It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: DJW001
a reply to: CIAGypsy
First of all, everyone in the world has "motive" to back one candidate or another. If you think Russia is the only one, then you have not be an active party to the politics of the world, ever.
Not everyone in the world has the ability to hack into other people's emails. If this were a leak, the leaker would only have leaked incriminating documents, not page after page of press clippings. The volume of these emails seems designed to overwhelm, making the fact that there is nothing incriminating about them difficult to spot, while rinforcing the narrative that "where there's smoke there must be fir." There was neither smoke nor fire. This strategy is not one that a High School prankster would employ, either. A prankster would would make indiscriminate hacks and dump them all at once, the only intent being to demonstrate their prowess.
It sounds to me like you have fallen victim to the propaganda played out by the mainstream media about how each country "feels" about this or that candidate instead of understanding that there are varying factions of ideology in every country, each vying for control.
Please read what I actually wrote; I acknowledged this fact, and have not ruled Israeli hackers out entirely.
And again, this is only considering state-sponsored hacking...and not hacktivists, whistleblowers, or anyone else who could have ALSO gotten access (and did) to those servers.
Once again, the material released and way it was released argues in favor of a specific strategy, one Russia has been known to employ: flood the internet with too much "information," then impose a narrative onto it. (Cf: MH-17. "We may never know the truth.")
No one is denying that Russia or a dozen or more other state-sponsored hackers have access government related servers, let alone private parties like the DNC or RNC. But that doesn't make them the source to Wikileaks.
Nor does it prove that they are not. The MO matches Russia's; Russia seems to be the primary beneficiary. Motive, opportunity, benefit. What part are you not understanding?
Furthermore, releasing the TRUTH about who and what those people were really doing is not "hacking an election."
Where do I ever make that claim? Nowhere. Why must you create a strawman like that? If you are defending the TRUTH, why must YOU LIE?
Giving people information to make an informed opinion had nothing to do with altering, erasing, or adding ballots at the state level.
Once again, I never made that claim. This is a counterfactual narrative being circulated by Russian trolls to obscure the real issue: theft.
originally posted by: Vroomfondel
a reply to: TrueAmerican
If you read the report and understand computers at all, it stands out as an amazing bunch of crap disguised as technical jargon meant to fool people who think the cd tray is a drink holder.
This "highly sophisticated cyber attack" report is nothing more than essentially a cut and paste off of a anti-virus definition and the rest of it describes pretty much the most simplistic level of trojans and redirects. This sort of stuff is easily stopped by the most simplistic email filters and firewalls. Worse yet, the actual attack as described requires high level people within the dnc, as in the ones who had their emails hacked, to click through multiple security warnings to allow a macro to run after it opens the file in protected mode - which you will have to leave in order for it to start editing - which also gets an on screen warning. If this is how stupid the dnc is they deserve to get hacked. And lets not forget, this is all happening under hillary, who is under investigation by the FBI for gross incompetence in her handling of sensitive data previously has senior staff members who read mail from their junk folder from questionable sources and repeatedly answer yes to prompts essentially asking them if they're an idiot. And they cant click 'yes' fast enough.
And if Russia did use these xp era low tech attacks leaving such an obvious trail, they deserve to get caught. But we all know they didn't. Don't believe the b s.
Sadly, the JAR, as the Joint Analysis Report is called, does little to end the debate. Instead of providing smoking guns that the Russian government was behind specific hacks, it largely restates previous private-sector claims without providing any support for their validity. Even worse, it provides an effective bait and switch by promising newly declassified intelligence into Russian hackers' "tradecraft and techniques" and instead delivering generic methods carried out by just about all state-sponsored hacking groups.
...
Security consultant Jeffrey Carr also cast doubt on claims that attacks that hit the Democratic National Committee could only have originated from Russian-sponsored hackers because they relied on the same malware that also breached Germany's Bundestag and French TV network TV5Monde. Proponents of this theory, including the CrowdStrike researchers who analyzed the Democratic National Committee's hacked network, argue that the pattern strongly implicates Russia because no other actor would have the combined motivation and resources to hack the same targets. But as Carr pointed out, the full source code for the X-Agent implant that has long been associated with APT28 was independently obtained by researchers from antivirus provider Eset.
"If ESET could do it, so can others," Carr wrote. "It is both foolish and baseless to claim, as CrowdStrike does, that X-Agent is used solely by the Russian government when the source code is there for anyone to find and use at will."
originally posted by: Chadwickus
a reply to: Namdru
Can you explain WHY to us laypeople then?
originally posted by: Tiger5
a reply to: Namdru
OK but can you fake an IP address numbers? That is the question.