Originally posted by Sparko
View Post
Announcement
Collapse
Civics 101 Guidelines
Want to argue about politics? Healthcare reform? Taxes? Governments? You've come to the right place!
Try to keep it civil though. The rules still apply here.
Try to keep it civil though. The rules still apply here.
See more
See less
Russian interference with the 2016 election
Collapse
X
-
The ultimate weakness of violence is that it is a descending spiral begetting the very thing it seeks to destroy...returning violence for violence multiplies violence, adding deeper darkness to a night already devoid of stars. Darkness cannot drive out darkness; only light can do that. Hate cannot drive out hate; only love can do that. Martin Luther King
I would unite with anybody to do right and with nobody to do wrong. Frederick Douglas
-
Originally posted by carpedm9587 View PostWhat is "this" in that sentence?
Comment
-
Originally posted by Mountain Man View Post
The reasons for needing physical access to the servers is plainly obvious:
1) To ensure that all relevant logs have been collected.
2) To ensure that the logs are actually from the server(s) in question.
3) To ensure that the logs have not been tampered with or manipulated.
We have no reason to believe the company the DNC called in to stop the intrusions would have any interest in perpetrating a partisan fraud. They're a respected global security firm.
I'm not likely to credit any conspiracy theory that requires our intelligence agencies to either be hoodwinked or complicit. And if I were, I still couldn't credit this instance, because these agencies are much better known for their conservative leanings. But I'm not, because the suggestion that our entire intelligence community has been taken over by partisans is recognizably part of the big lie.
The fact that every indication is that our intelligence agencies essentially took the DNC's word for it should certainly raise some red flags. They got the story they wanted -- or perhaps the story the mainstream media wanted -- and that was good enough for them. As folks keep saying, all of this was done under the assumption that Hillary would be president, and everything would be quietly swept under the rug. Do you think we would have heard another peep about "Russian interference" if Hillary had won? Of course not, and the Democrats certainly never expected to be put on the spot.
You mention the National Review article posted "upthread", but as I mentioned earlier, if you drill through the linked sources (I think it goes two or three sources deep before you get to anything substantive), the evidence is not nearly as conclusive as you or the mainstream media is making it out to be. It's still unclear exactly what the nature of the breach was. Like I said, my money is still on an inside job, with someone in the DNC feeding information to this this "guccifier" character.
The Guccifer2 fellow appeared immediately after the Russian fingerprints were first reported in the press.
The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.
Guccifer2 was created to provide cover for Fancy Bear's intrusion into the DNC
Even the pros slip up sometimes.
Comment
-
-
Originally posted by Sparko View PostThe whole "Russians interfered with our Election" thing. They have been trying to claim Trump was colluding with them, but now the evidence seems to suggest the opposite. So better to let the whole topic go away, right? Nothing to see here folks!
We have elections coming up in November.
No one is going to be dropping this anytime soon.
Comment
-
Originally posted by lao tzu View PostWe have no reason to believe the company the DNC called in to stop the intrusions would have any interest in perpetrating a partisan fraud.
As for whether or not Cloudstrike is a respected firm, let's just say that's debatable.
Digital fingerprints, so what? I guess you missed the big story last year about how software from our own intelligence agencies that can spoof fingerprints has been "in the wild" for several years. And while "guccifier" could be Russian (seems like nobody knows for sure at this point), it still doesn't explain his initial point of entry. Did an insider give him the key? Seems like the guy who knew the answers was conveniently killed in a "botched robbery" that was so botched that he wasn't actually robbed.Some may call me foolish, and some may call me odd
But I'd rather be a fool in the eyes of man
Than a fool in the eyes of God
From "Fools Gold" by Petra
Comment
-
Originally posted by lao tzu View PostThere is literally no breathing room for conspiracy theories suggesting the Russians colluded with Hillary.
Chairman Nunes: "There's clear evidence of collusion with the Russians. It just happens to be with the Hillary Clinton campaign and the Democratic National Committee."
Some may call me foolish, and some may call me odd
But I'd rather be a fool in the eyes of man
Than a fool in the eyes of God
From "Fools Gold" by Petra
Comment
-
-
The same organizations whose failures brought us 9/11, the Parkland shooting, torture of prisoners and the Iraq War are now sacrosanct and their integrity and competence is beyond reproach among the left."As for my people, children are their oppressors, and women rule over them. O my people, they which lead thee cause thee to err, and destroy the way of thy paths." Isaiah 3:12
There is no such thing as innocence, only degrees of guilt.
Comment
-
Originally posted by Mountain Man View PostOther than the fact that they were hired by the DNC and have been careful to keep law enforcement agencies at arm's length from the evidence.
As for whether or not Cloudstrike is a respected firm, let's just say that's debatable.
Digital fingerprints, so what? I guess you missed the big story last year about how software from our own intelligence agencies that can spoof fingerprints has been "in the wild" for several years. And while "guccifier" could be Russian (seems like nobody knows for sure at this point), it still doesn't explain his initial point of entry. Did an insider give him the key? Seems like the guy who knew the answers was conveniently killed in a "botched robbery" that was so botched that he wasn't actually robbed.
And that Wikileaks dump was probably the most dangerous leak in our nation's history. It included the CIA's entire government-takedown tool kit, and so filled with zero days that it had to have been built by the NSA. There is code in there to take out vital infrastructure, like power plants.
I think we have enough real world concerns about it being out in the wild to begrudge time with poorly considered conspiracy theories.
Comment
-
Originally posted by lao tzu View PostThe NSA would disagree.
You need to check out the entire system, the routers, the servers, hard drives, etc. - it all needs to be forensically examined and hard drives securely copied.
How would they even GET the logs unless they had access to the machines? If someone at the DNC just copies a log file and emails it to the FBI that is suspicious in itself and not forensically sound.
Comment
-
Originally posted by lao tzu View PostThis story is from March 2017, and sourced to the [blah blah blah genetic fallacy]
I must say, you have this "deflect, dodge, spin" routine down to a science.
Originally posted by lao tzu View Post...that Wikileaks dump was probably the most dangerous leak in our nation's history. It included the CIA's entire government-takedown tool kit, and so filled with zero days that it had to have been built by the NSA. There is code in there to take out vital infrastructure, like power plants.
But the point is, with the technology to spoof "fingerprints" out there where anybody with sufficient knowledge can use it, it makes it very hard to put much faith in "fingerprint" evidence, especially when the DNC and Cloudstrike have been so coy about it.Some may call me foolish, and some may call me odd
But I'd rather be a fool in the eyes of man
Than a fool in the eyes of God
From "Fools Gold" by Petra
Comment
-
Originally posted by Sparko View PostDid they? Show me.
You need to check out the entire system, the routers, the servers, hard drives, etc. - it all needs to be forensically examined and hard drives securely copied.
How would they even GET the logs unless they had access to the machines? If someone at the DNC just copies a log file and emails it to the FBI that is suspicious in itself and not forensically sound.Some may call me foolish, and some may call me odd
But I'd rather be a fool in the eyes of man
Than a fool in the eyes of God
From "Fools Gold" by Petra
Comment
-
Originally posted by Sparko View PostYou need physical access to the server in order to search it and the network it is connected to to find the information on the hacking. You can't just look at a log file.
I have no idea what the most common practice is for law enforcement. Certainly if they have reason to believe a computer has been used to commit a crime, they may want to physically collect it to prevent it being tampered with before they can investigate. But it would be VERY hard for someone today to tamper with a machine and leave NO trace of that tampering. Given the low level of sophistication the Clinton campaign exhibited throughout this, it is doubtful (to me) that they would have even begun to be able to manage it.
Finally, it is not clear to me exactly what law has been broken if someone hacks into the private servers of a political campaign. If the campaign chooses not to press charges, I don't see why there would be a problem (other than a political one - people will accuse them of "hiding something.")The ultimate weakness of violence is that it is a descending spiral begetting the very thing it seeks to destroy...returning violence for violence multiplies violence, adding deeper darkness to a night already devoid of stars. Darkness cannot drive out darkness; only light can do that. Hate cannot drive out hate; only love can do that. Martin Luther King
I would unite with anybody to do right and with nobody to do wrong. Frederick Douglas
Comment
Related Threads
Collapse
Topics | Statistics | Last Post | ||
---|---|---|---|---|
Started by seanD, Today, 04:10 AM
|
6 responses
23 views
0 likes
|
Last Post
by rogue06
Today, 07:25 AM
|
||
Started by Cow Poke, Yesterday, 04:44 AM
|
13 responses
81 views
0 likes
|
Last Post
by Cow Poke
Today, 05:15 AM
|
||
Started by Ronson, 04-30-2024, 03:40 PM
|
10 responses
70 views
0 likes
|
Last Post
by Roy
Today, 04:58 AM
|
||
Started by Sparko, 04-30-2024, 09:33 AM
|
16 responses
79 views
0 likes
|
Last Post
by rogue06
Yesterday, 12:27 PM
|
||
Started by Hypatia_Alexandria, 04-30-2024, 09:11 AM
|
51 responses
267 views
0 likes
|
Last Post Today, 07:40 AM |
Comment