13.01.2017 Views

Hack Everything…

free-downloads?download=1:hack-everything-special-report

free-downloads?download=1:hack-everything-special-report

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

“In April, 2012, the Austrian police arrested a 15-year-old for hacking into a shocking 259<br />

companies. He is the country's youngest arrested hacker and is estimated to have<br />

broken into an average of three sites per day.”<br />

“A Greek teenager was arrested last year for allegedly hacking into websites of the U.S.<br />

government and Interpol, ending a two-year chase. A raid of his house revealed 130 fake<br />

credit cards. Allegedly, his back is tattooed with the statement, "Capitalism is opportunity<br />

and opportunity is freedom."<br />

“Two Norwegian teens were arrested in connection to a string of computer attacks. The<br />

BBC alleges that the targets may have included the British Serious Organized Crime<br />

Association, the Norwegian lottery, and a German newspaper.”<br />

My point in telling these stories is to demonstrate how poor Internet security really is right<br />

now. Those who claim that teenage boys could not possibly hack into the DNC server<br />

simply do not know what they are talking about. As noted earlier X Agent is out in the wild<br />

and available to be used by anyone. Windows computers and servers are particularly<br />

susceptible to hacking due to the always open NSA back door. Until adults do a better job<br />

of demanding secure computers and servers, we are going to see even more stories of<br />

teenagers hacking into government and corporate computer systems.<br />

Earlier I explained why I concluded that the 2015 German Parliament Fancy Bear attack<br />

must have been a teenager. The heartbleed problem with Open SSL is simply too well<br />

known for either the Russians or NSA to be that dumb. Without more accurate research<br />

and information, it would be impossible to tell for sure who hacked the DNC in September<br />

2015 and March 2016.<br />

However, in the preceding pages I have analyzed many IP addresses that all lead to what<br />

look to me to be NSA servers. Ironically, what really tipped the scales towards this<br />

conclusion was the list of IP addresses in the December 2016 Grizzly Steppe Report.<br />

There is no other rational explanation for so many TOR exit nodes appearing in any list<br />

other than concluding it was the NSA trying as usual to get rid of TOR. Teenagers would<br />

have no interest in attacking the TOR project. In fact, they would have a strong interest in<br />

protecting the TOR project as it would be the main thing reducing the chances of being<br />

captured.<br />

How Many Leaks or <strong>Hack</strong>s Were There and How Many Data Dumps Were Given to<br />

Wikileaks?<br />

Wikileaks has stated at various times that their source was a disgusted Democratic Party<br />

insider who leaked information they had gotten directly from the DNC server. But<br />

Wikileaks has also stated at other times in other interviews that their source was a<br />

disgusted US Intelligence Agent – meaning someone from the NSA, CIA or FBI got data<br />

indirectly through a hack and then gave the data to Wikileaks.<br />

In researching our detailed timeline of events, it appears that Wikileaks was actually<br />

given as many as four sets of data at various points in time. First, they were given data<br />

from the Clinton private server which they published on March 16, 2016.<br />

<strong>Hack</strong> <strong>Everything…</strong> A Detailed Timeline of the DNC <strong>Hack</strong> Page 77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!