Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
“In April, 2012, the Austrian police arrested a 15-year-old for hacking into a shocking 259<br />
companies. He is the country's youngest arrested hacker and is estimated to have<br />
broken into an average of three sites per day.”<br />
“A Greek teenager was arrested last year for allegedly hacking into websites of the U.S.<br />
government and Interpol, ending a two-year chase. A raid of his house revealed 130 fake<br />
credit cards. Allegedly, his back is tattooed with the statement, "Capitalism is opportunity<br />
and opportunity is freedom."<br />
“Two Norwegian teens were arrested in connection to a string of computer attacks. The<br />
BBC alleges that the targets may have included the British Serious Organized Crime<br />
Association, the Norwegian lottery, and a German newspaper.”<br />
My point in telling these stories is to demonstrate how poor Internet security really is right<br />
now. Those who claim that teenage boys could not possibly hack into the DNC server<br />
simply do not know what they are talking about. As noted earlier X Agent is out in the wild<br />
and available to be used by anyone. Windows computers and servers are particularly<br />
susceptible to hacking due to the always open NSA back door. Until adults do a better job<br />
of demanding secure computers and servers, we are going to see even more stories of<br />
teenagers hacking into government and corporate computer systems.<br />
Earlier I explained why I concluded that the 2015 German Parliament Fancy Bear attack<br />
must have been a teenager. The heartbleed problem with Open SSL is simply too well<br />
known for either the Russians or NSA to be that dumb. Without more accurate research<br />
and information, it would be impossible to tell for sure who hacked the DNC in September<br />
2015 and March 2016.<br />
However, in the preceding pages I have analyzed many IP addresses that all lead to what<br />
look to me to be NSA servers. Ironically, what really tipped the scales towards this<br />
conclusion was the list of IP addresses in the December 2016 Grizzly Steppe Report.<br />
There is no other rational explanation for so many TOR exit nodes appearing in any list<br />
other than concluding it was the NSA trying as usual to get rid of TOR. Teenagers would<br />
have no interest in attacking the TOR project. In fact, they would have a strong interest in<br />
protecting the TOR project as it would be the main thing reducing the chances of being<br />
captured.<br />
How Many Leaks or <strong>Hack</strong>s Were There and How Many Data Dumps Were Given to<br />
Wikileaks?<br />
Wikileaks has stated at various times that their source was a disgusted Democratic Party<br />
insider who leaked information they had gotten directly from the DNC server. But<br />
Wikileaks has also stated at other times in other interviews that their source was a<br />
disgusted US Intelligence Agent – meaning someone from the NSA, CIA or FBI got data<br />
indirectly through a hack and then gave the data to Wikileaks.<br />
In researching our detailed timeline of events, it appears that Wikileaks was actually<br />
given as many as four sets of data at various points in time. First, they were given data<br />
from the Clinton private server which they published on March 16, 2016.<br />
<strong>Hack</strong> <strong>Everything…</strong> A Detailed Timeline of the DNC <strong>Hack</strong> Page 77