EAllusion wrote:They were given images and network logs by an independent firm, which is is how that works. Asking for the approximately 160 servers is like demanding google send you their harddrives from their datacenters when you ask for an gmail record for your investigation. It makes no sense. This is one of the dumber defenses floating out there in the right-wing-o-sphere. It seems to be aimed at old people who have no clue how technology works.
Where are you getting this figure of 160 physical servers?
I think it's fair to put the full picture in context. I don't care if images of servers were created, that's fine, but clearly that would raise legitimate questions about chain of custody as well. My understanding, which is perhaps wrong, is that the FBI never gained direct access to either the physical server or images of the server(s), but relied entirely on a report generated by a private firm hired by the DNC. There is talk about other firms confirming their conclusions, but that too sounds equally dubious.
I literally just went through a process very similar to this where I was asked to review a report generated by another firm. It was a source code review of a PLC control network for a sensitive/critical infrastructure. It was not a blind review where I was from-scratch generating a new report based on the raw source material, but rather I was being asked to opine on the findings of an existing review and validate their conclusions as being reasonable or not. While I may find their conclusions reasonable, based on the information and accompanying logic I'm presented with, that isn't to say that my from-scratch assessment would lead to the same results. I've been on each side of this process many times.
All that being said, I'm not concerned with logs or images or anything like that. Assuming it hasn't been tampered with, that's fine. The point I'm getting at is that something like IP logs aren't terribly informative. IP addresses can be spoofed for instance. In cases where the VPN was supposedly left off was the user engaged in bi-directional communication or uni-directional? How many router hops? What sub-network? Just because a certain IP address registered on server logs as the source does not mean it was actually the source. IPs spoofed, traffic re-routed if in control of the right routers, and so on. Even if the IP address was 100% legit and was the IP for Putin's personal secretary's computer, who's to say her computer didn't have malware on it that was being used to route traffic requests on behalf of a hacker sitting in Topeka, Kansas?
Who's to say this Guccifer avatar on Twitter is legit? We don't know that the source of the leaks and the personality talking on Twitter were the same. The personality on Twitter shared some material to "prove" their identity. They could have simply had access to documents/emails from the original source. Or, from other sources. Knowing that they had been hacked, and trying to leverage the situation and spin it, it could have even been the DNC themselves. Have all these potential possibilities been credibly ruled out? I do not believe that they have.
But, again, repeating, I'm not saying Russia wasn't in some way involved. Maybe they were. But it appears largely based on conjecture. Even if they were wholly responsible in the most sinister way imaginable, those are accusations which cannot be responsibly made based on such weak evidence. All this is being blown grossly out of proportion with the facts.