It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: chr0naut
originally posted by: face23785
a reply to: chr0naut
Fascinating how you weren't able to offer any kind of expert rebuttal to what I said.
OK, the hackers, whoever they would be, were only interested in getting all that secret and potentially incriminating data...
If they erased that last bit of evidence, then the evidence of that erasure would be just as damning. And, after all, that [hiding their identity] isn't their goal, anyway. They wanted the data.
In this case, the hackers did clean up a bit, which was why MIS (the DNC's IT Support company) couldn't find who, or how, and so they called in CrowdStrike (it's in the transcript).
It makes no rational sense for the hackers to set up fake traces that would be misinterpreted by all the other guys using all their methods as well, otherwise, it would have been fairly pointless for the hackers to try and identify some other hacking group when there would still most likely be some trace of them, that they couldn't remove.
As it is, what do the Russians care that they have been fingered? It's "so what"? They won't cop any more or less flack over it.
They went for the same data because it was the most exposed and the most likely to be useful.
originally posted by: chr0naut
originally posted by: face23785
a reply to: chr0naut
Fascinating how you weren't able to offer any kind of expert rebuttal to what I said.
OK, the hackers, whoever they would be, were only interested in getting all that secret and potentially incriminating data.
Sure, the hackers could try and cover their tracks, all hackers do, but they would still leave traces, even with log editing tools and file 'touch' modifiers and a massive and complicated cleanup.
Their very last operation in the system could not be erased and so would evidence them as being present in the environment. If they erased that last bit of evidence, then the evidence of that erasure would be just as damning. And, after all, that isn't their goal, anyway. They wanted the data.
In this case, the hackers did clean up a bit, which was why MIS (the DNC's IT Support company) couldn't find who, or how, and so they called in CrowdStrike (it's in the transcript). And CrowdStrike and other data forensics groups did find traces and have published the findings.
Also, at the time of the hack, it wasn't a foregone conclusion that CrowdStrike would be called in and you are also forgetting the other data forensics guys who worked to find the details of the breach.
It makes no rational sense for the hackers to set up fake traces that would be misinterpreted by all the other guys using all their methods as well, otherwise, it would have been fairly pointless for the hackers to try and identify some other hacking group when there would still most likely be some trace of them, that they couldn't remove.
As it is, what do the Russians care that they have been fingered? It's "so what"? They won't cop any more or less flack over it. They did the hack, published the data, and then closed up shop, disbanded the groups, wiped their computers, and just disappeared into the woodwork (as they have done)?
The only ones who have any skin in the game about 'who did what' were the Trump and Hillary campaigns.
Just more trolling. What else is new?
ETA: Oh, I see you saved your real firepower for this guy:
originally posted by: bloodymarvelousNone of that explains why they both went directly to the same data.
Some real expert analysis there...
originally posted by: chr0naut
Umm, because it was there?
You've GOT to be getting paid for this. I refuse to believe someone would make such a fool of himself for free.
They went for the same data because it was the most exposed and the most likely to be useful.
That after the emails were leaked to WikiLeaks, it was decided to not leak more, but to engage in misinformation: "Rather the tactics would be to spread rumours and misinformation about the content of what already had been leaked and make up new content.
originally posted by: bloodymarvelous
originally posted by: chr0naut
originally posted by: face23785
a reply to: chr0naut
You can totally erase your last operation.
Just have the malware program that did that last operation delete itself. A small program running in ram could delete itself from the hard drive (because its running in Ram) and then exit.
But you're making yourself sound like you're not really an IT guy.
What Crowdstrike was finding is these "runDLL" commands in the log. Commands that normal, non-hacker, computer programs don't send to the system. That's what made one of the bears visible to them.
The other was using malware, and I'm not quite as versed in malware. So I don't know what the fingerprints were for that.
But basically when you see the operating system doing things it doesn't normally do, that suggests someone is tinkering with it.
Also fake traces would be a lot more difficult than simply doing a real hack.
But the DNC could help someone real hack them by leaving them an opening.
Reading more about it, it looks like they might not have even targeted the same things.
As it is, what do the Russians care that they have been fingered? It's "so what"? They won't cop any more or less flack over it. They did the hack, published the data, and then closed up shop, disbanded the groups, wiped their computers, and just disappeared into the woodwork (as they have done)?
The only ones who have any skin in the game about 'who did what' were the Trump and Hillary campaigns.
Just more trolling. What else is new?
ETA: Oh, I see you saved your real firepower for this guy:
originally posted by: bloodymarvelousNone of that explains why they both went directly to the same data.
Some real expert analysis there...
originally posted by: chr0naut
Umm, because it was there?
You've GOT to be getting paid for this. I refuse to believe someone would make such a fool of himself for free.
They went for the same data because it was the most exposed and the most likely to be useful.
www.cnn.com...
One of them basically monitored emails for a whole year.
The other went after opposition research on Trump.
What's hard to believe is that they were so deep into the system, and for so long.
But now what remains suspicious:
en.wikipedia.org...
They clearly had a lot more emails than what they leaked.
It just strikes me as so surprising that nothing truly "game ending" came out of that.
It's like we're somehow supposed to believe that either:
A: - Even when the DNC has its pants totally down, exposed to the wind. They *still* aren't doing anything that would really upset the public? (They're politicians.... but they don't lie very much to us?)
or
B: - Putin didn't want to do too much harm. Just a little bit.
Option C:
The dems turned over the emails to Guccifer 2.0 themselves, and cherry picked them so they wouldn't be too incriminating.
originally posted by: chr0naut
originally posted by: shooterbrody
a reply to: UKTruth
Some dont know a computer from a car lot.
Tho Wikipedia tells them they do.
I think the testimony under oath is enough.
I am the CIO IT&T Manager for the company I currently work for. I have worked for more than 30 years at a number of technology companies, including IBM and IBMGSA. I have done disaster recoveries several times, for several companies, and have held an MCSE and A+ and other IT qualifications in the past. I have also written some commercial applications and have a software development portfolio. I would consider myself an expert in IT and computing.
I am confident that what CrowdStrike wrote in their blog post, or what is in the Wikipedia article on the DNC compromise, is technically correct.
originally posted by: network dude
originally posted by: Gryphon66
a reply to: UKTruth
Quick question: Do you know who hacked the DNC?
Thank you kindly.
quick question, are you sure they were hacked?
originally posted by: Gryphon66
a reply to: shooterbrody
Because no one ever lies under oath, eh?
originally posted by: network dude
originally posted by: chr0naut
originally posted by: shooterbrody
a reply to: UKTruth
Some dont know a computer from a car lot.
Tho Wikipedia tells them they do.
I think the testimony under oath is enough.
I am the CIO IT&T Manager for the company I currently work for. I have worked for more than 30 years at a number of technology companies, including IBM and IBMGSA. I have done disaster recoveries several times, for several companies, and have held an MCSE and A+ and other IT qualifications in the past. I have also written some commercial applications and have a software development portfolio. I would consider myself an expert in IT and computing.
I am confident that what CrowdStrike wrote in their blog post, or what is in the Wikipedia article on the DNC compromise, is technically correct.
and yet, when you rebuild servers, you use all the same hardware? In the US, we usually upgrade the HDD to give more storage. I can send you some papers on the process if you need.
originally posted by: Gryphon66
a reply to: shooterbrody
It's not a complicated concept.
You offered a statement "under oath" as evidence, when you know as well as anyone else that there's nothing magical about making an oath.
Do try to address the content rather than your sloppy strawmen and ad homs, eh?
originally posted by: shooterbrody
originally posted by: Gryphon66
a reply to: shooterbrody
Because no one ever lies under oath, eh?
Oh so NOW they are lying?
Ahahahaha
Wowzers