Tuesday, August 1, 2017

New Analysis Kills DNC Hacking Narrative, Shows Russian Data Trail Was Forged

(Jay SyrmopoulosWashington, D.C. – A damning new technical analysis reveals that files stolen from the Democratic National Committee (DNC) during the 2016 election cycle were most likely downloaded to a USB drive by someone with physical access to a computer connected to the DNC network. The analysis refutes the official narrative of the files being hacked remotely by the Russians – as popularized by the U.S. corporate media, without any actual evidence ever publicly presented.

Related Article: Secret CIA Assessment Story About Russia Helping Trump is the ‘Fake News’ You’ve Been Warned About

Source - The Free Thought Project

by Jay Syrmopoulos, July 23rd, 2017

The alleged DNC hacker, Guccifer 2.0, in an interview with Motherboard in June 2016, claimed he used a zero-day exploit to bypass security on the DNC servers and steal files, which he subsequently published under the title “NGP-VAN.”

While the DNC leak was quickly attributed to the Russian hackers by U.S. intelligence agencies, a document published by an individual going by the name Forensicator reveals how the 7-zip file published by Guccifer 2.0 was transferred at a speed of 23 MB/s, making it “unlikely that this initial data transfer could have been done remotely over the Internet.”

“The initial copying activity was likely done from a computer system that had direct access to the data,” the report from the Forensicator stated. “By ‘direct access’ we mean that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high speed network (LAN).”

Below are some of the key findings presented by the Forensicator’s report:
• On 7/5/2016 at approximately 6:45 PM Eastern time, someone copied the data that eventually appears on the “NGP VAN” 7zip file (the subject of this analysis). This 7zip file was published by a persona named Guccifer 2, two months later on September 13, 2016.
• Due to the estimated speed of transfer (23 MB/s) calculated in this study, it is unlikely that this initial data transfer could have been done remotely over the Internet.
• The initial copying activity was likely done from a computer system that had direct access to the data. By “direct access” we mean that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high speed network (LAN).
• They may have copied a much larger collection of data than the data present in the NGP VAN 7zip. This larger collection of data may have been as large as 19 GB. In that scenario the NGP VAN 7zip file represents only 1/10th of the total amount of material taken.
• This initial copying activity was done on a system where Eastern Daylight Time (EDT) settings were in force. Most likely, the computer used to initially copy the data was located somewhere on the East Coast.
• The data was likely initially copied to a computer running Linux, because the file last modified times all reflect the apparent time of the copy and this is a characteristic of the the Linux ‘cp’ command (using default options).
• A Linux OS may have been booted from a USB flash drive and the data may have been copied back to the same flash drive, which will likely have been formatted with the Linux (ext4) file system.
• On September 1, 2016, two months after copying the initial large collection of (alleged) DNC related content (the so-called NGP/VAN data), a subset was transferred to working directories on a system running Windows. The .rar files included in the final 7zip file were built from those working directories.
• The computer system where the working directories were built had Eastern Daylight Time (EDT) settings in force. Most likely, this system was located somewhere on the East Coast.
• The .rar files and plain files that eventually end up in the “NGP VAN” 7zip file disclosed by Guccifer 2.0 on 9/13/2016 were likely first copied to a USB flash drive, which served as the source data for the final 7zip file. There is no information to determine when or where the final 7zip file was built.
The Forensicator’s analysis noted that data from the 7-zip file showed the .rar files were built on September 1, 2016, while the other files were last modified on July 5, 2016. According to the report, “when the .rar files are unpacked using a program called WinRAR, their timestamps were preserved from the date they were transferred. The subsequent timestamps of those .rar files were relative times, while the times recorded in the 7-zip files are absolute times, recorded in Coordinated Universal Time (UTC).”The Forensicator concluded that if the .rar files were adjusted to Eastern Time, they “fall into the same range as the last modified times for the directories archived in the .rar files.”

Thus, the Forensicator’s analysis determined that the files were likely built on a computer system running on Eastern Daylight Savings Time (EDT) timezone, meaning that the system was most likely located somewhere on the East Coast of the United States.

Additionally, the Forensicator also generated a list of the files sorted by the date they were last modified and imported the list into an Excel spreadsheet. Analyzing the files by date last modified, he observed that the last modified times were clustered together in a 14-minute time period on July 5, 2016.

In an analysis of the metadata, he found a majority of the time it took for the files to be copied, 12 minutes and 48 seconds of the 14 minutes and 15 seconds, was allocated to “time gaps” that appear between several top-level files and directories. The report concluded that this indicated that the files were chosen from a much larger collection of files.

Finally, and perhaps most damning of all, the transfer speed of the files published by Guccifer 2.0, was determined by the Forensicator, which he concluded that if the 1.98 GB 7-zip archive published by Guccifer was copied at a rate of 22.6 MB/s, and all the time gaps were attributed to additional file copying, the initial file copy would be 10 times larger, or 19.3 GB.

All of this leads to a likely conclusion that Guccifer 2.0 is/was a U.S. intelligence asset deployed to muddy the waters surrounding the DNC leak and shift blame to the Russians.

What, if any, independent, verifiable evidence is there that Guccifer 2.0 hacked the DNC?

Basically, there is no evidence to show the Guccifer 2.0 persona was Wikileaks source. There is no evidence that he actually hacked into the DNC beyond the fact he had acquired some DNC/DCCC documents. Conversely, there is significant evidence to contradict his claims thanks to ThreatConnect discrediting his breach claims, and revealing that he was intentionally working to get attributed for the malware discoveries!

Even more damning, according to Forensicator, the Guccifer 2.0 persona curiously chose to “use a Russian VPN (after choosing to taint documents with Russian language) and was noted to have been in possession of a password for a password-protected area of the DCLeaks site (which, plausibly, he could have been given after promising to upload some of his leaks – DCLeaks were willing to give the same password out to the press in exchange for the promise of writing a story about them!)”

Virtually everything previously reported about the Guccifer 2.0 persona has been based on assumption, acceptance of his admissions as factual, with the U.S. public being propagandized by a corporate media to take his conjecture at face value, while the real story is who is behind this persona, and for what purpose?

In summation, we’ve seen deliberately placed “Russian Fingerprints,” efforts to forge perceived association to Wikileaks and Seth Rich, and DNC breach claims discredited.

The report notes that, Guccifer 2.0 utilized “‘Trump Opposition Research’ like it was an identity card only one day after it was advertised by Shawn Henry in a Washington Post article. This likely U.S. intelligence asset publicly noted how he could only ever “hack” the DNC, lacked syntactical traits of a Russian speaking English and recently – has been shown as most likely to have accessed some of his files locally, while on the DNC network (within the Eastern Time zone).”

It appears likely that the appearance of the Guccifer 2.0 person was an intelligence operation designed to hide the fact that the DNC was not hacked by Russians, and was more than likely accessed by someone with physical access to the DNC servers.

Stillness in the Storm Editor's note: Did you find a spelling error or grammar mistake? Do you think this article needs a correction or update? Or do you just have some feedback? Send us an email at sitsshow@gmail.com with the error, headline and urlThank you for reading.

Question -- What is the goal of this website? Why do we share different sources of information that sometimes conflicts or might even be considered disinformation? 
Answer -- The primary goal of Stillness in the Storm is to help all people become better truth-seekers in a real-time boots-on-the-ground fashion. This is for the purpose of learning to think critically, discovering the truth from within—not just believing things blindly because it came from an "authority" or credible source. Instead of telling you what the truth is, we share information from many sources so that you can discern it for yourself. We focus on teaching you the tools to become your own authority on the truth, gaining self-mastery, sovereignty, and freedom in the process. We want each of you to become your own leaders and masters of personal discernment, and as such, all information should be vetted, analyzed and discerned at a personal level. We also encourage you to discuss your thoughts in the comments section of this site to engage in a group discernment process. 

"It is the mark of an educated mind to be able to entertain a thought without accepting it." – Aristotle

The opinions expressed in this article do not necessarily reflect the views of Stillness in the Storm, the authors who contribute to it, or those who follow it. 

View and Share our Images
Curious about Stillness in the Storm? 
See our About this blog - Contact Us page.

If it was not for the gallant support of readers, we could not devote so much energy into continuing this blog. We greatly appreciate any support you provide!

We hope you benefit from this not-for-profit site 

It takes hours of work every day to maintain, write, edit, research, illustrate and publish this blog. We have been greatly empowered by our search for the truth, and the work of other researchers. We hope our efforts 
to give back, with this website, helps others in gaining 
knowledge, liberation and empowerment.

"There are only two mistakes one can make along the road to truth; 
not going all the way, and not starting." — Buddha

If you find our work of value, consider making a Contribution.
This website is supported by readers like you. 

[Click on Image below to Contribute]

Support Stillness in the Storm