The Mueller Investigation Failed to Provide Evidence That the DNC Was Actually Hacked

Commentary

In 2017, a memorandum was sent to the White House from a group of former U.S. intelligence officials, including William Binney, former technical director at the National Security Agency (NSA).

The team was a veritable who’s who of accredited technical wizards, comprising former top brass from the NSA, CIA, U.S. Air Force Intelligence, Defense Intelligence Agency, National Intelligence Council, Senate Foreign Relations Committee, and IBM.

The subject of the memo was their forensic analysis of the emails that were allegedly obtained from a hack at the Democratic National Committee (DNC)—a basis for assertions that the campaign of then-candidate Donald Trump colluded with the Russian government.

Unchallenged allegations of a computer “hack” permeated nearly all mainstream-media coverage of the investigation and were sprinkled throughout much of the final report from special counsel Robert Mueller. The indictment of 12 Russians by Mueller asserts that the emails were obtained through a remote network breach. The indictment drones on and on about a Russian military unit dubbed “Unit 26165” and “X-Agent malware” that supposedly allowed the DNC emails to be compromised.

But analysis of the files themselves (analysis that team Mueller either never conducted or never discussed) shows otherwise.

What was revealed through forensic analysis of the emails was that they were copied at speeds too high to have been hacked and transmitted over the internet. The metadata indicate that the emails had to have been copied locally—by someone who had physical access to the network—to some sort of mobile hard drive or flash drive.

Binney and former CIA and State Department Counter Terrorism officer Larry Johnson wrote in a report that “the highest transfer rate was 49.1 megabytes per second, which is much faster than possible from a remote online connection. The 49.1 megabytes speed coincides with the download rate for a thumb drive.”

But let’s set that aside for a moment. The report also fails to account for the CIA’s Marble Framework tool—leaked to the public by WikiLeaks in its “Vault 7” drop—that allows the agency to “mask its hacking attacks to make it look like it came from” another country, including Russia. Even if there was a hack (the only available evidence shows there wasn’t), the CIA could have easily been behind it and left false digital footprints that blamed Russia. Mueller failed to address this, as well.

These are hardly minor details. And it should now be clear to all that exculpatory evidence is something that neither the Mueller team nor establishment media are interested in providing to the public.

Here’s a friendly reminder that Mueller’s team couldn’t possibly have asserted, with a high degree of confidence, that the emails were actually hacked, because they didn’t even examine the DNC’s server. Neither did the FBI.

It’s not inconsequential that the DNC refused to let anyone examine the server. The FBI just accepted the hack narrative based on the word of CrowdStrike, a firm hired by the DNC—a firm whose analyst that supposedly examined the DNC server just happened to have previously worked for none other than … Robert Mueller.

The Mueller report repeatedly uses the words “hack” and “hacking,” yet fails to offer a shred of evidence that a hack actually took place. The public is just supposed to accept on good faith a claim made by a former FBI director (under his own cloud of suspicion), who’s investigating the current president in a case initiated by biased FBI officials whose investigation is based on opposition research provided by the Russians and paid for by the president’s political opposition, the Hillary Clinton campaign and the DNC.

Analysis of the stolen emails not only eviscerates the legitimacy of at least 12 of Mueller’s indictments—the ones against Russians he accused of conducting a hack that never actually occurred—it further calls into question the motives for the origin of the Mueller probe.

Specifically, the report states, “Taken together, these disparate data points combine to paint a picture that exonerates alleged Russian hackers and implicates persons within our law enforcement and intelligence community taking part in a campaign of misinformation, deceit and incompetence. It is not a pretty picture.”

After an investigation that had 19 lawyers, 2,800 subpoenas, 500 search warrants, 500 witnesses interviewed, and more than 230 orders for communication records, not only was there no finding of collusion, conspiracy, or obstruction, we are also still left with a question about how this whole thing started.

Who actually stole the DNC emails?

Adrian Norman is a writer and political commentator.

Views expressed in this article are the opinions of the author and do not necessarily reflect the views of The Epoch Times.

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Parrhesia on July 11, 2019 at 8:23pm

Mueller is going to testify before congress and I bet he will present all the evidence then.  lol

Comment by Nazda Pokmov on July 11, 2019 at 7:58pm

I guess they never will catch the invisible hacker LOL!!!!

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

cheeki kea commented on rlionhearted_3's photo
Thumbnail

2 planes hit buildings then demolition happened.

"That is a very good question. Did the insurance company decline the claim for some reason? or has…"
20 minutes ago
cheeki kea commented on Sandy's photo
Thumbnail

FB_IMG_1711502430662

"( sadly ) The unvaccinated sportsman or woman has an ( unfair ) advantage on the field or water…"
1 hour ago
cheeki kea favorited Sandy's photo
1 hour ago
cheeki kea commented on Doc Vega's blog post Was Sabotage or Terrorism used in the Collapse of the Francis Scott Key Bridge?
" Oh Wow Terrorism!/sabotage? Are you sure you want to know more prey tell. Could be a rabbit…"
2 hours ago
Less Prone commented on Doc Vega's blog post Was Sabotage or Terrorism used in the Collapse of the Francis Scott Key Bridge?
"Perfect for destroying the supply chain. It could well have been intentional."
17 hours ago
Less Prone favorited Doc Vega's blog post Was Sabotage or Terrorism used in the Collapse of the Francis Scott Key Bridge?
17 hours ago
Doc Vega posted blog posts
19 hours ago
rlionhearted_3 posted photos
22 hours ago
rlionhearted_3 favorited Doc Vega's photo
22 hours ago
tjdavis posted a video

Alabama’s Biggest Secret - Operation Paperclip 🇺🇸

In the north of Alabama is the city of Huntsville. It's here where German scientists built NASA in secrecy after World War II. Operation Paperclip is still s...
yesterday
tjdavis posted a photo
yesterday
Doc Vega commented on Doc Vega's blog post Americans You’re Being Squeezed Out!
"Cheeki kea always nice to her you chime in and you're damn right! "
yesterday
Doc Vega commented on Doc Vega's blog post Americans You’re Being Squeezed Out!
"Les Prone thanks for your support Dude! "
yesterday
Doc Vega posted a photo

The inconvenient truth

Trump spells it out!
yesterday
Sandy posted a photo
Wednesday
Less Prone favorited Doc Vega's blog post What Made the Founding Fathers of America so Brilliant?
Tuesday
Less Prone commented on Doc Vega's blog post Why didn't the Archeological World Announce Proof that Jesus Lived?
"Motives of Joe, to shit in the well by showing totally irrelevant proof?"
Tuesday
Doc Vega commented on Doc Vega's blog post Why didn't the Archeological World Announce Proof that Jesus Lived?
"Less, Motives of Wyatt or Joe? What archeologist wouldn't want proof of Jesus as part of his…"
Tuesday
Doc Vega commented on Doc Vega's blog post Why didn't the Archeological World Announce Proof that Jesus Lived?
"Less Prone, Considering Joe Rogan to be the gatekeeper of anything is just short of ridiculous the…"
Tuesday
Doc Vega posted a blog post
Tuesday

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted