Originally posted by falafel
View Post
Announcement
Collapse
No announcement yet.
Comrade Trump
Collapse
X
-
PLesa excuse the tpyos.
-
Originally posted by creekster View PostI know many of you are following this very closely, so I wonder if you can tell me if this 'hack' referred to in the indictment is in reference to the phishing of podesta's (and others) passwords and user names? Or is there some actual hacking involved?Originally posted by creekster View PostIn one sense no, but in another it does, in my mind. Personnel having access to important or sensitive information need to be aware of the possibility of phishing efforts. A large portion of blame falls on the DNC for being such an easy target, it seems to me. Moreover, phishing doesn't seem quite as pernicious to me as breaching security measures on a network. Phishing is like leaving your garage door open at night and being pissed someone stole your tools. Hacking is more like someone cracking your opener codes. Either way they shouldn't steal, but leaving your garage door open is pretty stupid.
Would love to see this go to trial just to see if we could get a peek behind the curtain. The NSA is for real (unlimited budget, extraordinary talent). Ask Uncle Ted.You're actually pretty funny when you aren't being a complete a-hole....so basically like 5% of the time. --Art Vandelay
Almost everything you post is snarky, smug, condescending, or just downright mean-spirited. --Jeffrey Lebowski
Anyone can make war, but only the most courageous can make peace. --President Donald J. Trump
You furnish the pictures, and I’ll furnish the war. --William Randolph Hearst
Comment
-
Originally posted by Walter Sobchak View PostAs falafel stated, the perpetrators leveraged the information they got from phishing Podesta's password to eventually gain privileged access on a variety of DCCC and DNC computers. Malware installed on these computers logged keystrokes and captured screens. The sniffed data was then packaged up and sent back to a computer in a data center located in Arizona. From there, the data moved to various other servers located elsewhere in the US and outside the US. All of this allegedly, of course.
Would love to see this go to trial just to see if we could get a peek behind the curtain. The NSA is for real (unlimited budget, extraordinary talent). Ask Uncle Ted.PLesa excuse the tpyos.
Comment
-
Originally posted by creekster View PostAre you implying it was the NSA?
Now think about, 1) the masssive amounts of data, and 2) the tools that would be required to analyze that data, which would be required to unravel the pretzel presented in the indictments. It is a monumental feat.
You can either have tremendous pride in the NSA or tremendous fear of the NSA. You pick I guess.
Originally posted by creeksterANd it makes no difference if it is phishing or hacking?
Podesta left his garage door open. Someone came in and stole his tools (e-mail), then used those tools (e-mail) to take the cover off of the cold air furnace return and shimmied down the duct work to enter the house (DCCC and DNC computer network) to circumvent having to use the door and a key.You're actually pretty funny when you aren't being a complete a-hole....so basically like 5% of the time. --Art Vandelay
Almost everything you post is snarky, smug, condescending, or just downright mean-spirited. --Jeffrey Lebowski
Anyone can make war, but only the most courageous can make peace. --President Donald J. Trump
You furnish the pictures, and I’ll furnish the war. --William Randolph Hearst
Comment
-
Originally posted by PaloAltoCougar View PostClick on the word "foreword" in my post.Last edited by Topper; 07-13-2018, 05:34 PM."Guitar groups are on their way out, Mr Epstein."
Upon rejecting the Beatles, Dick Rowe told Brian Epstein of the January 1, 1962 audition for Decca, which signed Brian Poole and the Tremeloes instead.
Comment
-
Originally posted by falafel View PostSpear-fishing.
Per Wiki:
Real question: Does it really matter how the Russian GRU gained access to this information? Whether it was spear-fishing or "actual hacking"?
Comment
-
This would be chilling:
Conservatives moving to impeach Rosenstein soon: report
Conservative lawmakers in the House are preparing to impeach Deputy Attorney General Rod Rosenstein, Politico reported Friday.
Sources told the publication that conservatives have been preparing to have Rosenstein impeached for weeks over allegations that he’s held up their investigation into FBI agents who some lawmakers say are biased against President Trump.
House Freedom Caucus leaders Reps. Mark Meadows (R-N.C.) and Jim Jordan (R-Ohio) are leading the effort, and the impeachment document could be filed as soon as Monday, according to Politico.
Ben Williamson, a spokesman for Meadows, declined to rule out if it would be filed next week, Politico reported.
The news comes the same day that Rosenstein announced charges against 12 Russian intelligence officials for allegedly hacking the Democratic National Committee.
Rosenstein has long been a target for Republicans who are frustrated over special counsel Robert Mueller’s probe into election meddling by Russia and possible collusion between Moscow and the Trump campaign. He is overseeing the probe after Attorney General Jeff Sessions recused himself from the Russia investigation, and some argue that he's the only person with the legal authority to fire Mueller.
The deputy attorney general testified before the House Judiciary Committee in a tense hearing last month, with Republicans grilling him over the Mueller probe.
Speculation that Trump could fire Rosenstein increased in April after the FBI raided the home and office of Trump’s former personal lawyer Michael Cohen.
Trump later responded to news reports that he may fire Mueller or Rosenstein by noting that “they’re still here.”
Comment
-
Originally posted by Walter Sobchak View PostAs falafel stated, the perpetrators leveraged the information they got from phishing Podesta's password to eventually gain privileged access on a variety of DCCC and DNC computers. Malware installed on these computers logged keystrokes and captured screens. The sniffed data was then packaged up and sent back to a computer in a data center located in Arizona. From there, the data moved to various other servers located elsewhere in the US and outside the US. All of this allegedly, of course.
Would love to see this go to trial just to see if we could get a peek behind the curtain. The NSA is for real (unlimited budget, extraordinary talent). Ask Uncle Ted.
https://www.theverge.com/2013/9/15/4...hip-enterprise"If there is one thing I am, it's always right." -Ted Nugent.
"I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU.
"Yet I still see wisdom in that which Uncle Ted posts." -creek.
GIVE 'EM HELL, BRIGHAM!
Comment
-
Originally posted by Walter Sobchak View PostPodesta left his garage door open. Someone came in and stole his tools (e-mail), then used those tools (e-mail) to take the cover off of the cold air furnace return and shimmied down the duct work to enter the house (DCCC and DNC computer network) to circumvent having to use the door and a key."If there is one thing I am, it's always right." -Ted Nugent.
"I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU.
"Yet I still see wisdom in that which Uncle Ted posts." -creek.
GIVE 'EM HELL, BRIGHAM!
Comment
-
Originally posted by creekster View PostI know many of you are following this very closely, so I wonder if you can tell me if this 'hack' referred to in the indictment is in reference to the phishing of podesta's (and others) passwords and user names? Or is there some actual hacking involved?"If there is one thing I am, it's always right." -Ted Nugent.
"I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU.
"Yet I still see wisdom in that which Uncle Ted posts." -creek.
GIVE 'EM HELL, BRIGHAM!
Comment
-
Originally posted by tooblue View PostMueller: Congressional candidate sought stolen emails from Russian spies in 2016
https://www.usatoday.com/story/news/...ies/783317002/"If there is one thing I am, it's always right." -Ted Nugent.
"I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU.
"Yet I still see wisdom in that which Uncle Ted posts." -creek.
GIVE 'EM HELL, BRIGHAM!
Comment
-
Originally posted by falafel View PostSpear-fishing.
Per Wiki:
Real question: Does it really matter how the Russian GRU gained access to this information? Whether it was spear-fishing or "actual hacking"?"If there is one thing I am, it's always right." -Ted Nugent.
"I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU.
"Yet I still see wisdom in that which Uncle Ted posts." -creek.
GIVE 'EM HELL, BRIGHAM!
Comment
-
Originally posted by tooblue View PostThat's an interesting little detail that should not be overlooked: it's a shot across the bow of all representatives who are questioning the investigation."If there is one thing I am, it's always right." -Ted Nugent.
"I honestly believe saying someone is a smart lawyer is damning with faint praise. The smartest people become engineers and scientists." -SU.
"Yet I still see wisdom in that which Uncle Ted posts." -creek.
GIVE 'EM HELL, BRIGHAM!
Comment
Comment