It looks like you're new here. If you want to get involved, click one of these buttons!
If you can read this message, please contact us immediately at the following email address:
We'd like to communicate.
Attribution of cyber-intrusions and attacks is nearly impossible. A well executed attack can not be traced back to its culprit. If there are some trails that seem attributable one should be very cautions following them. They are likely faked.
Hundreds if not thousands of reports show that this lesson has not been learned. Any attack is attributed to one of a handful of declared “enemies” without any evidence that would prove their actual involvement. Examples:
In June 2016 we warned The Next “Russian Government Cyber Attack” May Be A Gulf of Tonkin Fake:
All one might see in a [cyber-]breach, if anything, is some pattern of action that may seem typical for one adversary. But anyone else can imitate such a pattern as soon as it is known. That is why there is NEVER a clear attribution in such cases. Anyone claiming otherwise is lying or has no idea what s/he is speaking of.
There is now public proof that this lecture in basic IT forensic is correct.http://www.globalresearch.ca/cia-leak-russian-election-hackers-may-work-at-langley-i-e-cia-headquarters/5578490