Started By
Message
locked post

So the DNC Server is Clearly Not Important to the Investigation

Posted on 7/17/18 at 6:24 am
Posted by Wolfhound45
Hanging with Chicken in Lurkistan
Member since Nov 2009
120000 posts
Posted on 7/17/18 at 6:24 am
So what did Crowdstrike examine to determine a hack had occurred? How did they arrive at their conclusions? It seems it is essential to know this.
Posted by ChineseBandit58
Pearland, TX
Member since Aug 2005
42628 posts
Posted on 7/17/18 at 6:27 am to
Decatur had a post that indicated they had real time images of complete data sets taken while the hacking was in progress.

Crowdsrike must have been monitoring in real time for quite a while - not just doing forensics on computer off line.

to wit:

quote:

Decatur
re: Without the DNC server, what do we really know...Posted on 7/16/18 at 8:26 pm to tigerjoey
quote:
I called up Thomas Rid, professor of strategic studies at Johns Hopkins University’s School of Advanced International Studies to help explain the technical details behind this type of forensic investigation. Rid, who wrote a detailed explanation about why Russia was likely behind the DNC hack for Motherboard in July 2016, told me that “from a forensic point of view, the question of a server at this stage doesn’t make any sense.”

“To really investigate a high profile intrusion like the DNC hack, you have to look beyond the victim network,” Rid said. “You have to look at the infrastructure—the command and control sites that were used to get in that are not going to be on any server ... looking at one server is just one isolated piece of infrastructure.”

Even so, what CrowdStrike gave the FBI is likely better than if it had seized and analyzed a physical box.

“To keep it simple, let’s say there’s only one server. CrowdStrike goes in, makes a complete image including a memory dump of everything that was in the memory of the server at the time, including traffic and connections at the time,” Rid said. “You have that image from the machine live in the network including its memory content, versus a server that someone physically carries into the FBI headquarters. It’s unplugged, so there’s no memory content because it’s powered down. That physical piece of hardware is less valuable for an investigation than the onsite image and data extraction from a machine that is up and running. The idea a physical server would add any value doesn’t make any sense.”

What Rid means is that after a hack, some of the evidence of who did it and how they did it may be fleeting. It could be in the server’s memory, the RAM, and not stored on its hard drive. (Hackers use “fileless” malware precisely for this reason.) To preserve evidence in cases like these, incident responders need to make an image—essentially a copy of the server in that exact same state at that exact same time—so they can look at it afterwards. Think about this like when investigators take pictures of the crime scene or victim.

Lesley Carhart, principal threat hunter at the cybersecurity firm Dragos, told Motherboard that physical servers are rarely seized in forensics investigations.

"For decades, it has been industry-standard forensic and digital evidence handling practice to conduct analysis on forensic images instead of original evidence," she said. "This decreases the risk of corruption or accidental modification of that evidence."

I asked Rid if he thought it was suspicious that the DNC did not hand over the actual server to the FBI, and he said “no, not at all.”

“There’s nothing suspicious about the DNC’s behavior,” he said. “There were political reasons and skepticism on the part of the DNC to let the FBI have full visibility into what they do for various reasons during an ongoing election campaign.”

Rid likened any computer forensics investigation to that of a military planning campaign, sort of like a map. “You can connect the dots and the behavior,” he said. “You can show whoever hacked John Podesta also attacked the DNC, and also attacked Jake Sullivan, who worked for Hillary Clinton, and hundreds of other people on the campaign.”


Trump's Stupid ‘Where Is the DNC Server?’ Conspiracy Theory, Explained
This post was edited on 7/17/18 at 6:35 am
Posted by trinidadtiger
Member since Jun 2017
13408 posts
Posted on 7/17/18 at 6:27 am to
Im certain Crowdstike planted tags to make it look Russian, no doubt obtained from the CIA.
Posted by tigerfootball10
Member since Sep 2005
9496 posts
Posted on 7/17/18 at 6:31 am to
quote:

no doubt obtained from the CIA

No way, we were just told to our intelligence agencies are as honest as Bob Mueller
Posted by Wolfhound45
Hanging with Chicken in Lurkistan
Member since Nov 2009
120000 posts
Posted on 7/17/18 at 6:31 am to
quote:

real time images
quote:

monitoring in real time
So were US intelligence agencies informed? The FBI? Sounds like the Russians were pretty sloppy.
Posted by gthog61
Irving, TX
Member since Nov 2009
71001 posts
Posted on 7/17/18 at 6:35 am to
That is all a lot of gibberish
Posted by ChineseBandit58
Pearland, TX
Member since Aug 2005
42628 posts
Posted on 7/17/18 at 6:37 am to
quote:

So were US intelligence agencies informed? The FBI? Sounds like the Russians were pretty sloppy.


Dunno - but it does make sense that real-time images of RAM contents and connectivity data would be more useful than just hard drive data after the fact.
Posted by KeyserSoze999
Member since Dec 2009
10608 posts
Posted on 7/17/18 at 6:39 am to
See our president knows how to start a conversation, he knows it’s needed for healing.
Posted by ChineseBandit58
Pearland, TX
Member since Aug 2005
42628 posts
Posted on 7/17/18 at 6:39 am to
quote:

That is all a lot of gibberish


I'm no expert on the topic but I can read the English paragraphs and make sense of the intent.

If there is misstatement of fact, I hope someone will clear it up ASAP.
Posted by cajunangelle
Member since Oct 2012
146911 posts
Posted on 7/17/18 at 6:48 am to
quote:

Im certain Crowdstike planted tags to make it look Russian, no doubt obtained from the CIA.
Posted by Wolfhound45
Hanging with Chicken in Lurkistan
Member since Nov 2009
120000 posts
Posted on 7/17/18 at 6:51 am to
Fair enough. I do not pretend to be remotely familiar with this process. Just trying to understand.
Posted by BeefDawg
Atlanta
Member since Sep 2012
4747 posts
Posted on 7/17/18 at 7:45 am to
CrowdStrike was busted some time near the end of 2016 or beginning of 2017 making false claims about a Ukrainian company getting its servers hacked.

After being called out for lying, they admitted their fallacy and backtracked their claims.

The owner of CrowdStrike is a member of The Atlantic Council and a vocal detractor of Putin.

Evelyn Farkus (remember her?), several folks on Hillary’s campaign, several people in the DNC, several attorneys at Perkins Coie, and FusionGPS owner Glenn Simpson are all members of The Atlantic Council too.

The DNC and Hillary campaign paid to have the Dossier fabricated.

Stefan Halper and the FBI fed Papadopolous rumors about Russia-Team Trump collusion, then when PapaD regurgitated those rumors to the Australian Ambo, the FBI uses this and the Dossier to secure FISA warrants to get surveillance on Team Trump.

Then FusionGPS tried to entrap Don Jr with the Trump Tower meeting.


It’s all connected. None of them has any credibility. Especially not CrowdStrike.

All of this was deep state corruption setting people up, fabricating and manufacturing evidence, first to attempt a smear campaign, second to create an “insurance policy”, and ultimately to attempt a silent coup.
Posted by Decatur
Member since Mar 2007
28719 posts
Posted on 7/17/18 at 8:23 am to
quote:

So what did Crowdstrike examine to determine a hack had occurred? How did they arrive at their conclusions? It seems it is essential to know this.


quote:

When CrowdStrike came to the DNC, it moved quickly. Using a system called Falcon, a two-megabyte agent installed on systems without the need for a reboot, it profiled every action that occurred at a programme level on the hundreds of machines owned by the DNC. One clue might be a programme behaving abnormally; it might be the unusual transfer of millions of documents. "We're not looking at any personal data, any documents or emails," explains Alperovitch. "We're just looking at what is being executed."

Every action at a system level on the DNC's computers was recorded and checked against CrowdStrike's bank of prior intelligence (the company processes 28 billion computer events a day). "Almost immediately, Falcon started lighting up with a number of indications of breaches of the DNC network," Alperovitch says.

One question had been answered: there was definitely someone rummaging around the DNC servers. But who? CrowdStrike checked its records, seeing whether the methods used for the hack matched any they already had on record. They did. Two groups, working independently, were secreting away information, including private correspondence, email databases and, reportedly, opposition research files on Donald Trump. "We realised that these actors were very well known to us," Alperovitch says. This is because of a handful of small but significant tells: data exfiltrated to an IP address associated with the hackers; a misspelled URL; and time zones related to Moscow. "They were called FANCY BEAR and COZY BEAR, and we could attribute them to the Russian government."

Both the groups had a long rap sheet. COZY BEAR - which had been inside the DNC's system since the summer of 2015 - had previously hacked the White House and the US State Department. FANCY BEAR - which had breached the network separately in April 2016 - had hacked victims across the world, including the German Bundestag. The vulnerabilities were quickly closed, but the damage had already been done.


LINK
Posted by BBONDS25
Member since Mar 2008
48403 posts
Posted on 7/17/18 at 8:25 am to
Why not just hand over the servers now and eliminate this entire line of questioning?
Posted by imjustafatkid
Alabama
Member since Dec 2011
50526 posts
Posted on 7/17/18 at 8:27 am to
quote:

Why not just hand over the servers now and eliminate this entire line of questioning?


They don't want the government to find the truth.

Why isn't the government forcing them to hand over the servers?
Posted by Decatur
Member since Mar 2007
28719 posts
Posted on 7/17/18 at 8:30 am to
quote:

Why not just hand over the servers now and eliminate this entire line of questioning?


It’s just not necessary. You are free move on from this line of questioning.
Posted by Jbird
In Bidenville with EthanL
Member since Oct 2012
73446 posts
Posted on 7/17/18 at 8:32 am to
quote:

It’s just not necessary. You are free move on from this line of questioning.

Of course Crowdstrike paid for by the DNC did all the heavy work.
Posted by cahoots
Member since Jan 2009
9134 posts
Posted on 7/17/18 at 8:32 am to
My understanding is that crowdstrike created an image of the server and turned that over to the investigators. Seems like the servers should have been taken, but what do I know
Posted by cahoots
Member since Jan 2009
9134 posts
Posted on 7/17/18 at 8:33 am to
quote:

They don't want the government to find the truth.

Why isn't the government forcing them to hand over the servers?



I mean, the servers aren't going to have anything incriminating left on them now. But I don't understand why they weren't turned over at first
Posted by Seldom Seen
Member since Feb 2016
40254 posts
Posted on 7/17/18 at 8:35 am to
And where are Crooked's 33,000 deleted emails?
first pageprev pagePage 1 of 5Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram