Now Reading
MUST READ: ‘The Nation’ destroys the Russiagate story used as an excuse to impose more sanctions on Russia

MUST READ: ‘The Nation’ destroys the Russiagate story used as an excuse to impose more sanctions on Russia

An amazing article appeared on The Nation which is completely laying waste to the entire Russiagate lie.

We recommend The Duran readers to visit the relevant links below and read the article which conclusively uncovers the entire Hillary Clinton-Deep State Russia DNC lie.

We are certain that no mainstream media outlets will cover the facts laid out in The Nation’s post.

You can read the entire article at The Nation, written by Patrick Lawrence…

Here are a few excerpts as reported by Patrick Lawrence of The Nation…

There was no hack of the Democratic National Committee’s system on July 5 last year—not by the Russians, not by anyone else. Hard science now demonstrates it was a leak—a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNC’s system. This casts serious doubt on the initial “hack,” as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.

Forensic investigations of documents made public two weeks prior to the July 5 leak by the person or entity known as Guccifer 2.0 show that they were fraudulent: Before Guccifer posted them they were adulterated by cutting and pasting them into a blank template that had Russian as its default language. Guccifer took responsibility on June 15 for an intrusion the DNC reported on June 14 and professed to be a WikiLeaks source—claims essential to the official narrative implicating Russia in what was soon cast as an extensive hacking operation. To put the point simply, forensic science now devastates this narrative.

Why the DNC would not turn their servers over to the FBI for investigation…

Forensicator is working with the documents published by Guccifer 2.0, focusing for now on the July 5 intrusion into the DNC server. The contents of Guccifer’s files are known—they were published last September—and are not Forensicator’s concern. His work is with the metadata on those files. These data did not come to him via any clandestine means. Forensicator simply has access to them that others did not have. It is this access that prompts Kirk Wiebe and others to suggest that Forensicator may be someone with exceptional talent and training inside an agency such as the FBI. “Forensicator unlocked and then analyzed what had been the locked files Guccifer supposedly took from the DNC server,” Skip Folden explained in an interview. “To do this he would have to have ‘access privilege,’ meaning a key.”

What has Forensicator proven since he turned his key? How? What has work done atop Forensicator’s findings proven? How?

Forensicator’s first decisive findings, made public in the paper dated July 9, concerned the volume of the supposedly hacked material and what is called the transfer rate—the time a remote hack would require. The metadata established several facts in this regard with granular precision: On the evening of July 5, 2016, 1,976 megabytes of data were downloaded from the DNC’s server. The operation took 87 seconds. This yields a transfer rate of 22.7 megabytes per second.

These statistics are matters of record and essential to disproving the hack theory. No Internet service provider, such as a hacker would have had to use in mid-2016, was capable of downloading data at this speed. Compounding this contradiction, Guccifer claimed to have run his hack from Romania, which, for numerous reasons technically called delivery overheads, would slow down the speed of a hack even further from maximum achievable speeds.

What is the maximum achievable speed? Forensicator recently ran a test download of a comparable data volume (and using a server speed not available in 2016) 40 miles from his computer via a server 20 miles away and came up with a speed of 11.8 megabytes per second—half what the DNC operation would need were it a hack. Other investigators have built on this finding. Folden and Edward Loomis say a survey published August 3, 2016, by www.speedtest.net/reports is highly reliable and use it as their thumbnail index. It indicated that the highest average ISP speeds of first-half 2016 were achieved by Xfinity and Cox Communications. These speeds averaged 15.6 megabytes per second and 14.7 megabytes per second, respectively. Peak speeds at higher rates were recorded intermittently but still did not reach the required 22.7 megabytes per second.

“A speed of 22.7 megabytes is simply unobtainable, especially if we are talking about a transoceanic data transfer,” Folden said. “Based on the data we now have, what we’ve been calling a hack is impossible.” Last week Forensicator reported on a speed test he conducted more recently. It tightens the case considerably. “Transfer rates of 23 MB/s (Mega Bytes per second) are not just highly unlikely, but effectively impossible to accomplish when communicating over the Internet at any significant distance,” he wrote. “Further, local copy speeds are measured, demonstrating that 23 MB/s is a typical transfer rate when using a USB–2 flash device (thumb drive).”

Time stamps in the metadata provide further evidence of what happened on July 5. The stamps recording the download indicate that it occurred in the Eastern Daylight Time Zone at approximately 6:45 pm. This confirms that the person entering the DNC system was working somewhere on the East Coast of the United States. In theory the operation could have been conducted from Bangor or Miami or anywhere in between—but not Russia, Romania, or anywhere else outside the EDT zone. Combined with Forensicator’s findings on the transfer rate, the time stamps constitute more evidence that the download was conducted locally, since delivery overheads—conversion of data into packets, addressing, sequencing times, error checks, and the like—degrade all data transfers conducted via the Internet, more or less according to the distance involved.

In addition, there is the adulteration of the documents Guccifer 2.0 posted on June 15, when he made his first appearance. This came to light when researchers penetrated what Folden calls Guccifer’s top layer of metadata and analyzed what was in the layers beneath. They found that the first five files Guccifer made public had each been run, via ordinary cut-and-paste, through a single template that effectively immersed them in what could plausibly be cast as Russian fingerprints. They were not: The Russian markings were artificially inserted prior to posting. “It’s clear,” another forensics investigator self-identified as HET, wrote in a report on this question, “that metadata was deliberately altered and documents were deliberately pasted into a Russianified [W]ord document with Russian language settings and style headings.”

To be noted in this connection: The list of the CIA’s cyber-tools WikiLeaks began to release in March and labeled Vault 7 includes one called Marble that is capable of obfuscating the origin of documents in false-flag operations and leaving markings that point to whatever the CIA wants to point to. (The tool can also “de-obfuscate” what it has obfuscated.) It is not known whether this tool was deployed in the Guccifer case, but it is there for such a use.

See Also

A chronology that imposes a persuasive logic on the complex succession of events…

On June 12 last year, Julian Assange announced that WikiLeaks had and would publish documents pertinent to Hillary Clinton’s presidential campaign.

On June 14, CrowdStrike, a cyber-security firm hired by the DNC, announced, without providing evidence, that it had found malware on DNC servers and had evidence that Russians were responsible for planting it.

On June 15, Guccifer 2.0 first appeared, took responsibility for the “hack” reported on June 14 and claimed to be a WikiLeaks source. It then posted the adulterated documents just described.

On July 5, Guccifer again claimed he had remotely hacked DNC servers, and the operation was instantly described as another intrusion attributable to Russia. Virtually no media questioned this account.

It does not require too much thought to read into this sequence. With his June 12 announcement, Assange effectively put the DNC on notice that it had a little time, probably not much, to act preemptively against the imminent publication of damaging documents. Did the DNC quickly conjure Guccifer from thin air to create a cyber-saboteur whose fingers point to Russia? There is no evidence of this one way or the other, but emphatically it is legitimate to pose the question in the context of the VIPS chronology. WikiLeaks began publishing on July 22. By that time, the case alleging Russian interference in the 2016 elections process was taking firm root. In short order Assange would be written down as a “Russian agent.”

By any balanced reckoning, the official case purporting to assign a systematic hacking effort to Russia, the events of mid-June and July 5 last year being the foundation of this case, is shabby to the point taxpayers should ask for their money back. The Intelligence Community Assessment, the supposedly definitive report featuring the “high confidence” dodge, was greeted as farcically flimsy when issued January 6. Ray McGovern calls it a disgrace to the intelligence profession. It is spotlessly free of evidence, front to back, pertaining to any events in which Russia is implicated. James Clapper, the former director of national intelligence, admitted in May that “hand-picked” analysts from three agencies (not the 17 previously reported) drafted the ICA. There is a way to understand “hand-picked” that is less obvious than meets the eye: The report was sequestered from rigorous agency-wide reviews. This is the way these people have spoken to us for the past year.

Other CIA and US Intelligence lies about Russiagate…

The FBI has never examined the DNC’s computer servers—an omission that is beyond preposterous. It has instead relied on the reports produced by Crowdstrike, a firm that drips with conflicting interests well beyond the fact that it is in the DNC’s employ. Dmitri Alperovitch, its co-founder and chief technology officer, is on the record as vigorously anti-Russian. He is a senior fellow at the Atlantic Council, which suffers the same prejudice. Problems such as this are many.

“We continue to stand by our report,” CrowdStrike said, upon seeing the VIPS blueprint of the investigation. CrowdStrike argues that by July 5 all malware had been removed from the DNC’s computers. But the presence or absence of malware by that time is entirely immaterial, because the event of July 5 is proven to have been a leak and not a hack. Given that malware has nothing to do with leaks, CrowdStrike’s logic appears to be circular.

Liked it? Take a second to support The Duran on Patreon!

Leave a Reply

avatar
  Subscribe  
Notify of
kenneth hunter
Guest
kenneth hunter

One thing for sure is the MSM in the west will never run with this story.It will never see the light of day. How you get this story to the American people is a huge task as all the government agencies will be fighting to block it as it implicates them all as being corrupt or incompetent,

VeeNarian (Yerevan)
Guest
VeeNarian (Yerevan)

What has Fox News reported? Is the Deep State part of Fox News keeping the rest under control? Will the truth only come out when Trump has been impeached and replaced by the Neo-Con Pence? A sort of “Ooops! It was all a mistake, but at least Trump can now retire with dignity and play all the golf till he books his place in the great golf club upstairs” scenario?

Scott Robinson
Guest
Scott Robinson

If nothing else, the Trump/Russia charade has highlighted the concept of a “deep state” to a wider audience, which was probably in large part apathetic about politics and elections. Those whose interest is piqued, will hopefully dig deeper into the alt-news sources to learn about the nefarious long term plans of the globalists.

Shahna
Guest

Does it matter? To anybody else, outside the United States – does it matter? There are MANY totalitarian, even vicious, regimes on the planet. But there is ONLY ONE that spends its years rampaging around the world, daily dropping bombs on the people of countries that have NEVER EVER harmed it. What does it matter if the govt is elected or Deep State? Does govt get more “Deep State” than North Korea? North Korea doesn’t do this. ONLY AMERICANS do this. And they’ve been doing it since WW2 – it’s just a whole lot worse over the last few decades.… Read more »

Peter Hallam
Guest
Peter Hallam

@ Shahna – Agreed. It has gotten so bad; it has gotten so BLATANT, the U$ Government EXPECTING to get away with it without any repercussions at all; that the world should be put on notice. The Anti-Russia (Russophobe) Sanctions that the U$ just doctored up based on this NON-Existent excuse are an indication of the level of extremism that has infected the United States. No other country on the planet engages in such blatant racist extremism. No other country goes flying around the world bombing people who haven never harmed it or in some cases never even heard of… Read more »

Shahna
Guest

This Russia hacking stuff is pure blatant horse manure BS. It wouldn’t matter if Russia hacked the US election! It’s the job of the US govt to keep their elections safe, free and fair. It is not Russia’s job – or any other country’s. It is ONLY theirs. If ANYONE hacked that election that is the responsibility and culpability of their govt ONLY. They then failed in their duty and obligation and – should be fired. ————– Something new I saw on Duran on that hacking – well worth the read: https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/ PS. Kenya just deported an American and a… Read more »

Wayne Blow
Guest
Wayne Blow

Murder and mayhem in the slimy underworld of American “politics” will serve to keep this truth from vindicating Russia and many other victims of the DNC ‘s deplorable ways!!!!

my2Cents
Guest
my2Cents

Someone needs to be held accountable and charged for creating this Russiagate and the lies about our 17 Intelligence services who supposedly confirmed it but never did. .

John R. Nolan
Guest
John R. Nolan

Why are American citizens unwilling to admit their government is a pack of dangerous, psychotic spoilt brats who should be given a good whipping and sent to the corner to ponder their Double Speak.
But, maybe they, the Americans, are enjoying their masochistic wants.

richardstevenhack
Guest
richardstevenhack

Here is a post I made over at Russian Insider in response to the same article: I am bound by intellectual integrity to point out several facts: 1) Yes, it IS POSSIBLE to download 2GB of data in 87 seconds – IF you have access to a Gigabit Ethernet line or an OC-12 or higher line. The latter is unlikely as those are dedicated lines usually shared among many users, so you don’t get to use the full speed of the line. However, GIgabit Ethernet is AVAILABLE to 17 percent of the US population, both to companies and to the… Read more »

Ivan Grozny
Guest
Ivan Grozny

Good analysis. It still does not take away from the main point – that not one seems to take serious – the CONTENTS OF THE EMAILS! This whole affair, which almost certainly was a leak, is an attempt to drawn attention away from Killary’s ILLEGAL behaviour, an attempt to hide Killary’s CORRUPTION!

Copyright DRN Media PLC 2019. RSS: http://theduran.com/feed

Scroll To Top