Kirata
Posts: 15477
Joined: 2/11/2006 From: USA Status: offline
|
Of possible interest.... I really hope you’ve missed me a lot. Though I see they didn’t let you forget my name. The U.S. intelligence agencies have published several reports of late claiming I have ties with Russia. I’d like to make it clear enough that these accusations are unfounded. I have totally no relation to the Russian government. I’d like to tell you once again I was acting in accordance with my personal political views and beliefs. The technical evidence contained in the reports doesn’t stand up to scrutiny. This is a crude fake. Any IT professional can see that a malware sample mentioned in the Joint Analysis Report was taken from the web and was commonly available. A lot of hackers use it. I think it was inserted in the report to make it look a bit more plausible. I already explained at The Future of Cyber Security Europe conference that took place in London in last September, I had used a different way to breach into the DNC network. I found a vulnerability in the NGP VAN software installed in the DNC system. It’s obvious that the intelligence agencies are deliberately falsifying evidence. In my opinion, they’re playing into the hands of the Democrats who are trying to blame foreign actors for their failure. https://guccifer2.wordpress.com/ https://twitter.com/GUCCIFER_2 There are individuals, who, in reality, have a higher likelihood of being linked to Guccifer2.0 than anyone in Russia. - The intention of this article is to inform readers, extensively about everything there is to know about Guccifer2.0 and from that, be armed with enough information to give motive and means the regard they deserve. To understand who Guccifer2.0 is likely to be - it is imperative to understand WHAT Guccifer2.0 is. - What did he do? - What did he say? - Are his claims now confirmed, debunked or yet to be verified? - What were the results of his actions? - What do any lies told and the likelihood of them being debunked or remaining secret really imply about his intent? - Was there anything misreported or omitted that may have been relevant? The answers to the above questions will probably be surprising to many considering what the USIC, CyberSecurity researchers and the MSM have repeatedly insisted over and over again. The first step is to catalog events - and then, retrospectively review the data. http://g-2.space/#5 https://twitter.com/with_integrity K.
|