Why would you hack your own computer? Maybe you forgot your password, or maybe you want to look at what your spouse or kids have on their side of the system. If you aspire to Hillary Clinton’s pro-level of cloak and dagger deception, you might want to create a diversion calculated to swing the election.

That would seem to take fancy gear and a lot of money but really doesn’t. A basic USB thumb drive loaded with the free Ubuntu operating system is all it takes to turn an average computer user into Guccifer x.x.

On the fifth of July, 2016, news of leaked DNC emails were the main topic of conversation. How did this happen? What do they say? How do we control the damage? In the hallowed halls of Washington, there is an age old saying. If you can’t deny, discredit.

A few weeks earlier on June 12, the progressive machine was thrown into crisis mode when Julian Assange announced he had some “emails related to Hillary Clinton.” Their authenticity was never questioned and led to the resignations of both Debbie Wasserman Shultz and Donna Brazile.

Two days later, Democrats “discovered” their servers were compromised and made sure to mention “Trump opposition research.” The day after that, the Clinton influenced cyber security firm, Crowd Strike, conveniently “updates” a prior report with evidence suggesting the responsible malware originated with Russians.

The same day, Guccifer 2.0 was born. Appearing in a basic word press blog, the cyber-entity took full credit for the leaks. He then posted documents laced with things relating back to Russia. The first thing he turns loose just happens to be the opposition research teased by dems the day before.

Security experts are now convinced this indicates a clear attempt at a preemptive strike to “associate Russia with anything WikiLeaks might have been about to publish and to ‘show’ that it came from a Russian hack.”

The FBI never performed forensic analysis on any of the first Guccifer 2.0 releases and the hand picked security analysts who did an assessment for the Obama administration did not mention any forensic evidence in their report, just opinion.

Bill Binney, who used to be Technical Director for the NSA has been saying all along that he built the capability allowing the NSA to trace each and every packet of information to see where it went. If the DNC had been hacked, he says you can bet they would have precise details down to the second confirming the hack. “NSA simply do not have the event – because there wasn’t one,” he says. “This set-up should have detected where the packets went and when they went there.” The democratic big wigs refuse to allow access to their servers to find out for sure.

One industry analyst going under the name forensicator concludes there are many solid facts clearly showing the information came from someone with physical access to a DNC machine and proves the documents were leaked from the inside rather than hacked from the outside.

Based on time stamps of the files, the material was first accessed during a fourteen minute period starting at 6:45 pm, Eastern Standard Time. Two types of compressed files used to contain the data have different ways of doing things, so both the time and the time zone are nailed down tight. By analyzing the speed of the transfer, experts can easily confirm that the data moved way too fast to have gone across the internet. Instead, the transfer rate indicates a basic file transfer to a flash drive.

Most businesses use Windows based software due to its compatibility. Users think things stored in their user accounts are secured by their password, but they are not. As a basic tool to maintain computer systems, a flash drive with the Ubuntu OS installed can be a lifesaver. If somehow you find yourself locked out of a windows file system, you can still get the files. All you have to do is take your Ubuntu boot flash and stick it in a drive. Power down the machine and when it powers back up, you are running Ubuntu.

Any operating system using the Linux kernel can make Windows files fully visible and accessible, without a password. You can grab what you want, pull out the flash, reboot the machine and it is back to normal. All the files you need are in your pocket. Technical experts can tell that the files were copied to a device running Linux because the “last modified” time stamp was not changed on the transfer. This indicates use of the basic Linux copy function.

About twenty megabytes of data were transferred in 14 minutes. Not all that data shows up later, indicating that certain things were singled out for release. Those defending the hacking position claim the gaps indicate “thinking time” where the person gathering files stopped to plan which was next to grab. That argument is not supported by the technicians who say there are a lot stronger signs the whole thing was grabbed in one piece then edited later.

The fact that 90 percent of what was taken was never used is highly suspicious. All of the information attributed to Guccifer 2.0 are “over-hyped non-controversies or were already in the public domain – the only exception being the apparent leaking of personal contact numbers and email addresses of 200 Democrats – and really that was more damaging to the reputation of Wikileaks than causing any real problems for Democrats.”

Guccifer 2.0’s claims to be a Russian hacker and also in contact with Seth Rich are both fantasies according to forensicator. “The files now known as “NGP-VAN” were copied by someone with access to a system connected to the DNC internal network …this action had no bearing on the files submitted to Wikileaks and were most likely not associated with Seth Rich, and definitively not remotely “hacked” from Russia.