Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

New Research Shows Guccifer 2.0 Files Were Copied Locally, Not Hacked
Disobedient Media ^

Posted on 07/09/2017 2:28:09 PM PDT by TigerClaws

New meta-analysis has emerged from a document published today by an independent researcher known as The Forensicator, which suggests that files eventually published by the Guccifer 2.0 persona were likely initially downloaded by a person with physical access to a computer connected to the internal DNC network. The individual most likely used a USB drive to copy the information. The groundbreaking new analysis irrevocably destroys the Russian hacking narrative, and calls the actions of Crowdstrike and the DNC into question.

The document supplied to Disobedient Media via Adam Carter was authored by an individual known as The Forensicator. The full document referenced here has been published on their blog. Their analysis indicates the data was almost certainly not accessed initially by a remote hacker, much less one in Russia. If true, this analysis obliterates the Russian hacking narrative completely.

The Forensicator specifically discusses the data that was eventually published by Guccifer 2.0 under the title “NGP-VAN.” This should not be confused with the separate publication of the DNC emails by Wikileaks. This article focuses solely on evidence stemming from the files published by Guccifer 2.0, which were previously discussed in depth by Adam Carter.

Disobedient Media previously reported that Crowdstrike is the only group that has directly analyzed the DNC servers. Other groups including Threat Connect have used the information provided by Crowdstrike to claim that Russians hacked the DNC. However, their evaluation was based solely on information ultimately provided by Crowdstrike; this places the company in the unique position of being the only direct source of evidence that a hack occurred.

The group’s President Shawn Henry is a retired executive assistant director of the FBI while their co-founder and CTO, Dmitri Alperovitch, is a senior fellow at the Atlantic Council, which as we have reported, is linked to George Soros. Carter has stated on his website that “At present, it looks a LOT like Shawn Henry & Dmitri Alperovitch (CrowdStrike executives), working for either the HRC campaign or DNC leadership were very likely to have been behind the Guccifer 2.0 operation.” Carter’s website was described by Wikileaks as a useful source of primary information specifically regarding Guccifer 2.0.

Carter recently spoke to Disobedient Media, explaining that he had been contacted by The Forensicator, who had published a document which contained a detailed analysis of the data published by Guccifer 2.0 as “NGP-VAN.”

The document states that the files that eventually published as “NGP-VAN” by Guccifer 2.0 were first copied to a system located in the Eastern Time Zone, with this conclusion supported by the observation that “the .7z file times, after adjustment to East Coast time fall into the range of the file times in the .rar files.” This constitutes the first of a number of points of analysis which suggests that the information eventually published by the Guccifer 2.0 persona was not obtained by a Russian hacker.

The Forensicator stated in their analysis that a USB drive was most likely used to boot Linux OS onto a computer that either contained the alleged DNC files or had direct access to them. They also explained to us that in this situation one would simply plug a USB drive with the LinuxOS into a computer and reboot it; after restarting, the computer would boot from the USB drive and load Linux instead of its normal OS. A large amount of data would then be copied to this same USB drive.

In this case, additional files would have been copied en masse, to be “pruned” heavily at a later time when the 7zip archive now known as NGP-VAN was built. The Forensicator wrote that if 1.98 GB of data had been copied at a rate of 22.6 MB/s and time gaps t were noticed at the top level of the NGP-VAN 7zip file were attributed to additional file copying, then approximately 19.3 GB in total would have been copied. In this scenario, the 7zip archive (NGP-VAN) would represent only about 10% of the total amount of data that was collected.

The very small proportion of files eventually selected for use in the creation of the “NGP-VAN” files were later published by the creators of the Guccifer 2.0 persona. This point is especially significant, as it suggests the possibility that up to 90% of the information initially copied was never published.

The use of a USB drive would suggest that the person first accessing the data could not have been a Russian hacker. In this case, the person who copied the files must have physically interacted with a computer that had access to what Guccifer 2.0 called the DNC files. A less likely explanation for this data pattern where large time gaps were observed between top level files and directories in the 7zip file, can be explained by the use of ‘think time’ to select and copy 1.9 GB of individual files, copied in small batches with think time interspersed. In either scenario, Linux would have been booted from a USB drive, which fundamentally necessitates physical access to a computer with the alleged DNC files.

The Forensicator believed that using the possible ‘think-time’ explanation to explain the time-gaps was a less likely explanation for the data pattern available, with a large amount of data most likely copied instantaneously, later “pruned” in the production of the Guccifer 2.0’s publication of the NGP-VAN files.

Both the most likely explanation and the less likely scenario provided by The Forensicator’s analysis virtually exclude the possibility of a Russian or remote hacker gaining external access to the files later published as “NGP-VAN.” In both cases, the physical presence of a person accessing a containing DNC information would be required.

Importantly, The Forensicator concluded that the chance that the files had been accessed and downloaded remotely over the internet were too small to give this idea any serious consideration. He explained that the calculated transfer speeds for the initial copy were much faster than can be supported by an internet connection. This is extremely significant and completely discredits allegations of Russian hacking made by both Guccifer 2.0 and Crowdstrike.

This conclusion is further supported by analysis of the overall transfer rate of 23 MB/s. The Forensicator described this as “possible when copying over a LAN, but too fast to support the hypothetical scenario that the alleged DNC data was initially copied over the Internet (esp. to Romania).” Guccifer 2.0 had claimed to originate in Romania. So in other words, this rate indicates that the data was downloaded locally, possibly using the local DNC network. The importance of this finding in regards to destroying the Russian hacking narrative cannot be understated.

If the data is correct, then the files could not have been copied over a remote connection and so therefore cannot have been “hacked by Russia.”

The use of a USB drive would also strongly suggest that the person copying the files had physical access to a computer most likely connected to the local DNC network. Indications that the individual used a USB drive to access the information over an internal connection, with time stamps placing the creation of the copies in the East Coast Time Zone, suggest that the individual responsible for initially copying what was eventually published by the Guccifer 2.0 persona under the title “NGP-VAN” was located in the Eastern United States, not Russia.

The implications of The Forensicator‘s analysis in combination with Adam Carter‘s work, suggest that at the very least, the Russian hacking narrative is patently false. Adam Carter has a strong grasp on the NGP-VAN files and Guccifer 2.0, with his website on the subject called a “good source” by Wikileaks via twitter. Carter told Disobedient Media that in his opinion the analysis provided by The Forensicator was accurate, but added that if changes are made to the work in future, any new conclusions would require further vetting.

On the heels of recent retractions by legacy media outlets like CNN and The New York Times, this could have serious consequences, if months of investigation into the matter by authorities are proven to have been based on gross misinformation based solely on the false word of Crowdstrike.

Assange recently lamented widespread ignorance about the DNC Leak via Twitter, specifically naming Hillary Clinton, the DNC, the Whitehouse and mainstream media as having “reason” to suppress the truth of the matter. As one of the only individuals who would have been aware of the source of the DNC Leaks, Assange’s statement corroborates a scenario where the DNC and parties described in Adam Carter’s work likely to have included Crowdstrike, may have participated in “suppressing knowledge” of the true origins and evidence surrounding the leak of the DNC emails by confusing them with the publication of the Guccifer 2.0 persona.

Despite Guccifer 2.0’s conflicting reports of having both been a Russian hacker and having contact with Seth Rich, the work of The Forensicator indicates that neither of these scenarios is likely true. What is suggested is that the files now known as “NGP-VAN” were copied by someone with access to a system connected to the DNC internal network, and that this action had no bearing on the files submitted to Wikileaks and were most likely unassociated with Seth Rich, and definitively not remotely “hacked” from Russia.


TOPICS: Crime/Corruption; Government; News/Current Events; Politics/Elections
KEYWORDS: adamcarter; alperovitch; awanbrothers; brightbluedata; carter; clinton; crowdstrike; dccc; dnc; dncemails; dnchacked; dncleaks; fake; forensicator; fraud; guccifer; guccifer2; guccifer20; haters; hillary; hillaryclinton; ngpvan; obama; podesta; russianhacking; sethrich; shawnhenry; theforensicator; toronto; traitor; warrenflood; wassermanschultz; wikileaks
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-106 next last
To: laxcoach
The way this reads, we are to believe that every time you touch a file, mysterious meta data is stored. Every time we copy a file mysterious meta data is stored.

That isn’t reality.

Really? So you don't believe that "mysterious" (play eerie music here) metadata is stored in photographs or any other files by default? Denying reality doesn't make it less real.

21 posted on 07/09/2017 3:23:23 PM PDT by FreedomOfExpression
[ Post Reply | Private Reply | To 15 | View Replies]

To: TigerClaws
I have read elsewhere the Guccifer 2 files have meta tags that it can be shown that was originally English , but changed to Russian to make it look as if the files went through a Russian computer ... the theory is these Guccifer 2 leaks not necessarily were damaging but were leaked on purpose by the dnc with fake Russian meta tags so as to use as evidence before a wire tap judge to tap trump. Later wicki leaks got a hold of real leaked server files , many damaging to dnc obtained still by nobody knows, ( wicki says not from a state source ) . The DNC panicked realizing the first set of leaked files they released with fake Russia meta tags would not have the same meta tags as the wicki leaks.. and still are sticking to the Russian fake narrative by their own leaks they created to frame trump , claim 17 agencies bla bla bla... but still we haven't examined the dnc server, and the wicki leaks appear to come from a different source than Guccifer 2,, yet nobody in the main streem seems to be getting or even cares that the russian connection found in the leaked documents from Guccifer 2. was all made up as was the name Guccifer 2. by the dnc to wiretap trump...
22 posted on 07/09/2017 3:24:04 PM PDT by seastay
[ Post Reply | Private Reply | To 1 | View Replies]

To: laxcoach

I’m a technical ignorant, but this is very simple: if these files were downloaded remotely via a remote hack, the time stamp on the various files would have had more space between them due to slower speeds via the remote connection. Instead, the time stamps on these files shows they had to be downloaded via a local connection. There’s also some evidence it was to a USB, so that, too.

What bothers me is that this is news: this is entirely obvious and I would assume any FBI or other forensic analysis would have looked for this type of metadata immediately.


23 posted on 07/09/2017 3:24:05 PM PDT by nicollo (I said no!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Sacajaweau

Exactly what I thought


24 posted on 07/09/2017 3:24:15 PM PDT by Nifster (I see puppy dogs in the clouds)
[ Post Reply | Private Reply | To 2 | View Replies]

To: null and void

I see what you did there

Nicely played


25 posted on 07/09/2017 3:26:16 PM PDT by Nifster (I see puppy dogs in the clouds)
[ Post Reply | Private Reply | To 8 | View Replies]

To: TigerClaws

Most hacks are not, in fact, hacks in the sense people think of them.

They are inside jobs.


26 posted on 07/09/2017 3:27:56 PM PDT by Vendome (I've Gotta Be Me - https://www.youtube.com/watch?v=wH-pk2vZG2M)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nicollo

It really depends on how it was downloaded - what software. The create/modified dates can remain unchanged. Any software I have ever written or used keeps the timestamps intact.


27 posted on 07/09/2017 3:28:11 PM PDT by laxcoach (Government is greedy. Taxpayers who want their own money are not greedy.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: nicollo

Doesn’t anyone remember the DNC getting furious with Bernies team for stealing files from its server? They claim only donor names....I doubt that


28 posted on 07/09/2017 3:28:15 PM PDT by Nifster (I see puppy dogs in the clouds)
[ Post Reply | Private Reply | To 11 | View Replies]

To: cdcdawg

Just because Seth Rich downloaded the emails to a USB drive doesn’t mean that the Russians didn’t also hack into the DNC server. And just because the Russians hacked into the DNC server doesn’t mean Seth Rich didn’t also download the emails to a USB device. The point is that it was the content of those emails, revealing the corruption of the DNC, that damaged Clinton’s campaign. Neither Seth Rich nor the Russians wrote those emails.


29 posted on 07/09/2017 3:29:12 PM PDT by henkster (Ask your favorite liberal to take the "Snowflake Challenge.")
[ Post Reply | Private Reply | To 13 | View Replies]

To: TigerClaws

Does anyone trust the FBI as far as they can throw them? At this point the FBI makes Barney Fife look like a competent Sherlock Holme they are so tainted and sadly just a stupidly partisan hack agency of the US government. Where does one turn to for justice at this point in the USA?


30 posted on 07/09/2017 3:30:22 PM PDT by sarge83
[ Post Reply | Private Reply | To 1 | View Replies]

To: nicollo

LOL!


31 posted on 07/09/2017 3:31:00 PM PDT by Vendome (I've Gotta Be Me - https://www.youtube.com/watch?v=wH-pk2vZG2M)
[ Post Reply | Private Reply | To 18 | View Replies]

To: laxcoach
I read a different analysis that looked at the so-called meta-data in a MSWord doc file, the material accessible under "Files/Properties" from the user menu. That analysis basically concluded that Guccifer 2.0 was not who he claimed to be.

As you point out, otherwise meta-data is (usually) limited to datestamp. I'd add to a possibility in MSWord files, some change/diff/author history, if the function of recording that data is turned on.

The article is adding another layer of meta-data, that being a timestamp associated with packing files in a compressed archive.

-- ... even if you did have that kind of meta data, it could be altered. --

Yep.

32 posted on 07/09/2017 3:31:50 PM PDT by Cboldt
[ Post Reply | Private Reply | To 15 | View Replies]

To: sarge83

>Does anyone trust the FBI as far as they can throw them? At this point the FBI makes Barney Fife look like a competent Sherlock Holme they are so tainted and sadly just a stupidly partisan hack agency of the US government. Where does one turn to for justice at this point in the USA?

There’s no justice for most people in America. Most of us just try to avoid being entangled and destroyed by the legal system.


33 posted on 07/09/2017 3:31:57 PM PDT by JohnyBoy
[ Post Reply | Private Reply | To 30 | View Replies]

To: nicollo
I would assume any FBI or other forensic analysis would have looked for this type of metadata immediately.

The DNC wouldn't let the FBI examine their servers. The DNC used a private company called Crowdstrike, that they already employed, to examine their servers. Crowdstrike gave the FBI a report but never shared the actual data with them. The FBI was OK with that.

34 posted on 07/09/2017 3:34:46 PM PDT by TigersEye (Investigate the Awan brothers and Wasserman Schultz)
[ Post Reply | Private Reply | To 23 | View Replies]

To: TigerClaws

Exactly Seth Rich had to physically be there to plug in those three thumb drives and he was.


35 posted on 07/09/2017 3:35:02 PM PDT by rodguy911 (Home of the Free because of the brave.MAGA!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: redcatcherb412
To me, the trickier part, once "in the system" either via Linux (which is a way to bypass the access security built into an e.g. native MSWindows system) or via Win, is to know the location of the files.

An to make that point clear, what I am saying is that this would be tricky to me, personally, not that it's tricky per se. It just takes some time to learn where the emails are stored.

36 posted on 07/09/2017 3:35:50 PM PDT by Cboldt
[ Post Reply | Private Reply | To 16 | View Replies]

To: wastoute

Actually, Hillary and Huma mae the final call by request of Gennifer Palmieri.


37 posted on 07/09/2017 3:36:05 PM PDT by rodguy911 (Home of the Free because of the brave.MAGA!!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: laxcoach

“Metadata is data that describes other data. Meta is a prefix that in most information technology usages means “an underlying definition or description.” Metadata summarizes basic information about data, which can make finding and working with particular instances of data easier.”
................
Pretty sure this is what
George Webb Schweigert had in mind when he constantly referred to metadata.


38 posted on 07/09/2017 3:38:52 PM PDT by rodguy911 (Home of the Free because of the brave.MAGA!!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: seastay
I have read elsewhere the Guccifer 2 files have meta tags that it can be shown that was originally English , but changed to Russian to make it look as if the files went through a Russian computer ... the theory is these Guccifer 2 leaks not necessarily were damaging but were leaked on purpose by the dnc with fake Russian meta tags so as to use as evidence before a wire tap judge to tap trump.

Exactly what I heard and read as well. Whomever tried the translation fromenglish to Russian screwed up several times and is how they were outed.

39 posted on 07/09/2017 3:42:10 PM PDT by rodguy911 (Home of the Free because of the brave.MAGA!!)
[ Post Reply | Private Reply | To 22 | View Replies]

To: georgiegirl
Alperovitch is Ukranian, and the Atlantic Council (or whatever it is called) has ties with the Ukraine. So yes, not Russia.
40 posted on 07/09/2017 3:46:05 PM PDT by Major Matt Mason (It is time to make America an uncomfortable place for Marxist usurpers.)
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-106 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson