Skip to main content
Topic: The American 2016 Presidential Elections & The Ongoing American Saga (Read 349902 times)

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1300
When the Russians effect an election, RJ, they do it the old fashioned way! :) But, with the way you mumble, you nor anyone else would know if you meant affect… And, with your "wide" knowledge of computers, your understanding of intelligence operations likely stops at tea-soaked secret papers.

Sanders never stood a chance, anyway, BTW! He joined the Democrat Party to enjoy a last fling and quit it when he lost the nomination… Since he never bothered to actually try to win it, I see no other explanation. (I wonder, though: What became of those campaign contributions? :) )
进行 ...
"Humor is emotional chaos remembered in tranquility." - James Thurber
"Science is the belief in the ignorance of experts!" - Richard Feynman
 (iBook G4 - Panther | Mac mini i5 - El Capitan)

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1301
As paranoid as it sounds, this isn't the first time Russians appear to have attempted to alter the election
No proofs, lot of claims and allegations using the subjunctive - that's how propaganda warfare works.
BTW, Russian hackers paid by Putin hacked the voting machines in favor of Hillary. Sanders should immediately complain to the Kremlin. :)

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1302
Have you and Howie read the article? The IPs implicated in the attacks were found on criminal Russian hacker forums. Putin and the Kremlin may well have nothing do with it, but evidence indicates attacks did originate from Russia. In this case, the attacks were on one "red" state (Arizona} and one "blue" one  (Illinois) so maybe it might have Russians with no political preferences about either candidate. Does this change the country of origin of attacks at all? You tell me, after you're done mindlessly calling "propaganda" of course.
“What kind of man would put a known criminal in charge of a major branch of government? Apart from, say, the average voter.”
― Terry Pratchett, Going Postal

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1303
Have you and Howie read the article? The IPs implicated in the attacks were found on criminal Russian hacker forums.
Have you any clue about computing?
No half brained script kiddie (let alone hacker) would attemt to attack a system directly from his mashine revealing the source (IP).
The above fairy story is aimed to clueless people. Unfortunately most internet users make part of the latter category.
Be assured that an IP doesn't say nothing about the source of an attack.
In case you don't believe me, do a favor to yourself and inform yourself on any half decent security forum out there. ;)

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1304
Have you any clue about computing?
No half brained script kiddie (let alone hacker) would attemt to attack a system directly from his mashine revealing the source (IP).
The above fairy story is aimed to clueless people. Unfortunately most internet users make part of the latter category.
Be assured that an IP doesn't say nothing about the source of an attack.
Actually, IP is precisely how the source is pinned down. There may be (an) intermediate machine(s) used, but that machine became intermediate by attack from another IP.

I haven't read the article, but if it was anything like the attack against Estonia in 2007, the source is clear by IP. You can hide the source IP when you attack from a single machine, but not when you are coordinating a mass attack.

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1305
Really, Krake?  You somehow don't think the FBI doesn't know the hackers will attempt to conceal their IPs and know how to defeat this? That's almost cute.
“What kind of man would put a known criminal in charge of a major branch of government? Apart from, say, the average voter.”
― Terry Pratchett, Going Postal

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1306
Hackers, somewhere, trying to attack some prominent machines to get in the news... That is older than the internet itself.
Russian hackers attacking American machines... That must be something special. :right:

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1307
Actually, IP is precisely how the source is pinned down. There may be (an) intermediate machine(s) used, but that machine became intermediate by attack from another IP.
To make it easier to understand for everybody:
The source pinned down is the IP of the last link of a chain aka involuntary intermediar. The intermediar(s) are usually clueless persons.
So even you've pinned down the IP of the intermediar, you still don't know anything about the attacker.

I haven't read the article, but if it was anything like the attack against Estonia in 2007, the source is clear by IP. You can hide the source IP when you attack from a single machine, but not when you are coordinating a mass attack.
a.) No, it wasn't a DDoS attack like that against Estonia in 2007.
b.) If done by professionals you can fake the IP even when you are coordinating a mass attack (DDoS).

Under normal conditions when you want to visit a site the remote server's respose will be transmitted to the IP the request is comming from.
In case of a flooding attack you don't need the remote server's respones and such the requesting IP can be a fictive one.
Your only goal is to bring the server down by flooding it with requests. ;)
All you need therefore is a network capable "client" where you can fake all outgoing data.

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1308
Really, Krake?  You somehow don't think the FBI doesn't know the hackers will attempt to conceal their IPs and know how to defeat this? That's almost cute.
Did you bother to ask in any half decent security forum? Namely that he source of the IP reveals nothing about the real attacker.
Only parroting the FBI's warfare propaganda will leave you as clueless as you are at the moment. :)

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1309
To make it easier to understand for everybody:
The source pinned down is the IP of the last link of a chain aka involuntary intermediar. The intermediar(s) are usually clueless persons.
So even you've pinned down the IP of the intermediar, you still don't know anything about the attacker.
Are you saying you can only reach the first intermediary and not go further?

a.) No, it wasn't a DDoS attack like that against Estonia in 2007.
b.) If done by professionals you can fake the IP even when you are coordinating a mass attack (DDoS).
Let's grant that, but to have a point, you must also be saying that when a professional cyberattack occurs you can never tell where it came from. Are you saying that? Evidently, you admit that there are cyberattacks, but are you saying it cannot be Russia, because it's impossible to tell where cyberattacks originate? None of this makes sense.

If cyberattacks occur and FBI/CIA can do them, then so can KGB/FSB. It's highly plausible that they all do it, because all of them have active research projects in this field. And specific departments/squads for the purpose.

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1310
Are you saying you can only reach the first intermediary and not go further?
The last not the first. Theoretically you could use the last mashine you got the IP from as a honey pot to go further.
However if the damage is already done there are little chances that the attacker will trap into it.
Let's grant that, but to have a point, you must also be saying that when a professional cyberattack occurs you can never tell where it came from. Are you saying that?
It depends what kind of cyberattack you mean. DDoS or an intrusion are different pair of shoes.
As I said, you can put up a honey pot in case of an intrusion and hope that the attacker won't change the intermediar.
It's a cat and mouse game. However in most cases ther server will be fixed as soon as the intrusion was detected.
Evidently, you admit that there are cyberattacks, but are you saying it cannot be Russia, because it's impossible to tell where cyberattacks originate? None of this makes sense.
No, you are misreading what I'm saying.
What I'm saying is that it could be anyone. Whoever it was (Russians included), the story as presented in the article is a fairy tale.
In addition to the above - you don't need therefore any knolledge about computers, just a little common sense.
If the police is suspecting somebody for a crime it will try to monitor that person till it can get him with proof.
The last thing would be to warn him by making the suspicion public.
If cyberattacks occur and FBI/CIA can do them, then so can KGB/FSB. It's highly plausible that they all do it, because all of them have active research projects in this field. And specific departments/squads for the purpose.
There is a huge difference between "highly plausible" and ventilating accusations without any proof.

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1311
Is there something odd going on with Clinton??

She has not given a press conference for about eight months. Some of her election appearances seem to show someone who is ill. She has two men helping her up stairs and has a footstool to help her into her limousine.
"Quit you like men:be strong"

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1312
What I'm saying is that it could be anyone.
So, you are still in effect saying that when a professional does it, he will never be found out. Compare: When a professional does it, murder will never be solved. Not so simple.

In reality, yes, there are ways to hide your traces, and yes, professionals are more likely to hide their traces better than amateurs, but the investigators are also professionals and eventually it's a random set of crimes that remains unsolved for a random set of reasons.

There is a huge difference between "highly plausible" and ventilating accusations without any proof.
There is also a huge difference between "didn't do it" and having a specific case where the general direction of the attack is known, plus a suspect in that direction with the means, motives, and repeated history of having done it.

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1313
So, you are still in effect saying that when a professional does it, he will never be found out. Compare: When a professional does it, murder will never be solved. Not so simple.
There is a huge difference when the crime is done locally and the criminal is hiding in your country or the crime is done from thousands miles away and the criminal could be hiding everywere around the world (your backyard included). In the latter case you'll need the cooperation of the countries the intermediars' IPs belong to.

There is also a huge difference between "didn't do it"
Are you misreading me again?
I neither said they "didn't do it" nor that they "have done it".
What I'm saying (for the second time) is that you can't accuse someone without evidence, except your accusasions are part of your warfare propaganda.

As for Hillary, she might be the darling of Wall Street but she is not everyone's darling - neither on all places of the world, nor at home.
Either the lady didn't do anything illegal and her leaked emails can't bother her at all, or she did something illegal and Americans can be thankfull for getting the chance to know about it.
a suspect in that direction with the means, motives, and repeated history of having done it.
Leme add for better understanding: a suspect that can encrease the blood pressure of ersi only by mentioning the country's name. :D

Last but not least:
Quote
Hillary Clinton claims that Russia hacked the Democratic National Committee's emails to help Donald Trump in the 2016 race, but a NSA whistleblower disagrees with her assertion.
Former NSA official William Binney, an architect of the agency's surveillance program, says that it is more likely that a disgruntled member of the U.S. intelligence community leaked the emails.
On "Fox and Friends" this morning, Binney said that accusing the Russians is a way of diverting attention from the actual issues that the emails bring to light.
source

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1314
Krake, you know I'm a partisan… But your reading of this kerfuffle is spot-on!
进行 ...
"Humor is emotional chaos remembered in tranquility." - James Thurber
"Science is the belief in the ignorance of experts!" - Richard Feynman
 (iBook G4 - Panther | Mac mini i5 - El Capitan)

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1315
There is also a huge difference between "didn't do it"
Are you misreading me again?
I neither said they "didn't do it" nor that they "have done it".
What I'm saying (for the second time) is that you can't accuse someone without evidence, except your accusasions are part of your warfare propaganda.
Evidently somebody did it, there is a plausible suspect and I suggest that the denial of the plausibility of the suspect, if unreasoned and boneheaded, is a sign of brainwashedness, not of analytic skepticism.

The following is a good example of misdirection:
a suspect in that direction with the means, motives, and repeated history of having done it.
Leme add for better understanding: a suspect that can encrease the blood pressure of ersi only by mentioning the country's name. :D
In reality, I pointed to an actual cyberattack from Russia to Estonia. You have essentially wiped it under the rug.

I relate to Russia and Russians based on their past behaviour. I'm forced to relate to them because they live next door (and a fifth column and other possible Trojans are planted indoors).

Do you remember the divisions of Poland or Molotov-Ribbentrop or Nord Stream? Do you think they are all good things or do you think they are irrelevant historical accidents nothing to do with current geopolitics? Do you think that your lack of sensitivity to Russia's character (because Russia is not immediately next door to you) enables you to claim you are politically neutral and impartially observant of facts? No, your stance is political through and through. As is mine.

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1316
Evidently somebody did it, there is a plausible suspect and I suggest that the denial of the plausibility of the suspect, if unreasoned and boneheaded, is a sign of brainwashedness, not of analytic skepticism.
Here it is for you, the third and last time:
I neither said they "didn't do it" nor that they "have done it".
What I'm saying (for the third time) is that you can't accuse someone without evidence, except your accusasions are part of your propaganda warfare.

Whether your 'analytic' abilities can grasp my above statement or not, there is nothing to add - period.
Your psychopathologic problems resulted from the past are off topic.
So you can try to twist my statement as long as you wish, it won't change the facts. ;)

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1317
Perhaps the Russian "secret" service did this… Perhaps not. This is the sort of thing that fiction writers love! (Remember "Riley, Ace of Spies" :) ) You can't make this sort of stuff up!

Indeed, the Russians might have done this, and might do more. We do, I think, similar things… But what do Russian authorities care about "public" opinion? (We're very much out-"gunned": They repress they're people; even oppress them! We have a third-string quarterback who's sat on the bench for a season sitting on his ass again, but this time during the playing of our national anthem… That's a revolution!?)
进行 ...
"Humor is emotional chaos remembered in tranquility." - James Thurber
"Science is the belief in the ignorance of experts!" - Richard Feynman
 (iBook G4 - Panther | Mac mini i5 - El Capitan)

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1318
Since Americans, Russians, Chinese and probably some Europeans constantly spy all of us, I don't see any problem on stealing the emails of some American mediocre politician.
A matter of attitude.

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1319
Here it is for you, the third and last time:
I neither said they "didn't do it" nor that they "have done it".
What I'm saying (for the third time) is that you can't accuse someone without evidence, except your accusasions are part of your propaganda warfare.
Let's review how it went. You said:

No proofs, lot of claims and allegations using the subjunctive - that's how propaganda warfare works.
In response, I presented you with another case with more data and evidence that you didn't counter. You basically wiped it under the rug (a demagoguery move) and you're pretending that your accusation of propaganda warfare still applies. To be brief, it doesn't because of the way you treat evidence. Enough said.

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1320
The US election campaign is a media circus but has also its funny moments.


Could you imagine having to share a cell with these two? That was my life for 16 years.

Anthony Weiner -not the real one :)) source

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1321
Just as well it has a passing funn y side to it because for tens of millions of Americans it will simply make no damn difference whether Trump or Clinton wins.
"Quit you like men:be strong"

 

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1322
REPORT
Turns Out You Can’t Trust Russian Hackers Anymore
The odd capitalization comes from the source. But anyway, who would have thought you can't trust the word of cybercriminals....:rolleyes: In a nutshell, It turns out Russian hackers broke into a systems operated by a philanthropic organization run by George Soros and altered the stolen documents (of course the source provides exactly how.) This brings us to a point more directly related an issue directly related to this election.

Our Republican friends wait with baited breath for something damning to come out of Clinton's stolen emails. It doesn't seem to register with them that this is information provided by Guccifer, a criminal.  What's that old saying? Oh yes, "there is no honor among thieves."So how exactly are we supposed to know emails posted on Wikileaks are accurate? If a hacker breaks into a system and steals a document, he can gain change it however he wants. In fact, the the BBC reports that forensics of the metadata on documents provided by Guccifer 2.0 indicate that they were edited. (Krake, Guccifer 2.0 did use a French VPN but the IP was traced beyond that. As I said, it's almost cute that you don't think the FBI and other agencies  can't see beyond the first IP presented...)
“What kind of man would put a known criminal in charge of a major branch of government? Apart from, say, the average voter.”
― Terry Pratchett, Going Postal

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1323
Our Republican friends wait with baited breath for something damning to come out of Clinton's stolen emails. It doesn't seem to register with them that this is information provided by Guccifer, a criminal.
Your (…probably only!) Republican friend asks: Does the Kremlin run the FBI and handle FOIA requests?
Nobody in the DNC denied their e-mails, and their chairman resigned… The problem you have is your preferred candidate is Hillary Clinton! :)
进行 ...
"Humor is emotional chaos remembered in tranquility." - James Thurber
"Science is the belief in the ignorance of experts!" - Richard Feynman
 (iBook G4 - Panther | Mac mini i5 - El Capitan)

Re: The American 2016 Presidential Elections & The Ongoing American Saga

Reply #1324
Hillary Clinton’s Most Recent
Mind-Boggling FBI Interview


 :doh:   And this excuse maker liar wants to lead America??   :lol:  :lol:

Source: National Review   
Quote

As David and Rich have already noted, the FBI-302 report of the interview of Hillary Clinton, along with the other notes of investigation released today, make for mind boggling reading. Most bracing is the fact that Mrs. Clinton had her server wiped clean sometime between March 25 and 31, 2015, only three weeks after the New York Times on March 3 broke the story of the server system’s existence. David notes that, at the same time the Democrats’ Janus-faced presidential nominee was outwardly taking the position that she “want[ed] the public to see my email,” she was having her minions frantically purge her emails behind the scenes.

I’d add that this was five months before she feigned ignorance when Fox News’s Ed Henry pressed her on whether she’d “tried to wipe the entire server … so there could be no email – no personal, no official.” Henry finally asked, “Did you wipe the server?” Famously, Clinton scoffed, “Like with a cloth or something?” But we now know, as the FBI notes recount, she had the server purged with a sophisticated software program, BleachBit, which eventually made it extraordinarily difficult for the FBI to recover her emails, several thousand of which were successfully destroyed.

And remember: We’ve just learned that 30 emails related to Benghazi were on the server Clinton purged – emails that she never turned over to the State Department despite claiming repeatedly that she’d surrendered all of her government-related emails. I would thus note that the March 2015 purge right after public revelation of the server’s existence occurred long after Mrs. Clinton was well aware of several official government investigations of the Benghazi massacre – one by the State Department, several by Congress, and a judicial proceeding involving the one defendant who has been indicted for the terrorist attack. There were also, quite obviously, several relevant Freedom of Information Act (FOIA) litigations. From what I’ve been able to glean so far, it is not clear from the FBI’s notes (and it was certainly not clear from Director James Comey’s press conference and House testimony) whether any consideration was given to indicting Mrs. Clinton for obstruction of justice and of government investigations – and if not, why not.

Among the most eye-popping claims Clinton made to the FBI was that she was unfamiliar with the markings on classified documents. Yes, you read that correctly: one of the highest ranking national security officials in the United States government – an official whose day-to-day responsibilities extensively involved classified information; who had secure facilities installed in her two homes (in addition to her office) so she could review classified information in them; and who acknowledged to the FBI that, as secretary of state, she was designated by the president as “an Original Classification Authority,” meaning she had the power to determine what information should be classified and at what level – had the audacity to tell the interviewing agents that she did not know what the different classification symbols in classified documents signified.


For example, when asked about an email chain containing the symbol “(C)” – meaning “confidential,” a designation ubiquitous in classified documents – Clinton claimed not to know what it meant and, according to the notes, “could only speculate it was referencing paragraphs marked in alphabetical order.” This is a response so absurd as to be insulting (the interview notes do not tell us if the FBI asked her to find (A), (B) and (D) notations that would be necessary to have the “alphabetical order” story make sense – assuming, for argument’s sake that one would indulge the possibility that this could be a truthful answer from a classified information consumer as high-level as Clinton).

Mind you, Mrs. Clinton was not just secretary of state for four years. She was a United States senator for eight years, during nearly all of which she was assigned to the Senate Armed Services Committee (and such Armed Services components as the Subcommittee on Emerging Threats and Capabilities). Reviewing classified information, including highly sensitive national defense secrets, is a routine part of that committee’s work.

Clinton also claimed that she “did not pay attention to the ‘level’ of classified information.” The interview notes do not explain how the FBI squared this with, for example, (a) Clinton’s acknowledgement that top-secret “special access program” (SAP) information was delivered to her by paper in her office and she knew it was supposed to be handled with extraordinary care; and (b) Clinton’s admission that she made use of her Original Classification Authority at times (though she couldn’t say how often). That means she had to have assigned to some information the very classification levels with which she portrays herself as scarcely familiar.

We also learn in the FBI documents not only that Mrs. Clinton frequently lost her Blackberry devices, but that the FBI failed to account for some thirteen of them, most if not all of which she used while transmitting the over 2,000 classified emails the FBI identified.

Clinton aides told the FBI that her devices – loaded with stored emails – would at times disappear and their whereabouts would become unknown. Interestingly, in the notes of Mrs. Clinton’s interview, the FBI says she told them that her BlackBerry devices would occasionally “malfunction”; when this happened, “[h]er aides would assist in obtaining a new BlackBerry.” I have not yet found indications that the FBI asked her about lost rather than malfunctioning devices.

We do learn, though, that on February 9, 2016, the Justice Department asked Clinton’s lawyers to turn over all 13 mobile devices that the FBI identified as having potentially transmitted emails. Almost two weeks later, on February 22, the lawyers told the FBI “they were unable to locate any of these devices.” As a result, the notes recount, “the FBI was unable to acquire or forensically examine any of these 13 mobile devices.”

Finally, something else about those lawyers. I nearly fell out of my chair upon reading the very first paragraph of the notes of Clinton’s interview, which identifies the lawyers for Clinton who were permitted to be present for the interview. Among them is Cheryl Mills, Clinton’s longtime confidant and chief-of-staff at the State Department.

Readers may recall that I suggested back in May that “the fix” was in in the investigation of the Clinton emails. The reason was that the Justice Department was allowing Cheryl Mills – a witness, if not a subject, of the investigation – to invoke attorney-client privilege on behalf of Mrs. Clinton in order to thwart the FBI’s attempt to inquire into the procedure used to produce Clinton’s emails to the State Department. Mills was a participant in that procedure – and it is the procedure in which, we now know, well over 30,000 emails were attempted to be destroyed, including several thousand that contained government-related business.

When she worked for Clinton at State, Mills was not acting in the capacity of a lawyer – not for then-Secretary Clinton and not for the State Department. Moreover, as Clinton’s chief-of-staff, Mills was intimately involved in issues related to Clinton’s private email set up, the discussions about getting her a secure BlackBerry similar to President Obama’s, and questions that were raised (including in FOIA requests) about Clinton’s communications.

That is to say, Mills was an actor in the facts that were under criminal investigation by the FBI. Put aside that she was not Mrs. Clinton’s lawyer while working for the State Department; as I explained in the May column, Mills, after leaving the State Department, was barred by ethical rules from acting as Mrs. Clinton’s lawyer “in connection with a matter in which the lawyer participated personally and substantially as a public officer or employee.”

There is no way Mills should have been permitted to participate as a lawyer in the process of producing Clinton’s emails to the State Department nearly two years after they’d both left. I thought it was astonishing that the Justice Department indulged her attorney-client privilege claim, which frustrated the FBI’s ability to question her on a key aspect of the investigation. But it is simply unbelievable to find her turning up at Mrs. Clinton’s interview – participating in the capacity of a lawyer under circumstances where Clinton was being investigated over matters in which Mills participated as a non-lawyer government official.

According to the FBI’s report, Mrs. Clinton had four other attorneys (one whose name is deleted from the report for some reason) representing her at the interview. She clearly did not need another lawyer. And it is Criminal Investigations 101 that law enforcement never interviews witnesses together – the point is to learn the truth, not provide witnesses/suspects with an opportunity to keep their story straight, which undermines the search for truth..........continued (but for SHillary, will it ever, ever, end?)


So, what was Mills doing there?

Anyone?

Or, as Hillary might famously interject:



'Crime, once exposed, has no refuge but in audacity.'  ...  Cornelius Tacitus

     In times of universal deceit, telling the honest truth is a revolutionary act.