Good morning, I’m still reporting on: DNC Emails Were Copied To Flash Drive NOT Over the Internet, 1706
Synopsis: A new detailed report by a mysterious IT specialist by the name The Forensicator, shows that the original source of the DNC emails was not Russia or Romania, but copied locally onto a thumb drive and timestamped in the eastern time zone.
Furthermore, they were copied only 5 days before Seth Rich was murdered on the streets of Washington, D.C.
The study is published under the name of Adam Carter’s Blog. Adam Carter is a fictional character from the BBC espionage TV series “Spooks” which follow the exploits of Section D, a counter-terrorism division of MI5. The character is portrayed by British actor Rupert Penry-Jones. The series ran from May 2002 to Oct. 2011.
This report is not something thrown together quickly. It is detailed and appears on first blush to be authoritative. It analyzes the file metadata found in a 7zip archive file, 7dc58-ngp-van.7z, originally attributed to the Guccifer 2.0 persona. The report resides at g-2.space/ , or simply search for “Guccifer 2.0 – Game Over”.
The report states that according to the metadata attached to the files, the files were transferred on July 5, 2016 starting at 18:39:02 EDT and completed at 18:53:17 EDT at a transfer rate of 23 MB per second. That is an upload speed that was probably impossible over the Internet at the DNC site other than over their private LAN (Local Area Network).
In other words, someone had to be in the DNC building to make this copy, and it certainly could not have been done from Russia or Romania, where the famous hacker Guccifer was supposedly located. According to the report:
“Due to the estimated speed of transfer (23 MB/s) calculated from this study, it is unlikely that this initial data transfer could have been done remotely over the Internet.”
“The initial copying activity was likely done from a computer system that had direct access to the data.”
“By “direct access” we mean that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high speed network (LAN).”
Another interesting aspect of the Forensicator Report is that the