This impeachment inquiry was nothing more than to try and damage Trump prior to election, unfortunately for Democrats, this is actually hurting their chances for 2020.
will25u said:Gary Johnson said:
Still ranting about Crowdstrike and boasting of his technological ignorance.
So a replication of a HDD /= giving a server to someone.
If you replicate a server, you are ONLY getting the information currently active in the HDD file tables, NOT any files that have been deleted. So there is a LOT of information you are not getting.
Second of all... It is amazing to me that the servers were not taken by the FBI wherever they may be. The FBI can get the servers. The cloud doesn't have anything to do with anything. The PHYSICAL servers are SOMEWHERE.
If you are a company with virtual servers in the cloud hosting pedo content, you think the FBI won't go find those servers? There are many ways to host files not on the regular Internet. If they don't grab the servers what will they bring to trial? "Oh the servers are in the cloud, we couldn't get them." B.S. that would mean pedo content would still be available on some server somewhere.
Are you sure you know your technology?
You're in for more heartbreak. Going to be sad to watch, but I won't be able to look awayMetoliusAg said:That's exactly what Nixon's supporters falsely claimed, too. Art Buchwald wrote a famous newspaper column about it.aginlakeway said:99 plus percent of Americans don't give a **** about this.Gary Johnson said:Cool story. We aren't in court she was saying what Americans are thinking. Trump is blocking witnesses and evidence, why? Probably the same reason Nixon did.Quote:
The single worst thing a prosecutor in a criminal trial can ever do is even make a reference to any inference to a defendant's failure to take the stand by asserting the 5th Amendment. Automatic mistrial.
Same.mrad85 said:
Ok folks. I did myself a favor. I'm ignoring him for 24 hours. This is going to be a much better Friday.
So your argument now is: "If she had made that statement in front of a jury while trying a case, it would be dumb". Yet you freely admit she wasn't speaking in front of a jury while trying a case, and your hypothetical has zero relevance to the point she made and the audience she was speaking to. That's some mighty fine lawyering talk, hawg.aggiehawg said:
Good Lord, you can be dense sometimes. Stop conflating multiple disparate scenarios, with my hypothetical of if she said that in front of a jury.
hbtheduce said:
1. Crowdstrike provided "clones" of the servers. It is possible that digital clone could be doctored to fit a narrative.
Quote:
2. The founder or owner (doesn't matter) was from Ukraine. It is possible that he had his company back up the original information to servers in his home country.
Quote:
Saying that, Crowdstrike could be a dead end
the sooner you perma-ignore Stephenville/etc/met/whatever other sock he's using, the faster you'll notice a solid 5-10 point increase in your IQ simply from not being exposed to the stupidity and utter dearth of logic or reality.Pinche Abogado said:Same.mrad85 said:
Ok folks. I did myself a favor. I'm ignoring him for 24 hours. This is going to be a much better Friday.
That was my original post. I didn't change it. You just didn't understand it. And still don't apparently.MetoliusAg said:So your argument now is: "If she had made that statement in front of a jury while trying a case, it would be dumb". Yet you freely admit she wasn't speaking in front of a jury while trying a case, and your hypothetical has zero relevance to the point she made and the audience she was speaking to. That's some mighty fine lawyering talk, hawg.aggiehawg said:
Good Lord, you can be dense sometimes. Stop conflating multiple disparate scenarios, with my hypothetical of if she said that in front of a jury.
Quote:
99 plus percent of Americans don't give a **** about this.
blindey said:the sooner you perma-ignore Stephenville/etc/met/whatever other sock he's using, the faster you'll notice a solid 5-10 point increase in your IQ simply from not being exposed to the stupidity and utter dearth of logic or reality.Pinche Abogado said:Same.mrad85 said:
Ok folks. I did myself a favor. I'm ignoring him for 24 hours. This is going to be a much better Friday.
FIFYGary Johnson said:Quote:
99 plus percent of Americans don't give a **** about this.
Akshuaallly a plurality of Democrats supported impeachment and removal before Sondland and Hill testified publicly this week.
I honesty do not know one person off these boards who is paying attention to this.Gary Johnson said:Quote:
99 plus percent of Americans don't give a **** about this.
Akshuaallly a plurality supported impeachment and removal before Sondland and Hill testified publicly this week.
will25u said:Gary Johnson said:
Still ranting about Crowdstrike and boasting of his technological ignorance.
So a replication of a HDD /= giving a server to someone.
If you replicate a server, you are ONLY getting the information currently active in the HDD file tables, NOT any files that have been deleted. So there is a LOT of information you are not getting.
Second of all... It is amazing to me that the servers were not taken by the FBI wherever they may be. The FBI can get the servers. The cloud doesn't have anything to do with anything. The PHYSICAL servers are SOMEWHERE.
If you are a company with virtual servers in the cloud hosting pedo content, you think the FBI won't go find those servers? There are many ways to host files not on the regular Internet. If they don't grab the servers what will they bring to trial? "Oh the servers are in the cloud, we couldn't get them." B.S. that would mean pedo content would still be available on some server somewhere.
Are you sure you know your technology?
Same here, except for a few family members and coworkers who are political junkies.aginlakeway said:I honesty do not know one person off these boards who is paying attention to this.Gary Johnson said:Quote:
99 plus percent of Americans don't give a **** about this.
Akshuaallly a plurality supported impeachment and removal before Sondland and Hill testified publicly this week.
In my circles, what I hear most politically is about how concerned folks are about what may happen to the economy if Warren wins. I don't hear one peep about impeachment.
Again, I said that among my circle, I don't know anyone who has ever even mentioned impeachment. And another poster said the same thing.Gary Johnson said:
70% of Americans claim to be "following the hearings" which probably means half that. It's not everybody for sure, but it's not nobody.
BINGO.Maroon Dawn said:
Not even the hard core libs I know are talking about this
They seem angry that their long promised impeachment is a clear partisan sham that stands no chance of doing anything
Quote:
yeah, since its in the "cloud", just give us (FBI) a copy of what you have, that'll be good enough....
BS!!!!
GJ doesn't know what the cloud is obviously! Maybe he thinks its an actual cloud.
Quote:
"In most cases you don't even ask, you just assume you're going to make forensic copies," said Harris, now vice president of engineering at PFP Cyber. "For example when the Google breach happened back in 2009, agents were sent out with express instructions that you image what they allow you to image, because they're the victim, you don't have a search warrant, and you don't want to disrupt their business."
First off, CrowdStrike, the company the DNC brought in to initially investigate and remediate the hack, actually shared images of the DNC servers with the FBI. For the purposes of an investigation of this type, images are much more useful than handing over metal and hardware, because they are bit-by-bit copies of a crime scene taken while the crime was going on. Live hard drive and memory snapshots of blinking, powered-on machines in a network reveal significantly more forensic data than some powered-off server removed from a network. It's the difference between watching a house over time, carefully noting down who comes and goes and when and how, versus handing over a key to a lonely boarded-up building. By physically handing over a server to the FBI as Trump suggested, the DNC would in fact have destroyed evidence. (Besides, there wasn't just one server, but 140.)
An advanced investigation of an advanced hacking operation requires significantly more than just access to servers. Investigators want access to the attack infrastructurethe equivalent to a chain of getaway cars of a team of burglars. And the latest indictments are rich with details that likely come from intercepting command-and-control boxes (in effect, bugging those getaway cars) and have nothing to do with physical access to the DNC's servers.
Snip
The Russian spies, for example, reused a specific account for a virtual private network (a purportedly secure communication link) to register deceptive internet domains for the DNC hack, as well as to post stolen material online under the Guccifer 2.0 front. Cryptocurrency paymentsthe kind the Russians used to pay for registering the DCLeaks.com site and their VPNwere neither as anonymous nor as secure as the GRU thought they would be. Third-party platforms including Google, Twitter and the link-shortening service Bitly were convenient and reliable for Russian hackers, but they could also be subpoenaed. Mueller's team did exactly that, reconstructing how, when and how frequently Russian intelligence officers communicated with WikiLeaks, which they used as an outlet for the stolen material. The Russians weren't even particularly careful: WikiLeaks and the Russians officers, in a major cock-up, encrypted the hacked emails, but did not encrypt the details of their collaboration. And in using a Bitly account to automate the shortened links sent out to targets of their email-phishing scheme, the GRU left an investigative gold mine: a vast target list of more than 10,000 potential victims' email addresses.
American spies could even watch the Russian spies trying, in vain, to cover their tracks, likely in real time. Indeed, the Russian officers made so many mistakes that it is almost surprising the GRU even tried to be stealthy. The U.S. intelligence community has stunning visibility into GRU hacking operationsnot just against the DNC, but against the Hillary Clinton campaign, the DCCC and state election infrastructure. The notion that all this high-resolution visibility hinges on physical access to "the DNC server" defies logic or even a basic understanding of what is actually happening.
aginlakeway said:
Again, I said that among my circle, I don't know anyone who has ever even mentioned impeachment. And another poster said the same thing.
Do you and your friends talk about a possible impeachment and these hearings a lot?
And I suspect the majority of people who "claim to be following the hearings..."Gary Johnson said:
70% of Americans claim to be "following the hearings" which probably means half that. It's not everybody for sure, but it's not nobody.
Bird93 said:And I suspect the majority of people who "claim to be following the hearings..."Gary Johnson said:
70% of Americans claim to be "following the hearings" which probably means half that. It's not everybody for sure, but it's not nobody.
In reality translates to: "are aware the hearings are occurring."
Bird93 said:And I suspect the majority of people who "claim to be following the hearings..."Gary Johnson said:
70% of Americans claim to be "following the hearings" which probably means half that. It's not everybody for sure, but it's not nobody.
In reality translates to: "are aware the hearings are occurring."
Gary Johnson said:Quote:
yeah, since its in the "cloud", just give us (FBI) a copy of what you have, that'll be good enough....
BS!!!!
GJ doesn't know what the cloud is obviously! Maybe he thinks its an actual cloud.
This is SOP. The physical DNC servers never went missing.
Quote:
"In most cases you don't even ask, you just assume you're going to make forensic copies," said Harris, now vice president of engineering at PFP Cyber. "For example when the Google breach happened back in 2009, agents were sent out with express instructions that you image what they allow you to image, because they're the victim, you don't have a search warrant, and you don't want to disrupt their business."
First off, CrowdStrike, the company the DNC brought in to initially investigate and remediate the hack, actually shared images of the DNC servers with the FBI. For the purposes of an investigation of this type, images are much more useful than handing over metal and hardware, because they are bit-by-bit copies of a crime scene taken while the crime was going on. Live hard drive and memory snapshots of blinking, powered-on machines in a network reveal significantly more forensic data than some powered-off server removed from a network. It's the difference between watching a house over time, carefully noting down who comes and goes and when and how, versus handing over a key to a lonely boarded-up building. By physically handing over a server to the FBI as Trump suggested, the DNC would in fact have destroyed evidence. (Besides, there wasn't just one server, but 140.)
An advanced investigation of an advanced hacking operation requires significantly more than just access to servers. Investigators want access to the attack infrastructurethe equivalent to a chain of getaway cars of a team of burglars. And the latest indictments are rich with details that likely come from intercepting command-and-control boxes (in effect, bugging those getaway cars) and have nothing to do with physical access to the DNC's servers.
Snip
The Russian spies, for example, reused a specific account for a virtual private network (a purportedly secure communication link) to register deceptive internet domains for the DNC hack, as well as to post stolen material online under the Guccifer 2.0 front. Cryptocurrency paymentsthe kind the Russians used to pay for registering the DCLeaks.com site and their VPNwere neither as anonymous nor as secure as the GRU thought they would be. Third-party platforms including Google, Twitter and the link-shortening service Bitly were convenient and reliable for Russian hackers, but they could also be subpoenaed. Mueller's team did exactly that, reconstructing how, when and how frequently Russian intelligence officers communicated with WikiLeaks, which they used as an outlet for the stolen material. The Russians weren't even particularly careful: WikiLeaks and the Russians officers, in a major cock-up, encrypted the hacked emails, but did not encrypt the details of their collaboration. And in using a Bitly account to automate the shortened links sent out to targets of their email-phishing scheme, the GRU left an investigative gold mine: a vast target list of more than 10,000 potential victims' email addresses.
American spies could even watch the Russian spies trying, in vain, to cover their tracks, likely in real time. Indeed, the Russian officers made so many mistakes that it is almost surprising the GRU even tried to be stealthy. The U.S. intelligence community has stunning visibility into GRU hacking operationsnot just against the DNC, but against the Hillary Clinton campaign, the DCCC and state election infrastructure. The notion that all this high-resolution visibility hinges on physical access to "the DNC server" defies logic or even a basic understanding of what is actually happening.
https://www.cyberscoop.com/donald-trump-crowdstrike-ukraine-phone-call/
https://www.politico.com/magazine/story/2018/07/17/dnc-server-hack-russia-trump-2016-219017
TLDR "muh servers" is ignorant grandpa speak. The RNC also uses Crowdstrike for security.
Of course you do. The FBI has the same goal as you, undoing the 2016 election.Gary Johnson said:
I'll defer to the tech experts and FBI that say this is SOP and the information turned over was complete.