Connect with us

Politics

Report: Insider Stole DNC Data Five Days Before Seth Rich Murder…No Russian Hacker!

Published

on

An in depth study of the documents published by the ‘Guccifer 2.0’ online persona by an independent researcher calling themselves “The Forensicator” concludes that the files were most likely obtained through a USB drive directly plugged into a DNC computer — not a shadowy Russian hacker.

Additionally, the report found that the files were copied five days before the murder of Seth Rich, a data analyst for the Democratic National Committee, who WikiLeaks has hinted may have been their source.

My own conversations with Guccifer 2.0 led me to develop my own doubts that the account was Russian in origin, or that it actually carried out a hack on the DNC, which I previously reported for Big League Politics.

Trending: Twitter Suspends US Customs and Border Protection Commissioner For Celebrating the Effectiveness of Trump’s Border Wall

“On 7/5/2016 at approximately 6:45 PM Eastern time, someone copied the data that eventually appears on the “NGP VAN” 7zip file (the subject of this analysis).  This 7zip file was published by a persona named Guccifer 2, two months later on September 13, 2016,” the Forensicator found.

take our poll - story continues below

Did Kyle Rittenhouse act in self defense?

  • VOTE NOW: Did Kyle Rittenhouse act in self defense when he shot three BLM rioters? 

  • This field is for validation purposes and should be left unchanged.
Completing this poll grants you access to Big League Politics updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use.

The very thorough report provides even more evidence of the theories at ‘Guccifer 2.0’ was created by someone involved with the Democratic National Committee who was attempting to discredit the impending leaks from WikiLeaks.

The analyst found that the transfer took place at speeds of 23 MB/s, which means that a remote data transfer over the internet would be extremely unlikely. Instead, the report states that a more likely scenario would be “that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high speed network (LAN).”

“This initial copying activity was done on a system where Eastern Daylight Time (EDT) settings were in force. Most likely, the computer used to initially copy the data was located somewhere on the East Coast,” Forensicator writes.

The Forensicator found that the data was initially copied to a computer which was running Linux, as “the file last modified times all reflect the apparent time of the copy and this is a characteristic of the the Linux ‘cp’ command (using default options).” The report noted that a simple explanation for this would be that the Linux OS was booted from a USB flash drive — and that the data was subsequently copied back to the same drive. Using this method, the person transferring the files would be able to download a very large amount of data quickly.

Disobedient Media reports that “the very small proportion of files eventually selected for use in the creation of the “NGP-VAN” files were later published by the creators of the Guccifer 2.0  persona. This point is especially significant, as it suggests the possibility that up to 90% of the information initially copied was never published.”

“Importantly, The Forensicator concluded that the chance that the files had been accessed and downloaded remotely over the internet were too small to give this idea any serious consideration. He explained that the calculated transfer speeds for the initial copy were much faster than can be supported by an internet connection. This is extremely significant and completely discredits allegations of Russian hacking made by both Guccifer 2.0 and Crowdstrike,” Disobedient Media noted.

As we have previously reported, a former blackhat hacker and computer expert explained to Big League Politics that it appears Guccifer 2.0 deliberately planted fake Russian fingerprints on documents linked to his persona.

“Metadata suggests it took only 30 minutes to go from a DNC tech/data strategy consultant creating documents to Guccifer 2.0 tainting them (with Russian metadata),” Adam Carter wrote on his website G-2 space.

Carter believes that someone within the DNC or CrowdStrike, the only firm given access to investigate the alleged hack, had created the ‘Guccifer 2.0’ persona to discredit the WikiLeaks release. The DNC refused to turn over party servers to the FBI, something which you would think the victim of a crime would be anxious to do to find the culprit.

“The campaign was in a desperate position and really needed something similar to a Russian hacker narrative, and one where they would be fortunate to have a seemingly clumsy hacker that leaves lots of ‘fingerprints’ tainting files — bringing the reputation of leaks into question,” Carter wrote. “Sure enough, two or three days later, Guccifer 2.0 – the world’s weirdest hacker – was spawned and started telling lies in an effort to attribute himself to the malware discoveries, etc.”

Carter told Big League Politics he believes that it was likely a misdirection effort by Crowdstrike, a cybersecurity firm that worked for the DNC, and Warren Flood, an IT worker with links to the DNC and the Obama administration. He has referred to the Guccifer 2.0 persona as a “donkey in a bear costume.”

In the Guccifer documents in question, Warren Flood appears to be the original author, while it was last modified by “Феликс Эдмундович,” which translates to Felix Dzerzhinsky, the name of the founder of the Soviet secret police.

“This was then saved as 1.doc, 2.doc and 3.doc,” he said. “Then 30 minutes later, on another computer, with MS-Word registered to the Russian name (the Soviet secret police founder that has been dead for almost a century). Each of those files was opened, had content copied into it (assumably from the original documents) and was then saved (writing the Russian name into the metadata at that time).”

Democratic and Republican lawmakers have constantly cited Guccifer 2.0 as the hacker responsible for the DNC breach, and as a suspected Russian agent. The Guccifer theory forms most of the basis for the House and Senate probes into alleged coordination between the Donald Trump campaign and the Russians.

In a response to Big League, CrowdStrike maintained that they stand by their findings — but did not acknowledge a request for comment about the accusations made by Carter that someone within their organization may have been directly involved in the Guccifer online persona.

“CrowdStrike stands by the findings and the attribution analysis of its investigation of the DNC breach. As an additional reference point, the U.S. Intelligence Community has also concluded that the leaks by the Guccifer 2.0 online persona are ‘consistent with the methods and motivations of Russian-directed efforts,’” CrowdStrike said in their statement to Big League Politics.

Guccifer 2.0 also infamously contacted Trump advisor Roger Stone, a fact which has been repeatedly brought up by Congressman Adam Schiff during his hearings on alleged “Russian meddling.”

Carter believes that Guccifer 2.0’s contacts may also have had significant motivation.

“When you know what his real intent was from that first day,and realize that he always knew he was going to be exposed as a Russian hacker eventually, you can see where his efforts to attribute himself to others was always an effort to make it so they could be discredited later (for having ties to the Russian hacker, a form of ‘poisoning-the-well’),” Carter suggested, “or create a false perception of association to hacking incidents (which ThreatConnect actually debunked him on).”

Campaign 2020

‘Protest by the Tens of Millions’: Left-Wing Coalition Demands Chaos in the Streets to Force Trump’s Ouster Following Election

Published

on

A left-wing organizational front, Rise and Resist, is part of a coalition setting up mass rallies to agitate for the removal of President Donald Trump from office, regardless of the vote.

They make it clear with their rhetoric that they will not accept a win by President Trump under any circumstances. They intend to wage a campaign of terror in order to oust Trump by any means necessary.

Their big post-election event is scheduled to take place on Wednesday, Nov. 4 at 4pm. They noted that this is just “a tentative date & time” and give no location for the event, as they hope to conceal their actions from the public. They wrote on their official event page that “we are facing an unprecedented threat to the future of our democracy, and we also need to start preparing now for sustained nonviolent actions in the streets that grow over time.”

Terror groups like ANTIFA and Black Lives Matter have shown the world what the Left means when they refer to “nonviolent actions.” Rise and Resist is attempting to maintain plausible deniability as they set up their riots.

take our poll - story continues below

Did Kyle Rittenhouse act in self defense?

  • VOTE NOW: Did Kyle Rittenhouse act in self defense when he shot three BLM rioters? 

  • This field is for validation purposes and should be left unchanged.
Completing this poll grants you access to Big League Politics updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use.

“If Trump tries to steal the election, we need to protest by the tens of millions. And we need to keep protesting until Trump concedes and leaves The White House. A contested election won’t be a legal fight. It will be a struggle of political will,” the front wrote.

Rise and Resist frequently links to Protect the Results, an organization that provides a tool kit for activists to cause mayhem following next week’s election. The organization references the Transition Integrity Project (TIP), a Soros-backed group staffed with Democrat and Never Trump operatives designed to set the stage for a color revolution coup against the president. Protect the Results seems to be the organizing arm of the coup, with TIP serving as the lawfare arm.

Protect the Results is in a coalition with tons of left-wing organizations, some with direct ties to the Democrat Party. They include Black Lives Matter, Indivisible, Bend the Arc Jewish Action, Democracy 21, Greenpeace, NARAL Pro-Choice America, Planned Parenthood, Sierra Club, The Jewish Vote, and the Women’s March. Rise and Resist is listed among the coalition partners and serves as their boots on the ground in New York City.

Rise and Resist has posted images and video from previous rallies, which can be seen here:

Big League Politics has reported extensively on the infrastructure that is being put in place to rob President Trump of a second term in office:

The so-called Election Integrity Partnership is producing propaganda to protect the color revolution coup that the globalists are perpetrating against President Donald Trump in an attempt to remove him from office regardless of next month’s election.

The group published some gibberish attempting to obfuscate the truth of the establishment’s color revolution attempt with a word salad of academic drivel. They blamed talk of a color revolution on foreign powers and implied that right-wing journalists like Darren Beattie, Michelle Malkin and Jack Posobiec are working with the Russians.

“After this “mainstreaming” portion led by prominent partisan influencers, social media users who found the story appealing moved the narrative into Facebook groups and pages through shares,” the Election Integrity Partnership wrote.

They are appropriating Orwellian neologisms popularized during the COVID-19 mass hysteria, such as “superspreader,” to demonize their political opposition and set the stage for their censorship on major social media platforms.

“Some displayed “super spreader” behavior, in which an extremely active user shares content into dozens of different Groups nearly simultaneously. In this specific case, users shared links either directly related to blog or news coverage of the color revolution claims themselves, or used the phrase “color revolution” in their commentary while sharing links to stories of other incidents they seemed to believe were evidence of the claim,” they wrote…

The Election Integrity Partnership describes their organization as a “coalition of research entities focused on supporting real-time information exchange between the research community, election officials, government agencies, civil society organizations, and social media platforms.” They use nonpartisan and independent phrasing to hide their deep left-wing connections to progressive oligarch George Soros.

On their official website, the Election Integrity Partnership notes that support from the James L. Knight Foundation was influential in the launch of the organization. The Knight Foundation worked with Soros’ largest front, the Open Society Foundations, to support a project that served as the forerunner for the Black Lives Matter terror movement. They also collaborated to train left-wing activists in South America and the Caribbean to subvert and undermine their national governments.

Additionally, the Knight Foundation has an incestuous relationship with ProPublica, a corporate-funded propaganda mill that reguarly doxes right-wing activists and journalists with half-truths and smears. Knight President and CEO Alberto Ibargüen serves on the board of ProPublica while ProPublica president Paul Steiger is a trustee of the Knight Foundation, according to the Media Research Center. ProPublica has been funded with large donations from the Open Society Foundations since at least 2010.

These findings indicate that the Election Integrity Partnership is just another deceptively-named organization that is attempting disenfranchise the American voter in a desperate attempt to stack the deck against President Trump.

The Trump campaign is encouraging activists to go to DefendYourBallot.com to insert themselves in the process and become a poll challenger in order to stop this steal.

Continue Reading
It's time to name Antifa a terror org! Sign your petition now!


Trending