It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Grambler
a reply to: underwerks
Can you quote me in that report the IG saying the ICIG never met with these people to discuss chinese hacks?
Funny thing is even the creator of this thread acknowledges both sides of this story are reliant on anonymous sourcing, yet still you persist.
repeatedly with FBI officials to warn them of the Chinese intrusion, according to a former intelligence officer with expertise in cybersecurity issues, who was briefed on the matter. He spoke anonymously, as he was not authorized to publicly address the Chinese’s role with Clinton’s server.
Among those FBI officials was Peter Strzok, who was then the bureau’s top counterintelligence official. Strzok was fired this month following the discovery he sent anti-Trump texts to his mistress and co-worker, Lisa Page. Strzok didn’t act on the information the ICIG provided him, according to Gohmert.
Gohmert mentioned in the Judiciary Committee hearing that ICIG officials told Strzok and three other top FBI officials that they found an “anomaly” on Clinton’s server.
The former intelligence officer TheDCNF spoke with said the ICIG “discovered the anomaly pretty early in 2015.”
“When [the ICIG] did a very deep dive, they found in the actual metadata — the data which is at the header and footer of all the emails — that a copy, a ‘courtesy copy,’ was being sent to a third party and that third party was a known Chinese public company that was involved in collecting intelligence for China,” the former intelligence officer told TheDCNF.
“The [the ICIG] believe that there was some level of phishing. But once they got into the server something was embedded,” he said. “The Chinese are notorious for embedding little surprises like this.”
Thats a fancy way of saying the FBI did not look at the physical evidence.
Instead the got second hand evidence form a DNC hired company.
Seeing as how this hack was such a big issue that some people called it an act of war, why would the FBI insist on seeing the physical server?
Why wouldnt the DNC insist they did that?
As an afterthought, Mike Flynn came into the white house with a pretty big mission...
originally posted by: Deplorable
Just pull their funding and be done with them.
Seriously: What has the FBI done for any of us? EVER??
originally posted by: theantediluvian
a reply to: Grambler
Thats a fancy way of saying the FBI did not look at the physical evidence.
Instead the got second hand evidence form a DNC hired company.
No.
1. The physical hardware is all but irrelevant. It's not like they're lifting prints off the chassis or looking for residue on a motherboard. This is particularly true because the servers were apparently virtual. With virtual servers, there's not a single physical server. Instead, there are virtualization hosts running a hypervisor and some sort of shared storage and multiple virtual servers share them.
My setup at work is Citrix Xenserver with 8 hosts in the main pool and storage repositories on a total of 4 storage servers. On that, we're running around two dozen virtual servers.
Instead of physical hard drives, the disks are virtual disks (VHDs in this case but there are other formats like VMDK) which are basically extremely large files which contain everything that would be present in a physical disk. The VHDs themselves are stored on storage servers on the SAN.
I can live migrate the VMs between any of the hosts in ~1-2 min. I can also live migrate the VHDs between storage repos.
Anyway, aside from the virtual disks, there's config data stored in a database and that's about it except for in the case of a running VM which will have a chunk of the RAM in use on whatever host it's currently running on.
If I needed to somehow give you one of the servers, there's not a piece of hardware I would give you. What I'd give you would be a copy of the VHD(s) (you can create a new VM and attach the VHD) or maybe export the VM into an OVF package (which could be imported) which would contain not only the VHDs but also XML files with various config parameters.
2. The insinuation in "second hand" is that the images are somehow less reliable as evidence, that they could have been modified somehow in copying or something. The problem with this is that if there was some funny business, if CrowdStrike was faking a hack, they could just fake the forensic evidence of one on the servers in the first place.
In fact, they could have planted all the forensic evidence and turned over a physical server too if these were physical servers. Handing the FBI images wouldn't really do anything to facilitate pulling off a hoax.
So in that regard, they're exactly as reliable as the physical server would be. And forensic images are bit for bit copies so it's not like making dubbing songs on cassette or something.
Seeing as how this hack was such a big issue that some people called it an act of war, why would the FBI insist on seeing the physical server?
Why wouldnt the DNC insist they did that?
Why would they?
originally posted by: Phage
a reply to: Tempter
Can you elaborate?
Oh. I see you did. You don't know what you're talking about.
An image is an image.