What do you mean by physical disks? I just told you that you aren’t getting any infrastructure from a cloud provider… the includes the servers and any drives associates with them.
Even if the servers were on prem… you still may not get the physical drives. The drives may be a part of a production environment and taking them would cause outages.
If Russia hacked, they were not the only ones. Also… I dont buy the premise that another hacker could not have set up Russia to look like the hacker. Hillary would not have welcomed that information. SO the company was not paid to produce it.
Standard excuses. If someone made an image - as libs said was done - then you can remove the original disk and replace with a new one with the image of the old.
Funny. I’ve had a “little” experience with ground to air missile systems and Russian conops. But when the shootdown of the aircraft over Ukraine came up… you libs cared not about any actual experience with such things.
Same thing for certain classified information issues. And others…
Cool story, but it turns out that the people who do know what they are talking about have no such doubts. Because and I’ve demonstrated, the FBI had no problem attributing the attack to Russia.
It also doesn’t mention the reason the DNC technician rebuffed the FBI multiple times… As explained in memos the technician wrote after each of the early contacts with the FBI, the technician received a PHONE CALL that stated they were with the FBI and were wanting access to the DNC system to investigate hacking.
Now surely, a chief scientist, knows that one of the FUNDAMENTALS of security is NOT to give access to someone claiming authority in a phone call. This is called social engineering as is THE MOST effective way to breach a system.
The greatest threat is on the inside… a person who is authorized and either malicious, negligent, or otherwise intentionally allowing unauthorized access
I made no mention of that early FBI contact. Bringing it up is a diversion.
I seriously doubt if the request was made as you describe it anyhow. No one would grant the request without a proper vetting and protected remote access via a secure interface.