Toronto Escorts

A New Report Raises Big Questions About Last Year’s DNC Hack

onthebottom

Never Been Justly Banned
Jan 10, 2002
40,558
23
38
Hooterville
www.scubadiving.com
https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/

There was no hack of the Democratic National Committee’s system on July 5 last year—not by the Russians, not by anyone else. Hard science now demonstrates it was a leak—a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNC’s system. This casts serious doubt on the initial “hack,” as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.

Forensic investigations of documents made public two weeks prior to the July 5 leak by the person or entity known as Guccifer 2.0 show that they were fraudulent: Before Guccifer posted them they were adulterated by cutting and pasting them into a blank template that had Russian as its default language. Guccifer took responsibility on June 15 for an intrusion the DNC reported on June 14 and professed to be a WikiLeaks source—claims essential to the official narrative implicating Russia in what was soon cast as an extensive hacking operation. To put the point simply, forensic science now devastates this narrative.
 

Butler1000

Well-known member
Oct 31, 2011
28,835
3,482
113
While they continue to be shrill over identity politics the investigations continue.

And if and when the allegations of this are proven false a large swath of the American people are going to question the leadership and press on this.
 

danmand

Well-known member
Nov 28, 2003
46,353
4,778
113
https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/

There was no hack of the Democratic National Committee’s system on July 5 last year—not by the Russians, not by anyone else. Hard science now demonstrates it was a leak—a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNC’s system. This casts serious doubt on the initial “hack,” as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.

Forensic investigations of documents made public two weeks prior to the July 5 leak by the person or entity known as Guccifer 2.0 show that they were fraudulent: Before Guccifer posted them they were adulterated by cutting and pasting them into a blank template that had Russian as its default language. Guccifer took responsibility on June 15 for an intrusion the DNC reported on June 14 and professed to be a WikiLeaks source—claims essential to the official narrative implicating Russia in what was soon cast as an extensive hacking operation. To put the point simply, forensic science now devastates this narrative.
That was obvious from the beginning. Maybe now you will want to trust Julius Assange more than the US intelligence community??
 

oldjones

CanBarelyRe Member
Aug 18, 2001
24,495
11
38
We note that your quote above is hearsay. The Nation places it as a quote of some published report, but from sources it does not name and only describes vaguely, and without referencing any source we — or anyone — can read for ourselves.

Taken at face value, your quote says the DNC was indeed 'hacked', by an agent provocateur called Gucifer2.0 who illicitly obtained entry to their premises and access to their computers, then stole communications, which she/he subsequently editted, re-worked and passed on in their forged form to damage the Democratic Party.

Glad you've reassured everyone American Democracy is as safe as ever.
 

Butler1000

Well-known member
Oct 31, 2011
28,835
3,482
113
We note that your quote above is hearsay. The Nation places it as a quote of some published report, but from sources it does not name and only describes vaguely, and without referencing any source we — or anyone — can read for ourselves.

Taken at face value, your quote says the DNC was indeed 'hacked', by an agent provocateur called Gucifer2.0 who illicitly obtained entry to their premises and access to their computers, then stole communications, which she/he subsequently editted, re-worked and passed on in their forged form to damage the Democratic Party.

Glad you've reassured everyone American Democracy is as safe as ever.
Or he did work there. As in a number of Bernie supporters. Hell even a plant by the some republican source.

In the end the "investigation" was only done by a private company. So the hearsay is as much from the actual DNC as anyone.
 

oldjones

CanBarelyRe Member
Aug 18, 2001
24,495
11
38
Or he did work there. As in a number of Bernie supporters. Hell even a plant by the some republican source.

In the end the "investigation" was only done by a private company. So the hearsay is as much from the actual DNC as anyone.
Having an employee number just means you don't get stopped at the door. It doesn't make you 'licit', not if your intent is to spy and disseminate privileged communications.

If you have a crisis of conscience, and realize you inadvertently have been part of something hateful you must reveal, then you come clean and blow the whistle under your own name.

Read your way, otb's way or as a Russian Plot (and so far they're all equally plausible) there's no new question raised. It's still the same old, same old question: Can Americans make their politics any meaner, nastier and undemocratic, or have they at least reached the bottom (NPI) and can at last begin to climb towards something better?
 

Butler1000

Well-known member
Oct 31, 2011
28,835
3,482
113
Having an employee number just means you don't get stopped at the door. It doesn't make you 'licit', not if your intent is to spy and disseminate privileged communications.

If you have a crisis of conscience, and realize you inadvertently have been part of something hateful you must reveal, then you come clean and blow the whistle under your own name.

Read your way, otb's way or as a Russian Plot (and so far they're all equally plausible) there's no new question raised. It's still the same old, same old question: Can Americans make their politics any meaner, nastier and undemocratic, or have they at least reached the bottom (NPI) and can at last begin to climb towards something better?
I'm afraid OJ it's going to get far far worse before it gets better. A fuse was lit this election. The Betrayal of Bernie and the Election of Donald. And it's going to get a lot uglier.

It's been simmering for decades as partisan bickering took over for actual responsible governance. Now the polarization has reached a point where the two mainstream parties have enabled an extremist element to form, the internet to raise them in an echo chamber, and money from numerous sources attempting to use them for their own ends. On all sides. And those little monsters aren't going to quitely put back into they cages if and when Trump is gone.

That are hungry little beasties. And they grow quickly.

Just watch as the incitement of riots continues. And next summer will be one I think that doctorates are based on.
 

fuji

Banned
Jan 31, 2005
80,012
7
0
¯\_(ツ)_/¯
is.gd
This was refuted on the last three threads about it.

Lots of things have the same transfer rate the USB key conclusion is really suspect.

Also whoever wrote it doesn't seem to know that hackers access computers remotely.
 

Butler1000

Well-known member
Oct 31, 2011
28,835
3,482
113
This was refuted on the last three threads about it.

Lots of things have the same transfer rate the USB key conclusion is really suspect.

Also whoever wrote it doesn't seem to know that hackers access computers remotely.
No it hasn't been refuted. Not nearly so. And as the Russian investigations continue a spotlight is going to be shone on this. It has to be. No investigation can trust the word of a private security company if it wants to bring some sort of charges in the this.

So either the DNC is going to have to allow access or the investigation will fail.
 

Garrett

Hail to the king, baby.
Dec 18, 2001
2,435
6
48
Lots of things have the same transfer rate the USB key conclusion is really suspect.
Ok, list those things that would support the necessary encryption and obfuscation, and demonstrate them with that sustained rate over the ocean.

It is a very difficult sustained rate to achieve, even if running from something like a physical seed box.

Where it gets truly ridiculous is you claim they could pull this off, yet are fine with them being inept and leaving every possible bread crumb to point at Russia.

Number one rule of hacking is misdirection. You have been duped. Again.
 

onthebottom

Never Been Justly Banned
Jan 10, 2002
40,558
23
38
Hooterville
www.scubadiving.com
That was obvious from the beginning. Maybe now you will want to trust Julius Assange more than the US intelligence community??
Not to anyone in a news organization or the Dems
 

onthebottom

Never Been Justly Banned
Jan 10, 2002
40,558
23
38
Hooterville
www.scubadiving.com

fuji

Banned
Jan 31, 2005
80,012
7
0
¯\_(ツ)_/¯
is.gd
Ok, list those things that would support the necessary encryption and obfuscation, and demonstrate them with that sustained rate over the ocean.

It is a very difficult sustained rate to achieve, even if running from something like a physical seed box.

Where it gets truly ridiculous is you claim they could pull this off, yet are fine with them being inept and leaving every possible bread crumb to point at Russia.

Number one rule of hacking is misdirection. You have been duped. Again.
Any network filesystem. Alternately any operation that pipes the files across any network protocol, eg., a hacker pulling them from an internal server to a perimeter server that is their entry point to the network.

Network filesystems are very common in corporate environments and alternately pulling files to gateway machine will be a typical hacker activity.

Since they pull at local network speed the performance would be more or less exactly like USB.
 

fuji

Banned
Jan 31, 2005
80,012
7
0
¯\_(ツ)_/¯
is.gd
No it hasn't been refuted. Not nearly so. And as the Russian investigations continue a spotlight is going to be shone on this. It has to be. No investigation can trust the word of a private security company if it wants to bring some sort of charges in the this.

So either the DNC is going to have to allow access or the investigation will fail.
Yes it has.

Hackers access computers remotely so all you know is that they used some hacked computers in a US timezone, which isn't surprising.

It's the kind of silly article that only persuades people who WANT to believe.
 

Butler1000

Well-known member
Oct 31, 2011
28,835
3,482
113
Yes it has.

Hackers access computers remotely so all you know is that they used some hacked computers in a US timezone, which isn't surprising.

It's the kind of silly article that only persuades people who WANT to believe.
Until it is properly investigated by a gov't agency I don't consider it valid. And neither will the courts. So if you want to see this used in court then access must be granted.
 

FAST

Banned
Mar 12, 2004
10,069
1
0
,... more or less exactly like USB.

,... :bounce:

"Since they pull at local network speed the performance would be more or less exactly like USB",...

That has to be one of the most useless statements you have posted fuji,...and that saying a lot.
 
Last edited:

fuji

Banned
Jan 31, 2005
80,012
7
0
¯\_(ツ)_/¯
is.gd
,... :bounce:

"Since they pull at local network speed the performance would be more or less exactly like USB",...

That has to be one of the most useless statements you have posted fuji,...and that saying a lot.
It's a fact. USB speeds vary widely, as do LAN speeds, and the ranges significantly overlap.
 

fuji

Banned
Jan 31, 2005
80,012
7
0
¯\_(ツ)_/¯
is.gd
Until it is properly investigated by a gov't agency I don't consider it valid. And neither will the courts. So if you want to see this used in court then access must be granted.
Nobody gives a shit what you consider valid, the investigation was endorsed by the experts who do matter. I don't see you as an expert on this topic, or really any topic.
 

FAST

Banned
Mar 12, 2004
10,069
1
0
It's a fact. USB speeds vary widely, as do LAN speeds, and the ranges significantly overlap.
So again,...useless,...but its a fact,...and exactly a fact,... no doubt.
 
Toronto Escorts