It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The indictment dramatically shifts the context for Trump's upcoming meeting with Putin, whom U.S. intelligence services have concluded was behind the 2016 election interference scheme whose goal was to elect Trump.
“There is no allegation in this indictment that any American citizen committed a crime," Rosenstein said. "There is no allegation that the conspiracy changed the vote count or affected any election result.”
originally posted by: theantediluvian
a reply to: Lumenari
For those of us that understand transfer speeds, can you point out how the Russian hackers transferred the contents of a thumb drive to the Kremlin?
Just wondering, because math is important in the real world...
It's a complete joke that 22mb/s is unattainable over the Internet. I do 20mb/s+ between VPSes in Houston, TX and Windsor, Ontario on a regular basis.
More importantly, the Forensicator analysis is filled with GIANT holes. First and foremost, even if the gap times are the result of a bulk copy operation (rather than delays between selecting/copying), there's nothing to say exactly where they copying was done.
The files in question, despite what a lot of people mistakenly assume, were from the DCCC. The transfer could have been between two computers at the DCCC. It could have been between a DCCC computer and a C&C server in the US. It could have been between two computers back in Russia.
I actually do bulk file copies across a gigabit LAN fairly regularly on my work network and speeds in the low 20-30 mbit/s range are typical.
originally posted by: JBurns
a reply to: Sillyolme
Silly, what happens when Russia and other nations start indicting US intelligence personnel? Attempting to indict agents of a sovereign nation's government is a rather spurious prospect, if you ask me.
On 14 April 2017 WikiLeaks published Vault 7 part 5, titled "HIVE". Based on the CIA top-secret virus program created by its "Embedded Development Branch" (EDB). The six documents published by WikiLeaks are related to the HIVE multi-platform CIA malware suite. A CIA back-end infrastructure with a public-facing HTTPS interface used by CIA to transfer information from target desktop computers and smartphones to the CIA, and open those devices to receive further commands from CIA operators to execute specific tasks. Also called Listening Post (LP), and Command and Control (C2). All of the above while hiding its presence behind unsuspicious-looking public domains. This masking interface is known as "Switchblade".