It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Paul Sperry
@paulsperry_
50m50 minutes ago
BREAKING: The FBI (and Mueller's team) obtained only the "forensic" images of the allegedly hacked DNC systems from CrowdStrike, which is not the same as workable mirror images of the hard drives. (And again, no actual machines were examined at the FBI forensics lab at Quantico.)
originally posted by: Xcathdra
a reply to: Annee
Your link is bad link and why would Uranium One retract their statement when they claim they complied with all applicable laws.
Uranium One admitted to what you say didnt occur.
If you cant accept that then take it up with Uranium One.
originally posted by: Annee
originally posted by: Xcathdra
a reply to: Annee
Your link is bad link and why would Uranium One retract their statement when they claim they complied with all applicable laws.
Uranium One admitted to what you say didnt occur.
If you cant accept that then take it up with Uranium One.
Yes. I deleted it because could not get link to work.
Your article is from 2017.
I see no follow up.
Anyway, gotta take grandson to Taco Bell.
Carry on
originally posted by: Xcathdra
originally posted by: Annee
originally posted by: Xcathdra
a reply to: Annee
Your link is bad link and why would Uranium One retract their statement when they claim they complied with all applicable laws.
Uranium One admitted to what you say didnt occur.
If you cant accept that then take it up with Uranium One.
Yes. I deleted it because could not get link to work.
Your article is from 2017.
I see no follow up.
Anyway, gotta take grandson to Taco Bell.
Carry on
Then the statement by Uranium One and export of Uranium stands.
Forensic examiners use imaging techniques to acquire data from a disk as opposed to copying files because an image contains every bit of data from the source disk and a copy operation will only retrieve currently accessible files. A forensic image will contain current files as well as slack space and unallocated space. Relevant forensic artifacts such as, deleted files, deleted file fragments and hidden data may be found in slack and unallocated space.
A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders and unallocated, free and slack space. Forensic images include not only all the files visible to the operating system but also deleted files and pieces of files left in the slack and free space.
Forensic imaging is one element of computer forensics, which is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.
Not all imaging and backup software create forensic images. Windows backup, for example, creates image backups that are not complete copies of the physical device. Forensic images can be created through specialized forensic software. Some disk imaging utilities not marketed for forensic use also make complete disk images.
A forensic image, sometimes referred to as a mirror image or hard drive clone, is a fundamental aspect of data preservation and digital forensics. Forensic imaging creates an exact bit-for-bit copy of the source hard drive, SSD, USB or other media, and creates a unique digital fingerprint that is used to certify its authenticity. This process is critical when digital evidence will be admitted as evidence in litigation.
When a computer is identified as potentially containing electronic evidence, it is imperative to follow a strict set of procedures to ensure an admissible extraction of any potential evidence residing within. The first thing to remember is the “golden rule of electronic evidence” – if within reason, the original media should never be altered or modified in any way. Thus, before any data analysis occurs, it usually makes sense to create an exact, bit-for-bit copy of the original storage media. This process is more commonly known as forensic imaging. A forensic image is also sometimes referred to as a bit stream image, hard drive image, mirror image, disk clone or ghost image. However, in the technology world, mirror imaging, ghost imaging, or disk cloning are each specific backup methods and do not always generate a true forensic image.
A forensic image is an image or exact, sector by sector, copy of a hard disk, taken using software such as Paraben Lockdown/Forensic Replicator or Logicube Forensic Dossier. These software solutions create exact copies of the hard drive, and, unlike the Windows OS, they don’t try to write to drive on startup, thus preserving an exact copy of the hard disk. Deleted files, slack space, system files and executables (and documents renamed to mimic system files and executables) are all part of a forensic image.
originally posted by: Boadicea
originally posted by: Asktheanimals
Omg what a slimeball move that would be.
Giving Podesta immunity for the sake of a sham prosecution.
It really would be a slimeball move.
And if it's true, I'll always believe that Manafort was only prosecuted in order to give such a deal to the Podestas... rightly or wrongly.
originally posted by: Sillyolme
a reply to: Annee
They've been presented with the whole deal numerous times Annie.
They don't accept the truth. They have their own special way of turning their head upside down and crossing their eyes to look at it and that way it only comes out that Hillary Clinton committed some kind of crime.
How would the podesta's know anything about Paul manafort cheating on his taxes 10 and 15 years ago?
originally posted by: The GUT
a reply to: theantediluvian
Did the FBI take a look at them or are they relying on Crowdstrike?