It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Mandroid7
a reply to: Wardaddy454
Christ, I can do that in 2 min by running my proxy through Russia, then trash talk from there, like a basement dwelling fat kid from 4chan.
originally posted by: network dude
originally posted by: theantediluvian
a reply to: network dude
Your handle is literally "network dude" so I assume you've got access to a network. Let's assume gigabit ethernet with normal-low utilization and two run-of-the-mill Windows desktops with 5400 rpm drives. That seems like a safe bet for approximating the DCCC office's network.
Fire up robocopy, xcopy or whatever you favor and do a large batch copy. I'll bet you'll get a sustained transfer rate of about 20-25 MB/s.
And like I said earlier, I get ~20 MB/s regularly between VPSes in Houston, TX and Windsor, Ontario (at different ISPs).
The idea that the only thing that could explain an apparent 22 MB/s transfer speed, assuming the gap in the mod times results from a batch file copy, is copying to a thumb drive, is rather silly. And even if the files were at some point copied to a thumb drive, that could have been done basically anywhere. They could have been put on a thumb drive by the hackers and handed off to a different department for them to deploy.
And what would explain the multiple independent lines of publicly available evidence for the spearphishing campaign? I've posted stuff from Dell SecureWorks, FireEye, etc with the data from passive DNS monitoring, the timestamped (link tracking not allowed) shortened URL data pulled from their API, etc that all strongly and independently evidence the spearphishing campaign. We also know 100% that Podesta's Gmail account was phished. We also know that the FBI had detected an attack against the DNC and tried (somewhat half-heartedly imo) to get them to move on it. I haven't seen any reporting about it but I assume they stumbled on it from something like passive DNS monitoring.
And that's without getting into the logs that the FBI would have obtained from involved ISPs, anything coming directly from the DNC/DCCC networks and whatever scary # the NSA is snooping with. I'm just talking about the publicly available information.
It's ridiculous to believe that the DNC/DCCC wasn't hacked. It's literally known what shortened URL Podesta clicked on, when it was created, when he received the email, when he clicked on the link, what the link translated to, where that host was located and who else was targeted in the same campaign.
It's ridiculous to assert that there was no hacking. So the thumb drive meme is pretty lame on its face. Attribution is something else altogether but even then, publicly available analysis of the targets, the infrastructure and the MO all point to the Russians.
It was pretty conclusive that either the Russians did it or somebody trying hard to look like the Russians and going after targets that would most fit the Kremlin's interests.
internet upload speed. When you get your new 100mb internet, it's usually displayed like this 100/50. The 50 is your upload speed. Symmetrical vs, Asymmetrical. Now I don't know what the speed at the DNC was at the time, and perhaps they had some amazing fiber link that wasn't available to the rest of the country at the time, but it does matter and unless they had the holy grail of ISPs, they likely had what the rest of us could get.
I don't know a lot about a lot, but this, I know, and if you really want to get into it, I can explain it to you. But before you go telling me my business, get your facts straight.
Now, if you are interested in the truth, and not just your political nose up the left side of someones ass, you can dig into that aspect of things. It's the key to knowing if the hack was possible or not. If you are just the partisan hack I assume you to be, ignore that, and go tell everyone how much you know about internet upload transfer speeds.
Months before the 2016 presidential election, the Obama team knew that the Russians were meddling. Our National Security Council had a cybersecurity team in place, looking into it. Trying to figure out, what were the Russians up to?
Then, as the election campaign was in full swing, the national security adviser, Susan Rice, told the team to "stand down" ... stop working on options to counter the Russian attack. The man in charge of our response confirms the "stand down" order. Another member of the team told the Senate this week that he was "incredulous, and in disbelief." He asked: "Why the hell are we standing down."
originally posted by: toysforadults
a reply to: Gothmog
With the help of the ISP yes it is traceable even with a proxy you still have to go through the ISP
Thats why I'm saying it would be more likely accessed from a stolen laptop in another country
originally posted by: toysforadults
a reply to: Kharron
He's talking about the amount of time it takes to upload gigs of data and that the transfer rate released by crowdstrike excess known upload rates via internet
The port for a USB can transfer higher amounts of data in less time
www.pcworld.com...
Read that article
L
originally posted by: Kharron
originally posted by: toysforadults
a reply to: Kharron
He's talking about the amount of time it takes to upload gigs of data and that the transfer rate released by crowdstrike excess known upload rates via internet
The port for a USB can transfer higher amounts of data in less time
www.pcworld.com...
Read that article
L
Unbelievable. And after netdude explained a banality and contradicted nothing, you come in and do the same thing -- point me to a link to how USB 3.0 works and explain nothing about how Ante was wrong.