Started By
Message

re: So the DNC Server is Clearly Not Important to the Investigation

Posted on 7/17/18 at 10:02 am to
Posted by LetsgoGamecocks
Member since Sep 2014
2916 posts
Posted on 7/17/18 at 10:02 am to
quote:

Even so, what CrowdStrike gave the FBI is likely better than if it had seized and analyzed a physical box.


So does the FBI have an image of the server? From everything I have read the FBI does not. That is why they, the President and others keep asking.

If they did provide an image how do we know it was the actual server in question?

But I agree with you that in criminal cases the first thing the investigators do is use a software tool that extracts an exact copy that can't be manipulated only searched. I went to a lecture in SC headed by the top forensic computer investigator for SLED on this exact topic.
Posted by NC_Tigah
Carolinas
Member since Sep 2003
124709 posts
Posted on 7/17/18 at 10:04 am to
quote:

Decatur had a post that indicated they had real time images of complete data sets taken while the hacking was in progress.
No kidding
quote:


Dutch intelligence first to alert U.S. about Russian hack of Democratic Party
by Eelco Bosch van Rosenthal
January 25, 2018


In the Summer of 2015, Dutch intelligence services were the first to alert their American counterparts about the cyberintrusion of the Democratic National Committee by Cozy Bear, a hacking group believed to be tied to the Russian government. Intelligence hackers from Dutch AIVD (General Intelligence and Security Service) had penetrated the Cozy Bear computer servers as well as a security camera at the entrance of their working space, located in a university building adjacent to the Red Square in Moscow.
...

After a few months, in November 2014, the Dutch watched as the Russian hackers penetrated the computer network of the State Department. After being alerted to this by the Dutch intelligence chiefs, it took the Americans over 24 hours to avert the Russian attack, after a digital clash which, years later, at a discussion forum in Aspen, the Deputy Director of the NSA would refer to as hand-to-hand combat . Basing itself on intelligence sources, the Washington Post wrote that a Western ally had been of assistance.
...

It is not clear why the hacks at the DNC could continue for so long despite the Dutch warnings. Last year, The New York Times reported that for months, the DNC had not taken the FBI warnings seriously. Eventually, cybersecurity company Crowdstrike, which was investigating the matter on behalf of the Democratic Party, also concluded that Cozy Bear and Fancy Bear were jointly responsible for the hacks. According to the US intelligence services, Russian officials eventually passed on the emails hacked by Fancy Bear to Wikileaks, which published them. The published emails caused a huge scandal in the American election campaign.
...

LINK


HOWEVER, Decatur either doesn't understand or more likely does not give a sh*t about actual truth here.

First off, analysis of the actual server would ABSOLUTELY be helpful, and absent any evidence other than Crowdstrike's, would ABSOLUTELY be necessary to successfully prosecute. The question in assessing damage and potential damage also has to do with a complete assessment as to who hacked, when and how.

As we know, and as Decatur knows, there were AT LEAST two different "hacks" on the DNC by two separate entities at different times. Crowdstrike DID NOT pick both of those up live. Nonetheless, we know there were at least two hacks. If live monitoring is the only way to ID hacks (Hint: It isn't), how then do we know there was more than one?

Thus far, we've been told the monitored hack, and the sole admitted unmonitored hack, were tied to Russian Groups. What about others? In light of the 2 separately successful individual hacks already admitted to, what are the odds those were the only two? The answer is "slim to none."

All of this raises questions Decatur and his nothing-to-see-on-the-DNC-server crowdwould like to avoid.
Some of those questions are:
(1) How was the unmonitored hack identified?
(2) How was any possibility of other hacks excluded?
(3) If other hacks (e.g., by the Chinese, or by a 400# kid in a bed somewhere) had been discovered, how would we know the actual hack source of materials subsequently leaked.
(4) Would the substance of #3 have undercut the RussiansRussiansRussiansRussians narrative?
Posted by Cruiserhog
Little Rock
Member since Apr 2008
10460 posts
Posted on 7/17/18 at 10:05 am to
quote:

trinidadtiger


well you are a Trumpkin so you have stupid and gullible to deal with as character flaws
Posted by alphaandomega
Tuscaloosa-Here to Serve
Member since Aug 2012
13780 posts
Posted on 7/17/18 at 10:10 am to
quote:

And where are Crooked's 33,000 deleted emails?



We are supposed to believe that the NSA has a copy of every digital document and route (similar to the old tracert command in dos).

If they have every single text, email and phone conversation why in the hell have they not been made to produce those emails.

Seems really swampy to me.

And there is not even the most staunch liberal who believes that ALL of those 30,000 emails were personal.
This post was edited on 7/17/18 at 10:11 am
Posted by BeefDawg
Atlanta
Member since Sep 2012
4747 posts
Posted on 7/17/18 at 10:25 am to
quote:

Decatur

You can post all the Leftist computer nerds and academics explanations/justifications for why physical hardware wasn’t ever analyzed by authorities all you like.

What still remains is that a 3rd party company who’s run by a Dem donor, who’s a member of The Atlantic Council, who was paid by Democrats, was the first on the scene and could have easily fabricated all the footprints pointing to Russians, then copied the server image, then simply chronicled the fabrications in a report as if legit, and handed it all to the authorities afterwards.

As has already been confirmed, CrowdStrike got busted trying to insist Russian hackers (Fancy Bear) hacked into a Ukrainian military Android app, but multiple sources, including the app creator and the Ukrainian government itself, confirmed CrowdStrike lied and made the whole thing up.

CrowdStrike admitted they did this to try and confirm association with Fancy Bear being Russian GRU, and they later had to retract their report after being called out for lying.

LINK

quote:

What could provide the link between the Russian intelligence agency GRU and Fancy Bear, the group that Crowdstrike claimed was behind the DNC hack? Enter the Ukrainian story.

Crowdstrike needed to strengthen the hack’s connection to the GRU, as Dmitri clearly stated in an interview he did with PBS on December 22: …

”this is why we wanted to produce more evidence that raises the level of confidence that we have, even internally, that this is Russian intelligence agency called the GRU.”

That interview was part of the promotional campaign for Crowdstrike’s ominous December 22nd “Use of Fancy Bear Android Malware in Tracking of Ukrainian Field Artillery Units” report, which claims that it provides evidence that “further supports CrowdStrike’s previous assessments that FANCY BEAR is likely affiliated with the Russian military intelligence (GRU)”.


quote:

On January 6, the Ukrainian Defense Ministry posted a denial on their official website, stating flatly that the claim that 80 percent of D-30 Howitzers had been destroyed by Russian malware was false.

In connection with the emergence in some media reports which stated that the alleged “80% howitzer D-30 Armed Forces of Ukraine removed through scrapping Russian Ukrainian hackers software gunners,” Land Forces Command of the Armed Forces of Ukraine informs that the said information is incorrect.

According Command Missile Forces and Artillery Land Forces of Ukraine, artillery weapons lost during the time of ATO times smaller than the above and are not associated with the specified cause. Currently, troops Missile Forces and Artillery Army Forces of Ukraine fully combat-ready, staffed and able to fulfill the missions.

Ministry of Defence of Ukraine asks journalists to publish only verified information received from the competent official sources. Spreading false information leads to increased social tension in society and undermines public confidence in the Armed Forces of Ukraine.

As Jeffrey Carr summed it up, “Not only did Crowdstrike choose to quote improbably high losses estimated by a Pro-Russia analyst, we now have confirmation from Ukraine’s MOD that (1) those figures were wrong, (2) Crowdstrike’s reason for the losses were wrong, and (3) Crowdstrike’s spread of false information caused harm.”


quote:

This claim by a DNC official that the FBI had never asked for access to the servers clearly rankled some within the Bureau because the next day The Hill reported that an anonymous source not only contradicted the DNC’s claim, but said that the DNC’s lack of cooperation had caused severe problems for the investigation:

“The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated,” the official said.

“This left the FBI no choice but to rely upon a third party for information. These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier.”

If any of this raised any suspicions for James Comey, he failed to show it in his January 10th testimony. Instead, Comey calmly told the Senate committee that while he would have liked to have the information directly from the DNC servers, that he was okay with getting the information from the company that they employed, the “highly respected” Crowdstrike. As The Hill reported:

“We’d always prefer to have access hands-on ourselves if that’s possible,” Comey said, noting that he didn’t know why the DNC rebuffed the FBI’s request.
Posted by Decatur
Member since Mar 2007
28719 posts
Posted on 7/17/18 at 10:30 am to
quote:

HOWEVER, Decatur either doesn't understand or more likely does not give a sh*t about actual truth here.




quote:

and absent any evidence other than Crowdstrike's,


Ron Howard voice: There was other evidence.

quote:

As we know, and as Decatur knows, there were AT LEAST two different "hacks" on the DNC by two separate entities at different times. Crowdstrike DID NOT pick both of those up live.


One came in before the other but they were both there at the same time when CrowdStrike was called in.

quote:

What about others? In light of the 2 separately successful individual hacks already admitted to, what are the odds those were the only two? The answer is "slim to none."


No other APTs were identified. You are making a claim from no evidence.
Posted by TxTiger82
Member since Sep 2004
33974 posts
Posted on 7/17/18 at 10:31 am to
Muh server
Posted by CptRusty
Basket of Deplorables
Member since Aug 2011
11740 posts
Posted on 7/17/18 at 10:36 am to
quote:

BeefDawg


quote:

Decatur


Posted by HeyHeyHogsAllTheWay
Member since Feb 2017
12458 posts
Posted on 7/17/18 at 10:45 am to
Liberals are children, why are you arguing with them? DO you try to discuss the Mueller investigation with a child? Of course not.

Decatur, you have a very limited understanding of the topic, stick to something you have knowledge about. Paint by number perhaps.
Posted by CptRusty
Basket of Deplorables
Member since Aug 2011
11740 posts
Posted on 7/17/18 at 10:47 am to
I'm sitting this one out. I know some IT, but not nearly enough to comment intelligently on this hacking stuff.

I would, however, like to see Decatur address Beefdawg's post RE: Crowdstrike
Posted by Decatur
Member since Mar 2007
28719 posts
Posted on 7/17/18 at 10:50 am to
quote:

What still remains is that a 3rd party company who’s run by a Dem donor, who’s a member of The Atlantic Council, who was paid by Democrats, was the first on the scene and could have easily fabricated all the footprints pointing to Russians, then copied the server image, then simply chronicled the fabrications in a report as if legit, and handed it all to the authorities afterwards.


The same company hired by the *Trump Campaign* and apparently still under contract with the NRCC.

quote:

As has already been confirmed, CrowdStrike got busted trying to insist Russian hackers (Fancy Bear) hacked into a Ukrainian military Android app, but multiple sources, including the app creator and the Ukrainian government itself, confirmed CrowdStrike lied and made the whole thing up.

CrowdStrike admitted they did this to try and confirm association with Fancy Bear being Russian GRU, and they later had to retract their report after being called out for lying.


The only problem with that report was the estimate of Ukrainian artilery lost (which was subsequently revised), not the attribution. That still stands. The report was not retracted as you claim.

quote:

MARCH 2017 UPDATE: The information about the combat losses of the D-30 artillery units suffered by Ukrainian forces has been updated with the latest analysis from Henry Boyd, International Institute for Strategic Studies (IISS) Research Associate for Defence and Military Analysis.


quote:

According to an update provided in March 2017 by the International Institute for Strategic Studies (IISS) Research Associate for Defence and Military Analysis, Henry Boyd, “excluding the Naval Infantry battalion in the Crimea which was effectively captured wholesale, the Ukrainian Armed Forces lost between 15% and 20% of their pre-war D–30 inventory in combat operations.”


LINK
Posted by ChineseBandit58
Pearland, TX
Member since Aug 2005
43177 posts
Posted on 7/17/18 at 10:54 am to
quote:

All of this raises questions


You know I implicitly trust your opinions as being honest,

Thanks
Posted by Decatur
Member since Mar 2007
28719 posts
Posted on 7/17/18 at 10:56 am to
quote:

Decatur, you have a very limited understanding of the topic,


I don’t disagree with this, actually.

I do have some understanding and I’m always eager to learn more.

Could you be a dove and tell me some things I don’t know about this?
Posted by NC_Tigah
Carolinas
Member since Sep 2003
124709 posts
Posted on 7/17/18 at 11:24 am to
quote:

Ron Howard voice: There was other evidence.
Ron Howards' dad's voice: "Yes Richie, as was posted. Now go play with Potsie and Ralph."
quote:

No other APTs were identified.
Decatur notices two roaches running in his kitchen. He kills them. I'd suggest he call pest control or at least lay down some bug spray. After all, what are the odds those were the only two roaches? The answer is "slim to none."

Decatur's response . . . . No other roaches were identified. You are making a claim from no evidence.
Posted by NC_Tigah
Carolinas
Member since Sep 2003
124709 posts
Posted on 7/17/18 at 11:29 am to
quote:

Could you be a dove and tell me some things I don’t know about this?
hacking evidence can be detected from a hard drive alone. In fact that is most often the method of discovery. (See Sharyl Attkisson hack). Without the hard drive, other hacks would go undetected.
Posted by Ebbandflow
Member since Aug 2010
13457 posts
Posted on 7/17/18 at 11:30 am to
quote:

So what did Crowdstrike examine to determine a hack had occurred? How did they arrive at their conclusions? It seems it is essential to know this.


So you're so far down the list of bargaining that challenging the intelligence community to a hacker off as where you're at now? Pathetic
Posted by HeyHeyHogsAllTheWay
Member since Feb 2017
12458 posts
Posted on 7/17/18 at 11:31 am to
quote:

I’m always eager to learn more.


I don't believe this at all. You clearly only want to "learn" "facts" that fit your preconceived notions, as do most liberals.
Posted by Jbird
In Bidenville with EthanL
Member since Oct 2012
73556 posts
Posted on 7/17/18 at 11:31 am to
quote:

So you're so far down the list of bargaining that challenging the intelligence community to a hacker off as where you're at now?
What the frick did you just babble?
Posted by NC_Tigah
Carolinas
Member since Sep 2003
124709 posts
Posted on 7/17/18 at 11:47 am to
quote:

So you're so far down the list of bargaining
I'm not sure you understand the first thing about this topic, but are you implying Crowdstrike worked without harddrive access?
Posted by ninthward
Boston, MA
Member since May 2007
20532 posts
Posted on 7/17/18 at 11:54 am to
Not if they injected code unique to said server but we'll never know until the server is looked at.
first pageprev pagePage 4 of 5Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram