Not if you have access to the NSA records of all internet traffic - you'd be able to see that file leaving the DNC network and going somewhere. The "intelligence" community, regardless of who puts the hacks in charge, is notorious for disseminating false information. If there is proof (and there apparently isn't) someone should produce it. The "intelligence" community, for all we know, got their "conclusion" from Crowdstrike.
LOL! You cite PolitiFact "debunking" that John Podesta denied the FBI access to the DNC servers, when, as a matter of fact, I never asserted that. This is par for your course, producing a debunked straw man and using it to declare victory. In fact the FBI did not have access:
In testimony before the Senate, FBI Director James Comey stated the following:
Question (by Senator Burr): Did the FBI request access to those devices [the servers and Podesta’s devices] to perform forensics on?
A: Yes, we did.
Q: And would that access have provided intelligence or information helpful to your investigation in possibly finding … including to the Intelligence Community Assessment?
A: Our forensics folks would always prefer to get access to the original device or server that’s involved. So, it’s the best evidence.
Q: Were you given access to do the forensics on those servers?
A: We were not. We were … a highly respected private company eventually got access and shared with us what they saw there.
Q: But is that typically the way the FBI would prefer to do the forensics or would your forensic unit rather see the servers and do the forensics themselves?
A: We always prefer to have access hands on ourselves, if that’s possible.
Q: Do you know why you were denied access to those servers?
A: I don’t know for sure. Um, I don’t know for sure.
Q: Was there one request or multiple requests?
A: Multiple requests at different levels and ultimately what was agreed to is that the private company would share with us what they saw.
So, instead of using a search warrant or some other legal process to perform a direct, hands on forensic examination of the DNC server, the FBI agreed to base its investigation on the findings of a private cybersecurity company. And, as discussed in the previous article, that company, CrowdStrike, was to do the investigation pursuant to its contract with Michael Sussmann of Perkins Coie, the law firm that represented Hillary Clinton’s presidential campaign.
Think about that. When presented with allegations of a devastating foreign cyber attack on one of the two major political parties, the FBI meekly agreed to allow CrowdStrike and Perkins Coie to do the forensic examination and, for all intents and purposes, run the investigation.
Sounds to me like the FBI did not get any copies and simply relied on Crowdstrike's "findings." If they had received the copies and did their own forensics, why would Comey say they agreed to accept what the "private company saw?"
Even if they did, would they have found the elusive "smoking gun" of Russian exfiltration of the email file? Obviously not, or they would have produced it.
So again, you hide behind the skirt of deep state obfuscation and suggest that whatever the spooks are telling us simply must be fact - no need for evidence. But then that, of course, is absurd.