When cyber investigators respond to an incident, they capture that evidence in a process called “imaging.” They make an exact byte-for-byte copy of the hard drives. They do the same for the machine’s memory, capturing evidence that would otherwise be lost at the next reboot, and they monitor and store the traffic passing through the victim’s network. This has been standard procedure in computer intrusion investigations for decades. The images, not the computer’s hardware, provide the evidence. Both the DNC and the security firm
Crowdstrike, hired to respond to the breach, have said repeatedly over the years that they gave the FBI a copy of all the DNC images back in 2016.
Snip
When the computers belong to a cooperating victim, seizing the machines is pretty much out of the question, said James Harris, a former FBI cybercrime agent who worked on a 2009 breach at Google that’s been linked to the Chinese government. “In most cases you don’t even ask, you just assume you’re going to make forensic copies,” said Harris, now vice president of engineering at PFP Cyber. “For example when the Google breach happened back in 2009, agents were sent out with express instructions that you image what they allow you to image, because they’re the victim, you don’t have a search warrant, and you don’t want to disrupt their business.”
So the DNC wasn’t covering for a leak of material to the Russians. This is all apparently misdirection. And if it’s not, it would behoove those theorizing that it is to explain how the FBI got access to all the information they needed to indict those 12 Russian citizens.
No, The DNC Isn't Hiding Its Servers From The FBI To Create A False Narrative Of Russian Hacking
and this link
Trump's DNC 'Server' Conspiracy Rebutted