jersey to a data center in the UK…
THIS WAS AN IMPOSSIBLE TRANSFER, OVER THE NETWORK, AT THAT RATE!
Binney - “However, it is a perfect download rate for a thumb drive.”
This was, without a doubt, a LOCAL file transfer, which means the DNC “hack” was downloaded to an external device (thumb drive) on site, or by someone within the required distance of the server to achieve a 49.1 megabyte per second transfer rate. NOT A “LONG DISTANCE” hack.
Binney proves Guccifer 2 manipulated data before leaks. “The whole thing by Guccifer 2 is a fabrication.” “It’s false.” “It’s still not an overseas hack.” “Selected people” from the NSA-CIA-FBI were chosen, not the ones actually doing the analysis, to give a “selected result”
The NSA monitors, per Binney, the “transoceanic” cables (internet lines exiting/entering the U.S.) “like hound dogs.” Binney says that the NSA can pinpoint down to the building, within a foreign country, any transfers crossing the transoceanic cables.
Put a fork in the Guccifer 2.0 HOAX, it’s done.
Logic culminated in the following paragraph. Everything above led to this one, simple paragraph.
Logic would tell you that plenty of Russian government officials were in the U.S. at these times, have their own embassy, and if they “hacked” these servers why the hell would they transfer the data across the network when they could carry by hand, on a thumb drive, …
/end