It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Three cybersecurity experts said they found Lazar's explanation for accessing the Clinton server plausible but had questions.
Cybersecurity expert Morgan Wright explained how the FBI could marry up available evidence, including forensics or the configuration of the server and its folders, to assess his claims. "So we're going to map these things together, and if those things match up together, they're going to say ‘yes, this was compromised,’ then it means it was open to other people to compromise as well," he said.
Since Fox News reported on Guccifer’s claims Wednesday, anonymous sources have reported that a review of the Clinton hard drives does not appear to indicate a breach. However, Wright and other experts warned that Clinton IT specialist Bryan Pagliano was the server's administrator and not principally a cybersecurity specialist – and may not have installed an adequate detection system for a Cabinet secretary’s email.
“If you have a bank and you have one video camera when you need 20, then you missed it,” Wright said. “If they weren't capturing all the activity, their security logs may say they didn’t see anything."
originally posted by: BlueAjah
a reply to: Pharyax
Exactly. I see port sniffing and brute force attacks on our email all of the time. If there is an IP on the Internet, it will be found immediately, and the bots will never stop trying.
I also see those 24/7 attempts from mostly China and Russian IPs and also other countries.
And you have to keep an eye on it. You may think you have it locked down, and somehow they come up with something new. You can lock it down to only necessary ports, and use TLS, and use password complexity rules, but even having the necessary ports open makes you a target. You can have automatic IP blacklisting after so many attempts, and tons of other precautions in place. Even the best firewalls need regular attention.
And still you HAVE to check on it regularly. Even with automatic reporting notifications of certain patterns, you need to check the logs constantly, or things can be happening undetected for days if you were not paying attention.
We are NOT a high value target. Government has entire staffs of people monitoring their systems 24/7.
So, some tech guy sets up a server and sticks it in a bathroom. It might keep working just fine, as far as sending and receiving emails, with little intervention, but if no one was watching it, I would guarantee 100% that it was hacked. Repeatedly.
.
What happens if she goes to jail, or even gets a felony charge? She can't be President with a felony right? So what happens?
originally posted by: jadedANDcynical
a reply to: Pharyax
What happens if she goes to jail, or even gets a felony charge? She can't be President with a felony right? So what happens?
Don't you recall? BHO has a pen and a phone and if they rap it quick enough he can grant her one of his goodbye pardons presidents have been fond of handing out on their way out the door these past few administrations.
originally posted by: Sillyolme
a reply to: xuenchen
The FBI couldn't break into a smart phone...
FBI says it has cracked terrorist's iPhone without Apple's help
The Department of Justice says the FBI has accessed the iPhone used by one of the gunmen in the San Bernardino terrorist shooting. Law enforcement officials were able to break into the phone used by Syed Farook with the help of an unnamed third party. Government officials did not go into detail about what was found on the phone. "The FBI has now successfully retrieved the data stored on the San Bernardino terrorist's iPhone and therefore no longer requires the assistance from Apple required by this Court Order," DOJ spokeswoman Melanie Newman said in a statement. The DOJ is dropping the case against Apple, since it no longer needs the company's help.