2016 Postmortem
Related: About this forumCan Russia leak fake emails?
Can they leak fake emails right before the election which can not be proven to be fake?
And if they can do that then no leaked email can be used as evidence in any criminal trial, right, since it may be fake?
MADem
(135,425 posts)The Republicans did this with a National Guard letter re: George Bush, and destroyed Dan Rather's career.
And what "criminal trial" are you talking about?
Who would be on trial?
Putin?
Coyotl
(15,262 posts)We need to stay focused on who we are running against.
There just is no way to make this stuff up!! This is a court pleading. Unbelievable.
First get some spy files from Israel, alter them to look like Argentine spy files, make them implicate Bush and Menem in corruption, blame Gore for the forged documents. Sound familiar. Did I mention blackmailing bribed journalists and, of course, the perennial covert Republican dirty tricksters. This genre of dirty trick came to be known as "swiftboating" when done to Kerry four years later by the same players!!
==========================
http://pacer.ca4.uscourts.gov/opinion.pdf/041901.P.pdf
Olavar (Triumph Communications International Group, Plaintiffs-Appellants, v.
Santibañes, Defendant-Appellee, and Ikon Holdings, Inc., t/a Ikon Public Affairs, Dick Morris, Roger Stone, Eileen McGann, John Does, Defendants.
Appeal from the United States District Court Decided: December 1, 2005
Triumph Communications International Group, Incorporated is a corporation that provides political consulting and public relations services and is owned and operated solely by Mattie Lolavar.
In early 2000, Miss Lolavar began discussions with defendant Dick Morris about the possibility of her working with Craig Snyder and defendant Roger Stone, who are partners in defendant IKON Holdings, Inc., another political consulting firm ... about the possibility of Triumph Communications assistance with work that IKON was doing for the government of Argentina.
These discussions lead to two contracts ... and provided that Triumph would act as a public relations consultant to "the Secretary of Intelligence of Argentina" as well as arrange various media events...
Miss Lolavar went to Argentina in August 2000 to assist de Santibañes with preparations for his testimony in Argentine congressional hearings inquiring into allegations that he and the Argentine intelligence agency, known as SIDE, were responsible for bribing various Argentine senators in exchange for political support. Morris and Stone assigned other tasks to Miss Lolavar while she was in Argentina. Among other acts, they instructed her to contact SIDE and obtain a list of journalists who accepted bribes from that organization in order to harm the credibility of those same journalists in reporting on a bribery scandal surrounding de Santibañes and President de la Rua, as well as requiring her to spread false information to the press concerning de la Ruas political opponent, Dr. Carlos Menem. The charges and counter-charges related here are from the papers in the court file, as are the other facts.
A request that occasioned controversy between Miss Lolavar and the defendants was Morris and Stones request that she serve as an intermediary in an anonymous wire transfer of funds to an official in Israel. These funds were to be paid to secure intelligence files from the Israeli government to assist de la Ruas political domestic disputes with Menem, and to imply a corrupt relationship between Menem and George W. Bush, who was then running against Albert Gore for the United States presidency. These files were to be altered by Miss Lolavar to appear to be SIDE documents.
When the defendants became concerned that this plot would be discovered and traced back to them, they ordered Miss Lolavar to orchestrate a press response to blame Vice President Gore for the dissemination of the documents, since it was known to them that the Gore campaign had been attempting to connect Menem with the Bush campaign.
Lint Head
(15,064 posts)Thinkingabout
(30,058 posts)attempt to discredit Hillary and the DNC, it is says they are willing to destroy, time to move on and look at the emails the same as I do the rags in the check out lines.
TheBlackAdder
(28,214 posts)Thinkingabout
(30,058 posts)a thief a thief.
TheBlackAdder
(28,214 posts)Thinkingabout
(30,058 posts)The data bases, just because I set my purse on the floor does not mean others should invade my private property
synergie
(1,901 posts)TheBlackAdder
(28,214 posts)synergie
(1,901 posts)crimes for the crimes, they blame the criminals. Those who blame victims are not capable of objectivity, reason or much human compassion or intelligence. Those who call victims of crime "marks" and put the onus on them and not the criminals are despicable human beings, and that is an objective assessment of such people.
duncang
(1,907 posts)This wasn't some kind of kiddie hacker. They had a advanced program. When large businesses what have credit or banking info on their computers even then hackers have made it in. A virus program unknown or zero day to the makers of anti-virus programs just how are they going to protect themselves?
TheBlackAdder
(28,214 posts).
They used firewalls and proxies to secure information, with common userids.
There were no individual userids and passwords, no single session tokens, no session state tokens, and the records were not locked down at the row or record level within the database. This is Mickey Mouse DP 101.
If your credit card company exposed all of your banking information to others, or let you see other people's information, you'd cancel that card in seconds. And this isn't something as lame as a firewall update.
They knew they were prime candidates for hacking, and did not follow a three-tier or greater topology. There was no application bus to fence off the outer DMZ servers from the inner layers or on the backend side. There were probably backdoors in their system.
Hackers and almost every country uses security teams that constantly probe every website searching for vulnerabilities. And, a single server is extremely open to hacking, to the point where there would be no traces of intrusion.
I've been in DP for over 25 years and have experience protecting billions dollar/day transactional processing systems.
.
duncang
(1,907 posts)And only some of them show up in the news. A lot of them have been ransom hacks. Where the company pays a ransom to prevent release of info and no one even hears about it. And that is using all the procedures you mentioned above. Next consider they probably did not set it up themselves. But a real good chance they contracted it out. I doubt the dnc leaders are IT professionals or even consider themselves close to it. But they relied on what info they received from the IT folks. They probably made in good faith the "wrong" choice on who they chose as IT support. So I can see a rant against the hacker and the IT support company or individuals responsible for setting it up. Just don't agree with damning the dnc.
TheBlackAdder
(28,214 posts).
The ransom hacks are by small businesses and private entities. Don't buy into the hype on the internet.
As a business, proper dilligence demands that you don't throw the responsibilities over the fence without proper auditing measures. To sit there and blame another for not ensuring your prized data is secure is ludicris. I believe it was a party-affiliated contracting firm. But, you get as much as one is willing to pay, and many companies do not believe that security and disaster recovery are worth the expenses until the day they get hit.
Of all firms, the DNC is one of the top to get hacked, and they should have known it.
.
duncang
(1,907 posts)I don't remember a year where some financial institution wasn't hacked. So personally I don't think me saying that every year there has been some kind of a hack to one is hype. I also said financial institutions get hacked with out it ever hitting the news. Which again is not hype, it's what has happened.
Was the DNC leadership to blame for the hack. Or was it the hacker? Or the IT professional they hired? Or was it theirs for working with and choosing the IT professional who set it up?
I understand you are saying you think the proper level of protection is at least what financial institutions have. But is it considered proper diligence for a email server that as far as I know wouldn't be handling actual classified and financial information?
Next. Who do you think the majority of the blame goes to? From your posts it sounds like the dnc. To me and others the hackers are the prime persons to blame. To me the next in line is the IT professional who set it up. Then following them the dnc. And whether that was a intentional way of keeping cost to appropriate perceived threat levels, mass negligence, or not understanding what the risks were. I don't know. But then the only people who would know would be those who were in any meetings between the two.
TheBlackAdder
(28,214 posts).
Financial institutions get hacked because that is where the money is, and they often fund policies that are destructive to emerging nations. That said, the RNC and the DNC is where the parties are primarily headquartered, ignoring for the time being the state parties. So, if someone wants to hack into politics, they won't get much hitting a Safe-Way supermarket. All primary sites are plagued with constant probing and attacks on their networks. This is just common knowledge. But, it comes back to how serious the management is in securing their network. Many will put a cost-benefit equation to it. Which, in politics would be an extremely stupid act, verging on malfeasance.
Regardless of your contractors or subcontractors, management at the hiring firm is ultimately responsible and lapses in security are due to relaxed security perseverance. You can try and say one is more at fault than the other, but the hiring company is the one who made the decisions, they are the one that experiences the damage to their credibility, and they are the ones who should supervise and audit their IT infrastructure.
This is no different than firms bringing in auditors to audit their accounting departments.
There are dozens of IT auditing firms out there. Many financial firms hire former Russian and other high-profile hackers to secure their networks. They are very expensive, but uncover a series of infrastructure deficiencies.
.
uponit7771
(90,364 posts)TheBlackAdder
(28,214 posts)Demsrule86
(68,689 posts)and many organizations are hacked... we have a terrible infrastructure in terms of the internet in this country...we are pretty much an open book...state was hacked at least three times...maybe more.
TheBlackAdder
(28,214 posts)Demsrule86
(68,689 posts)And you know the entire US government and most of the banks were hacked...think about that.
onecaliberal
(32,898 posts)bettyellen
(47,209 posts)uponit7771
(90,364 posts)... the sender calling it fake and a scheme
C_U_L8R
(45,021 posts)You wouldn't believe the stuff he admits to.
Capt. Obvious
(9,002 posts)Response to Cicada (Original post)
Name removed Message auto-removed
Exilednight
(9,359 posts)Getting caught? No.
Demsrule86
(68,689 posts)"However, we should still be wary of forgeries. A clever attacker might obtain a large volume of genuine email and then slip in a few additional documents calculated to achieve some particular end. In a body of many thousands of documents, not all will be scrutinized at once. We could imagine a situation in which a number of leaked documents are authenticated, without any particular attention being paid to the forgeries at first. Then, once the public has firmly in mind that the documents are genuine, journalists are pointed to the forgeries. A careful forensic analysis would likely be able to sniff out the forged from the genuine documents. But if the analysis is done only after the initial public discussion of the documents, it may be too late to counteract the propaganda impact."
http://www.techpolicydaily.com/technology/dnc-russia-fake-email-propaganda/
Exilednight
(9,359 posts)Weed out the frauds. They're easily detectable and can be identified with a bit of time.
Demsrule86
(68,689 posts)If such a thing was done say right before the election...there would not be time and even if it was done before...it would still do damage...thus I will not lend credence to any bullshit hacked emails...and one never knows they might improve their skills over time...thus Wiki and all the other BS is not going to influence me at all...they have destroyed their credibility by targeting Democrats in order to influence our elections.
amandabeech
(9,893 posts)in the server, or so I've read.
Someone would have to point out which ones they were, though. A lot of material was in those files.
Coyotl
(15,262 posts)Demsrule86
(68,689 posts)so yes...the Russians are to blame and nothing the Russian hackers come up with is to be believed.
Coyotl
(15,262 posts)If i were committing this crime, I'd use that computer service too, to hide my tracks. And to throw people off even more, I might pretend to be a Russian hacker like Gucifer.
Amazing how easy it is to fool people, isn't it. All you need is a Russian IP number. Anyone on the internet anywhere can pull that routing off.
So, you left out the great deal of evidence. But you already knew that.
Demsrule86
(68,689 posts)This is why wiki is now useless and we simply will ignore it.
FarPoint
(12,443 posts)None of the Assange / Wikileaks etc stuff has any credibility... NONE! Collection of evidence has a standard of custody and collection ...for a reason.