Jump to content
Check your account email address ×

about that fucking server...


Recommended Posts

one lame talking point after another.....youd think you bozos would catch on by now

"An image of a server is the best thing to use in an investigation so that your exploration of the server does not change the evidence (just like you don’t want investigators leaving their own DNA around a physical crime scene) and so that the bad actors cannot make changes to the evidence while you are looking at it," Watson said. "Any suggestion that they were denied access to what they wanted for their investigation is completely incorrect."

 

http://www.politifact.com/truth-o-meter/statements/2018/jul/16/donald-trump/missing-servers-donald-trump-vladimir-putin/

Link to comment
Share on other sites

  • Replies 65
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

42 minutes ago, Snoslinger said:

one lame talking point after another.....youd think you bozos would catch on by now

"An image of a server is the best thing to use in an investigation so that your exploration of the server does not change the evidence (just like you don’t want investigators leaving their own DNA around a physical crime scene) and so that the bad actors cannot make changes to the evidence while you are looking at it," Watson said. "Any suggestion that they were denied access to what they wanted for their investigation is completely incorrect."

 

http://www.politifact.com/truth-o-meter/statements/2018/jul/16/donald-trump/missing-servers-donald-trump-vladimir-putin/

FAKENEWS :flush:

Link to comment
Share on other sites

why was the server handed over to a Dem operative group to be examined.........it was never in possession of LE agencies. 

Slinger.....you are a fucking moron if you cant see what went on here

Link to comment
Share on other sites

Just now, f7ben said:

why was the server handed over to a Dem operative group to be examined.........it was never in possession of LE agencies. 

Slinger.....you are a fucking moron if you cant see what went on here

:lol:

everything is one big conspiracy eh ben? fusion one, crowdstrike, the paki dude....

 

Link to comment
Share on other sites

1 minute ago, f7ben said:

why was the server handed over to a Dem operative group to be examined.........it was never in possession of LE agencies. 

Slinger.....you are a fucking moron if you cant see what went on here

That's really what boggles the mind.  AND STILL.....it's not in the hands of the "investigating agencies".  How weird.  It's like the armed bank robbers refusing to hand over their guns and the bank not giving up the surveilance tapes...and the investigators in charge just saying, "meh...that's ok."

WUT>>>>>>!>!>@><RKMDNFS:KLDJGFN:SLKJDLKA?WLMEQW?:>E>AWEA???????????????????????????????????

Link to comment
Share on other sites

Just now, Snoslinger said:

:lol:

everything is one big conspiracy eh ben? fusion one, crowdstrike, the paki dude....

 

No .....that shit is all coincidence and on the up and up :lol: you are a fucking retarded hack like no other 

Link to comment
Share on other sites

Just now, Zamjabronie said:

That's really what boggles the mind.  AND STILL.....it's not in the hands of the "investigating agencies".  How weird.  It's like the armed bank robbers refusing to hand over their guns and the bank not giving up the surveilance tapes...and the investigators in charge just saying, "meh...that's ok."

WUT>>>>>>!>!>@><RKMDNFS:KLDJGFN:SLKJDLKA?WLMEQW?:>E>AWEA???????????????????????????????????

Its because LE agencies are corrupt fully and want to retain arms length plausible deniability when the truth comes out. 

Link to comment
Share on other sites

3 minutes ago, Snoslinger said:

:lol:

everything is one big conspiracy eh ben? fusion one, crowdstrike, the paki dude....

 

All orchestrated by Clinton and the DNC they are the only conspirators :flush: fucking Shitforbrains  

Link to comment
Share on other sites

3 minutes ago, f7ben said:

Its because LE agencies are corrupt fully and want to retain arms length plausible deniability when the truth comes out. 

It's too late for that.  Americans are tired of this bullshit from DOJ and our IC.  Trump pointing it out yet again is making the corrupt big government backers lose their minds.

 

 

Link to comment
Share on other sites

1 minute ago, Zamjabronie said:

It's too late for that.  Americans are tired of this bullshit from DOJ and our IC.  Trump pointing it out yet again is making the corrupt big government backers lose their minds.

 

 

The establishment and deep state are in full melt down :bc:  

Link to comment
Share on other sites

2 minutes ago, Zamjabronie said:

It's too late for that.  Americans are tired of this bullshit from DOJ and our IC.  Trump pointing it out yet again is making the corrupt big government backers lose their minds.

 

 

Fuck Trump ......he gave them vast powers to spy on us while talking out the other side of his face about how corrupt they are. Honestly ......fuck Donald Trump and anyone that supports FISA act ........fucking idiots

Link to comment
Share on other sites

Just now, Momorider said:

The establishment and deep state are in full melt down :bc:  

I don't think they are there quite yet.  But it's closer.  Comey and his other idiots in the Dem party trying to call for "patriots" and "veterans" to come forward it telling as hell.  Both are laughing at them.

Link to comment
Share on other sites

14 minutes ago, Snoslinger said:

:lol:

everything is one big conspiracy eh ben? fusion one, crowdstrike, the paki dude....

 

Collusion has been one big conspiracy that you bit 

Link to comment
Share on other sites

19 minutes ago, Snoslinger said:

:lol:

everything is one big conspiracy eh ben? fusion one, crowdstrike, the paki dude....

 

Did the FBI or any other LE agency examine the server?

Link to comment
Share on other sites

10 minutes ago, f7ben said:

Fuck Trump ......he gave them vast powers to spy on us while talking out the other side of his face about how corrupt they are. Honestly ......fuck Donald Trump and anyone that supports FISA act ........fucking idiots

Appointments like Mike pence, John Bolton and Jeff sessions do not represent an aversion to the deep state. 

Link to comment
Share on other sites

2 hours ago, Nazipigdog said:

Did the FBI or any other LE agency examine the server?

There isn't really a "the server", but rather several, many of them cloud based.  Hard to hand over a cloud in the physical sense, but they did hand over images. 

The “server” Trump is obsessed with is actually 140 servers, most of them cloud-based, which the DNC was forced to decommission in June of 2016 while trying to rid its network of the Russian GRU officers working to help Trump win the election.

It’s true that the FBI doesn’t have the DNC’s computer hardware. Agents didn’t sweep into DNC headquarters, load up all the equipment and leave Democrats standing stunned beside empty desks and dangling cables. There’s a reason for that, and it has nothing to do with a deep state conspiracy to frame Putin.

Trump and his allies are capitalizing on a basic misapprehension of how computer intrusion investigations work. Investigating a virtual crime isn’t a like investigating a murder. The Russians didn’t leave DNA evidence on the server racks and fingerprints on the keyboards. All the evidence of their comings and goings was on the computer hard drives, and in memory, and in the ephemeral network transmissions to and from the GRU’s command-and-control servers.

When cyber investigators respond to an incident, they capture that evidence in a process called “imaging.” They make an exact byte-for-byte copy of the hard drives. They do the same for the machine’s memory, capturing evidence that would otherwise be lost at the next reboot, and they monitor and store the traffic passing through the victim’s network. This has been standard procedure in computer  intrusion investigations for decades.

https://www.thedailybeast.com/trumps-missing-dnc-server-is-neither-missing-nor-a-server

 

 

Link to comment
Share on other sites

Just now, XC.Morrison said:

There isn't really a "the server", but rather several, many of them cloud based.  Hard to hand over a cloud in the physical sense, but they did hand over images. 

The “server” Trump is obsessed with is actually 140 servers, most of them cloud-based, which the DNC was forced to decommission in June of 2016 while trying to rid its network of the Russian GRU officers working to help Trump win the election.

It’s true that the FBI doesn’t have the DNC’s computer hardware. Agents didn’t sweep into DNC headquarters, load up all the equipment and leave Democrats standing stunned beside empty desks and dangling cables. There’s a reason for that, and it has nothing to do with a deep state conspiracy to frame Putin.

Trump and his allies are capitalizing on a basic misapprehension of how computer intrusion investigations work. Investigating a virtual crime isn’t a like investigating a murder. The Russians didn’t leave DNA evidence on the server racks and fingerprints on the keyboards. All the evidence of their comings and goings was on the computer hard drives, and in memory, and in the ephemeral network transmissions to and from the GRU’s command-and-control servers.

When cyber investigators respond to an incident, they capture that evidence in a process called “imaging.” They make an exact byte-for-byte copy of the hard drives. They do the same for the machine’s memory, capturing evidence that would otherwise be lost at the next reboot, and they monitor and store the traffic passing through the victim’s network. This has been standard procedure in computer  intrusion investigations for decades.

https://www.thedailybeast.com/trumps-missing-dnc-server-is-neither-missing-nor-a-server

 

 

It makes no difference where the infor was based or stored.  Full access should have been demanded.  Destruction of evidence is a felony.

Link to comment
Share on other sites

  • Platinum Contributing Member
3 hours ago, Snoslinger said:

one lame talking point after another.....youd think you bozos would catch on by now

"An image of a server is the best thing to use in an investigation so that your exploration of the server does not change the evidence (just like you don’t want investigators leaving their own DNA around a physical crime scene) and so that the bad actors cannot make changes to the evidence while you are looking at it," Watson said. "Any suggestion that they were denied access to what they wanted for their investigation is completely incorrect."

 

http://www.politifact.com/truth-o-meter/statements/2018/jul/16/donald-trump/missing-servers-donald-trump-vladimir-putin/

Oops.

http://thehill.com/policy/national-security/312132-fbi-dhs-release-report-on-russia-hacking

FBI, DHS release report on Russia hacking

The FBI and the Department of Homeland Security (DHS) on Thursday released a joint report detailing how federal investigators linked the Russian government to hacks of Democratic Party organizations.

The document makes clear reference to the hacks of the Democratic National Committee (DNC) and Hillary Clinton campaign chairman John Podesta, though it does not mention either by name. 

The 13-page report provides technical details regarding tools and infrastructure used by Russian civilian and military intelligence services to “compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities.” (See the entire report below.)

But security experts say that the document provides little in the way of forensic "proof" to confirm the government's attribution. Private security firms — like CrowdStrike, who investigated the DNC breach — went much further, they say. 

"The DHS statement is a restatement of already known public information, a series of technical indicators that are intended for use by cybersecurity professionals in finding and remediating APT28 malware on private sector networks, and some generic advice for companies as to how to improve their network security," said Matt Tait, founder of the U.K.-based security consultancy Capital Alpha Security. 

APT28 refers to one of the hacking groups affiliated with Russian intelligence believed to have infiltrated the DNC.

The U.S. report, known as a “Joint Analysis Report” or JAR, refers to the Russian hacking campaign as “Grizzly Steppe.”  

It comes as part of a slate of retaliatory measures against Russia issued Thursday by the Obama administration in response to the hacks, and expands on a joint statement issued by the two agencies in October, formally attributing the attacks to Russia.

In the October statement, officials described the the hacks and subsequent publication of stolen emails on WikiLeaks as an attempt to “interfere” with the U.S. election that is “consistent with the Russian-directed efforts,” but provided no evidence to support their assessment. 

President-elect Donald Trump has denied that Russia was involved in the hacks, and Obama has been under pressure to provide proof. 

It's unclear whether Thursday's report will satisfy critics. The administration is in the process of preparing a more detailed classified review of Russian interference, to be delivered to Congress before Trump takes office on Jan. 20. 

"That this document doesn't engage with the question of attribution seems, to me, to be quite deliberate," Tait noted. "It's purpose is to act as a measure against Russia (by adding a U.S. stamp of approval to private sector information, and making life harder for APT28 by exposing some of their malware), not to persuade the public that the DNC hack was by Russia."

Private security firms provided more detailed forensic analysis linking the break-in to Moscow, which the FBI and DHS said Thursday correlated with the IC’s findings. 

“The Joint Analysis Report recognizes the excellent work undertaken by security companies and private sector network owners and operators, and provides new indicators of compromise and malicious infrastructure identified during the course of investigations and incident response,” read a statement. 

The report identifies two Russian intelligence groups already named by CrowdStrike and other private security firms. 

The Federal Security Service, or FSB, is the main successor to the KGB — once headed by Russian President Vladimir Putin.

The FSB is thought to be behind the hacking group known as APT29. A more traditional, long-range intelligence agency, the FSB lurked on the DNC systems for over a year.  

The GRU, Russia’s military intelligence service, is thought to be behind the second group that infiltrated the DNC, known as APT28. APT28 is also believed to have breached Podesta’s emails.

Despite their overlapping targets, the two agencies have different missions in the cyber realm.

APT28 is thought to be the group responsible for “doxxing” the DNC and Podesta by allegedly providing the stolen missives to WikiLeaks to publish.

Both organizations gained access to the DNC through targeted spearphishing campaigns, in which the hackers tricked targeted users into clicking bogus links that either deployed malware or directed them to a fake webmail domain hosted on Russian infrastructure. 

APT28 was able to use harvested credentials to then gain access and steal content, according to the report. This likely led “to the exfiltration of information from multiple senior party members.” 

“The U.S. Government assesses that information was leaked to the press and publicly disclosed,” the report says. 

The report also states that Russian intelligence operatives continued to launch spearphishing attacks on the Democratic party following the election, “including one launched ... just days after" the vote.

— Updated 9:30 a.m. on Dec. 30.

Link to comment
Share on other sites

7 minutes ago, Zamjabronie said:

It makes no difference where the infor was based or stored.  Full access should have been demanded.  Destruction of evidence is a felony.

So if you reboot the server and lose information housed in volatile memory is that a felony?

If you capture the physical storage and volatile memory as an image, that's better.

The DNC is the victim here, you don't go and seize the victim's assets in these kinds of cases.

Link to comment
Share on other sites

2 minutes ago, XC.Morrison said:

So if you reboot the server and lose information housed in volatile memory is that a felony?

If you capture the physical storage and volatile memory as an image, that's better.

The DNC is the victim here, you don't go and seize the victim's assets in these kinds of cases.

:lol:

WOW!  Impressive really.  

ANY destruction, hiding, falsification of ANY evidence in ANY federal investigation is a FELONY.

"When you reboot the server and lose information."  Yeaaaahhh...   :lol:

Poke yourself in the eye.

 

Link to comment
Share on other sites

15 minutes ago, Zamjabronie said:

:lol:

WOW!  Impressive really.  

ANY destruction, hiding, falsification of ANY evidence in ANY federal investigation is a FELONY.

"When you reboot the server and lose information."  Yeaaaahhh...   :lol:

Poke yourself in the eye.

 

So then you concede that the "image files" are more robust, as a simple power loss won't result in any felony - got it.

For the record, the capturing of image files is in line with the DOJ manual, page 78: 

"Modern operating systems continually read from and write to the hard disk, changing some

of the information recorded there; thus, the simple act of using a computer

might alter the evidence recorded on the hard drive. Internet-connected

computers are additionally vulnerable, because someone at a remote location

might be able to access the computer and delete data while investigators are

examining it."

"In many cases, rather than seize an entire computer for off-site review,

agents can instead create a digital copy of the hard drive that is identical to the

original in every relevant respect. This copy is called an “image copy”—a copy

that “duplicates every bit and byte on the target drive including all files, the

slack space, Master File Table, and metadata in exactly the order they appear

on the original.” United States v. Vilar, 2007 WL 1075041, *35 n.22 (S.D.N.Y.

Apr. 4, 2007), quoting Orin S. Kerr, Searches and Seizures in a Digital World,

119 Harv. L. Rev. 531 (2005); see also United States v. Stierhoff, 477 F. Supp.

2d 423, 439 & n.8 (D.R.I. 2007)."

https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf

Link to comment
Share on other sites

Just now, XC.Morrison said:

So then you concede that the "image files" are more robust, as a simple power loss won't result in any felony - got it.

For the record, the capturing of image files is in line with the DOJ manual, page 78: 

"Modern operating systems continually read from and write to the hard disk, changing some

of the information recorded there; thus, the simple act of using a computer

might alter the evidence recorded on the hard drive. Internet-connected

computers are additionally vulnerable, because someone at a remote location

might be able to access the computer and delete data while investigators are

examining it."

"In many cases, rather than seize an entire computer for off-site review,

agents can instead create a digital copy of the hard drive that is identical to the

original in every relevant respect. This copy is called an “image copy”—a copy

that “duplicates every bit and byte on the target drive including all files, the

slack space, Master File Table, and metadata in exactly the order they appear

on the original.” United States v. Vilar, 2007 WL 1075041, *35 n.22 (S.D.N.Y.

Apr. 4, 2007), quoting Orin S. Kerr, Searches and Seizures in a Digital World,

119 Harv. L. Rev. 531 (2005); see also United States v. Stierhoff, 477 F. Supp.

2d 423, 439 & n.8 (D.R.I. 2007)."

https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf

Deflection.  Files were admittedly scrubbed "bleached" and erased under subpoena.

Oops.

Link to comment
Share on other sites

1 minute ago, Zamjabronie said:

Deflection.  Files were admittedly scrubbed "bleached" and erased under subpoena.

Oops.

I thought that was just Hillary's private email server.  Link to bleaching of the DNC "servers" ?

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Trying to pay the bills, lol

×
×
  • Create New...