That case has nothing to do with real journalism. We are not talking about illegally hacking into people's data, but allowing carefully whetted whistleblowers who have exhausted official channels, to leak the bare minimum information necessary to wake the public up.
And doesn't wikileaks by its own standards do zero vetting of whistleblowers? They say that the material is completely uploaded anonymously. So how could they vet who the who the people are??
They might try to verify the material and see if it looks like it's legit documents but, supposedly they have no idea who the people uploading the documents are.
Assange was charged with hacking.
The doj said in the Manning case that Assange was not just a publisher who received the material and published it. They are saying that Assange actively helped Manning get the material. That's why this was a criminal case
He was charged with conspiracy to commit computer intrusion (i.e. hacking into a government computer),
He later was charged with conspiring with Manning to obtain national defense information.
A later Indictment said he participated in the lulzsec and Anonymous hacking cases.
A hacker who steals information is violating the law even if they are doing it as a form or protest or civil disobedience.
A journalist who receives that info can publish it and is protected is the US system.
However if the reporter helps in the hacking that is not journalism and they can be prosecuted.
Assange will have agreed to a "criminal information" statement that lists the facts of the case.
You have completely gobbled up mainstream propaganda.
This ties up to Seth Rich, who was the person who uploaded the DNC emails to wikileaks and got murdered by MS-13 assets.
One of the reasons they desperately shut Assange down was to ensure he wont confirm the identity of the uploader.
Many people including Bill Binney who is ex-NSA and a whistleblower himself, confirmed from the timestampts that the files were not transmitted over the Internet but rather copied directly via a hard drive.
There is a lot you can dig here, and multiple Q posts as well.
Here is one to get started. You can search keywords yourself to dig further.
What have you gobbled up ? Have you checked this stuff.
First
There's nothing about the DNC in this case. This case goes back to 2010.
Second, I don't follow this part. It doesn't make any sense to me.
One of the reasons they desperately shut Assange down was to ensure he wont confirm the identity of the uploader.
Assange can do that right now. He could have done that anytime over the past 8 years.
By the way the DOJ already put out an Indictment detailing how the files got to Wikileaks back in 2018.
Many people including Bill Binney who is ex-NSA and a whistleblower himself, confirmed from the timestampts that the files were not transmitted
Bill Binney did not confirm this. In fact, his examination COULD NOT have proven this point. Which Binney admitted. There was nothing in the analysis Benny did that could say how the files left the DNC. All he was examining was an archive. Looking at the metadata of the files of the archive, you can only tell when the archive was made.
For example, let's say you hired me to hack a government agency. Everyday in May I take out a small amount of file so I'm not detected.
Later on in June I zip up all the files into an archive and put the archive on a thumb drive before I hand it to you. The metadata would be about the June archive. It wouldn't tell you anything about how the files actually left the DNC. It was because of this reason that some of Binney's whistle-blowing colleagues did not sign on to the report he put out.
Another problem was Binny was actually looking at a fraudulent archive. Duncan Campbell, a friend of Binney's uncovered how the "Forensicator" archive Binney was looking at was faked.
On inspecting the full data analysis, Binney agreed: “It’s clear G2 is messing with the data. Everything G2 says is suspect and needs to be proven by other sources/means. I agree there is no evidence to prove where the download/copy was done.”
The archive came from a conference when Guccifer 2 was supposed to speak. Instead a powerpoint was emailed with a link to an archive. The password came from the forensicator who claimed to be an American named Adam Carter but was a British guy named, Tim Leonard. He was running a disinfo campaign and was very successful.
He used two different archiving tools to create his ZIP file, one of which was an outdated version that that used local computer time rather than universal time codes. So it was very simple to change the clock on your computer and claim the files are set whenever you want them to be.
Another indication of the fraud was the timestamps actually only existed in this fraudulent archive, not in the Wikileaks files.
The Forensicator report avoided pointing out that the time stamps examined were present only in the special London group of documents, and not in tens of thousands of other DNC files published by WikiLeaks or Guccifer 2.0.
A lot of of the questions Q posed in that screenshot got answered a few months later.
Bill Binney confirmed that the files were copied from "local" to a USB drive, but there is no way to say what "local" was. Whether it was DNC or something else.
Only thing you can say is that it was was not hacked remotely. Watch the clip to see what precisely Binney is "admitting"
Binney agreed: “It’s clear G2 is messing with the data. Everything G2 says is suspect and needs to be proven by other sources/means. I agree there is no evidence to prove where the download/copy was done.”
Again, watch the clip, he explains exactly what "messing with the data" they are referring to.
There was nothing in the analysis Benny did that could say how the files left the DNC.
Again, the analysis has nothing to do with DNC. He makes no claim it came from DNC. His claim is that its not a hack.
Looking at the metadata of the files of the archive, you can only tell when the archive was made.
An archive, by definition, stores not just the files but all the metadata. So you can look at an archive and access not just the data, but all the attributes of the individual files, including the timestamps. This is a basic computer fact.
For example, let's say you hired me to hack a government agency. Everyday in May I take out a small amount of file so I'm not detected.
Later on in June I zip up all the files into an archive and put the archive on a thumb drive before I hand it to you. The metadata would be about the June archive. It wouldn't tell you anything about how the files actually left the DNC. It was because of this reason that some of Binney's whistle-blowing colleagues did not sign on to the report he put out.
This scenario makes absolutely no sense. I am assuming you got it from a fact checking site.
First, no hacker is going to keep hacking daily to copy a few files, making it almost certain to leave tracks and get caught. Hackers would assume that they will be caught and try and copy as much data as they can before they are stopped.
Second, when you zip up all the files in an archive, the archive will store all the metadata of each file.
Third, even in the indictment no one is claiming that someone "hired" a hacker to do the hack and give it to them in a thumb drive.
This is a basic computer fact.
Dude, you have absolutely no idea what is a basic computer fact and what is not. You can start your learning here and a specific example of ZIP file format
The "Extra" data fields are the key to the extensibility of the ZIP format. "Extra" fields are exploited to support the ZIP64 format, WinZip-compatible AES encryption, file attributes, and higher-resolution NTFS or Unix file timestamps.
The pax format extends the ustar format by allowing arbitrary attributes to be stored as special archive members before the actual file entry. This provides for unlimited length pathnames, file sizes; unlimited precision timestamps, etc.
That case has nothing to do with real journalism. We are not talking about illegally hacking into people's data, but allowing carefully whetted whistleblowers who have exhausted official channels, to leak the bare minimum information necessary to wake the public up.
That's not what happened in this case.
And doesn't wikileaks by its own standards do zero vetting of whistleblowers? They say that the material is completely uploaded anonymously. So how could they vet who the who the people are??
They might try to verify the material and see if it looks like it's legit documents but, supposedly they have no idea who the people uploading the documents are.
Assange was charged with hacking. The doj said in the Manning case that Assange was not just a publisher who received the material and published it. They are saying that Assange actively helped Manning get the material. That's why this was a criminal case
He was charged with conspiracy to commit computer intrusion (i.e. hacking into a government computer),
He later was charged with conspiring with Manning to obtain national defense information.
A later Indictment said he participated in the lulzsec and Anonymous hacking cases.
A hacker who steals information is violating the law even if they are doing it as a form or protest or civil disobedience.
A journalist who receives that info can publish it and is protected is the US system.
However if the reporter helps in the hacking that is not journalism and they can be prosecuted.
Assange will have agreed to a "criminal information" statement that lists the facts of the case.
Let's see what that says.
You have completely gobbled up mainstream propaganda.
This ties up to Seth Rich, who was the person who uploaded the DNC emails to wikileaks and got murdered by MS-13 assets.
One of the reasons they desperately shut Assange down was to ensure he wont confirm the identity of the uploader.
Many people including Bill Binney who is ex-NSA and a whistleblower himself, confirmed from the timestampts that the files were not transmitted over the Internet but rather copied directly via a hard drive.
There is a lot you can dig here, and multiple Q posts as well.
Here is one to get started. You can search keywords yourself to dig further.
u/#q1009
Precisely!
What have you gobbled up ? Have you checked this stuff.
First There's nothing about the DNC in this case. This case goes back to 2010.
Second, I don't follow this part. It doesn't make any sense to me.
Assange can do that right now. He could have done that anytime over the past 8 years.
By the way the DOJ already put out an Indictment detailing how the files got to Wikileaks back in 2018.
Bill Binney did not confirm this. In fact, his examination COULD NOT have proven this point. Which Binney admitted. There was nothing in the analysis Benny did that could say how the files left the DNC. All he was examining was an archive. Looking at the metadata of the files of the archive, you can only tell when the archive was made.
For example, let's say you hired me to hack a government agency. Everyday in May I take out a small amount of file so I'm not detected.
Later on in June I zip up all the files into an archive and put the archive on a thumb drive before I hand it to you. The metadata would be about the June archive. It wouldn't tell you anything about how the files actually left the DNC. It was because of this reason that some of Binney's whistle-blowing colleagues did not sign on to the report he put out.
Another problem was Binny was actually looking at a fraudulent archive. Duncan Campbell, a friend of Binney's uncovered how the "Forensicator" archive Binney was looking at was faked.
The archive came from a conference when Guccifer 2 was supposed to speak. Instead a powerpoint was emailed with a link to an archive. The password came from the forensicator who claimed to be an American named Adam Carter but was a British guy named, Tim Leonard. He was running a disinfo campaign and was very successful.
He used two different archiving tools to create his ZIP file, one of which was an outdated version that that used local computer time rather than universal time codes. So it was very simple to change the clock on your computer and claim the files are set whenever you want them to be.
Another indication of the fraud was the timestamps actually only existed in this fraudulent archive, not in the Wikileaks files.
A lot of of the questions Q posed in that screenshot got answered a few months later.
Ah, I think you must be new to Lawfare.
You are kidding right? He hasn't even been able to communicate with anyone, let alone make public statements
Bill Binney's clip for points below.
Bill Binney confirmed that the files were copied from "local" to a USB drive, but there is no way to say what "local" was. Whether it was DNC or something else. Only thing you can say is that it was was not hacked remotely. Watch the clip to see what precisely Binney is "admitting"
Again, watch the clip, he explains exactly what "messing with the data" they are referring to.
Again, the analysis has nothing to do with DNC. He makes no claim it came from DNC. His claim is that its not a hack.
An archive, by definition, stores not just the files but all the metadata. So you can look at an archive and access not just the data, but all the attributes of the individual files, including the timestamps. This is a basic computer fact.
This scenario makes absolutely no sense. I am assuming you got it from a fact checking site.
First, no hacker is going to keep hacking daily to copy a few files, making it almost certain to leave tracks and get caught. Hackers would assume that they will be caught and try and copy as much data as they can before they are stopped.
Second, when you zip up all the files in an archive, the archive will store all the metadata of each file.
Third, even in the indictment no one is claiming that someone "hired" a hacker to do the hack and give it to them in a thumb drive.
Dude, you have absolutely no idea what is a basic computer fact and what is not. You can start your learning here and a specific example of ZIP file format
or the TAR file format