It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Grambler
a reply to: introvert
Sure the media is just reporting the news. Like the Russia pee story. Oh and lets not forget the dreaded two scoops of ice cream story.
Just the hard news from the media!
originally posted by: introvert
a reply to: proximo
Yes, I know the conspiratorial side of the issue. We have to wait for facts to be presented before we come to any cnclusion.
If you wish to go with the conspiracy aspect, that's fine.
I'm fine with waiting it out before I invest too much in to this.
originally posted by: introvert
originally posted by: Grambler
a reply to: introvert
Sure the media is just reporting the news. Like the Russia pee story. Oh and lets not forget the dreaded two scoops of ice cream story.
Just the hard news from the media!
Yes, reporting real news stories that they did not create out of thin air.
I agree that some of the stories may be trivial or even ridiculous, but that's nothing new and Trump is not the first president to have to deal with it.
Thats not what the fbi has said.
And seeing as how the Democrats and many others hav portrayed this Russian hacking story as one of the biggest threats to our country, whatever they were hiding must have been damning then.
And why won't the Dems now leave the FBI look at their server if the problems was they just weren't asked? Don't you think they would want to get to the bottom of this?
The FBI requested direct access to the Democratic National Committee’s (DNC) hacked computer servers but was denied, Director James Comey told lawmakers on Tuesday.
The bureau made “multiple requests at different levels,” according to Comey, but ultimately struck an agreement with the DNC that a “highly respected private company” would get access and share what it found with investigators.
“We’d always prefer to have access hands-on ourselves if that’s possible,” Comey said, noting that he didn’t know why the DNC rebuffed the FBI’s request.
Do you disagree with the 7 problems i quoted from the article about the ICA, or with the Intercepts comment that crowdstrike both touts the shrewdness of the Russian hackers while at the same time acknowledging that they know it was them because they were extremely sloppy?
The forensic evidence linking the DNC breach to known Russian operations is very strong.
The evidence linking the Guccifer 2.0 account to the same Russian operators is not as solid, yet a deception operation—a GRU false flag, in technical jargon—is still highly likely. Intelligence operatives and cybersecurity professionals long knew that such false flags were becoming more common. One noteworthy example was the sabotage of France's TV5 Monde station on 9/10 April 2015, initially claimed by the mysterious "CyberCaliphate," a group allegedly linked to ISIS. Then, in June, the French authorities suspected the same infamous APT 28 group behind the TV5 Monde breach, in preparation since January of that year. But the DNC deception is the most detailed and most significant case study so far. The technical details are as remarkable as its strategic context.
Other features are also suspicious. One is timing, as ThreatConnect, another security company, has pointed out in a useful analysis: various timestamps indicate that the Guccifer-branded leaking operation was prompted by the DNC's initial publicity, with preparation starting around 24 hours after CrowdStrike's report came out. Both APT 28 and Guccifer were using French infrastructure for communications. ThreatConnect then pointed out that both the self-proclaimed hacker's technical statements on the use of 0-day exploits as well as the alleged timeline of the DNC breach are most likely false. Another odd circumstantial finding: sock-puppet social media accounts may have been created specifically to amplify and extend Guccifer's reach, as UK intelligence startup Ripjar told me.
The forensic evidence linking the DNC breach to known Russian operations is very strong. On June 20, two competing cybersecurity companies, Mandiant (part of FireEye) and Fidelis, confirmed CrowdStrike's initial findings that Russian intelligence indeed hacked the DNC. The forensic evidence that links network breaches to known groups is solid: used and reused tools, methods, infrastructure, even unique encryption keys. For example: in late March the attackers registered a domain with a typo—misdepatrment[.]com—to look suspiciously like the company hired by the DNC to manage its network, MIS Department. They then linked this deceptive domain to a long-known APT 28 so-called X-Tunnel command-and-control IP address, 45.32.129[.]185.
One of the strongest pieces of evidence linking GRU to the DNC hack is the equivalent of identical fingerprints found in two burglarized buildings: a reused command-and-control address—176.31.112[.]10—that was hard coded in a piece of malware found both in the German parliament as well as on the DNC's servers. Russian military intelligence was identified by the German domestic security agency BfV as the actor responsible for the Bundestag breach. The infrastructure behind the fake MIS Department domain was also linked to the Berlin intrusion through at least one other element, a shared SSL certificate.
WASHINGTON — When Special Agent Adrian Hawkins of the Federal Bureau of Investigation called the Democratic National Committee in September 2015 to pass along some troubling news about its computer network, he was transferred, naturally, to the help desk. His message was brief, if alarming. At least one computer system belonging to the D.N.C. had been compromised by hackers federal investigators had named “the Dukes,” a cyberespionage team linked to the Russian government.
The F.B.I. knew it well: The bureau had spent the last few years trying to kick the Dukes out of the unclassified email systems of the White House, the State Department and even the Joint Chiefs of Staff, one of the government’s best-protected networks.
Yared Tamene, the tech-support contractor at the D.N.C. who fielded the call, was no expert in cyberattacks. His first moves were to check Google for “the Dukes” and conduct a cursory search of the D.N.C. computer system logs to look for hints of such a cyberintrusion. By his own account, he did not look too hard even after Special Agent Hawkins called back repeatedly over the next several weeks — in part because he wasn’t certain the caller was a real F.B.I. agent and not an impostor.
Ironically, evidence of this happening can be found in the hacked DNC emails published by WikiLeaks. In the DNC emails archive, refer to the email with id 3962. Here's the text of the email which was forwarded to by Miranda to Mark Paustenbach:
From: Chalupa, Ali
Sent: Tuesday, May 03, 2016 11:56 PM
To: Miranda, Luis
Subject: Re: You saw this, right?
A lot more coming down the pipe. I spoke to a delegation of 68 investigative journalists from Ukraine last Wednesday at the Library of Congress - the Open World Society's forum - they put me on the program to speak specifically about Paul Manafort and I invited Michael Isikoff whom I've been working with for the past few weeks and connected him to the Ukrainians. More offline tomorrow since there is a big Trump component you and Lauren need to be aware of that will hit in next few weeks and something I'm working on you should be aware of. Since I started digging into Manafort these messages have been a daily occurrence on my yahoo account despite changing my password often:
A lawyer for the Rich family sent a cease and desist letter Thursday to Rod Wheeler, a private investigator and Fox News contributor who had been working on behalf of the family.
"Anyone who continues to push this fake news story after it was so thoroughly debunked is proving to the world they have a transparent political agenda or are a sociopath," Brad Bauman, the family spokesperson, wrote in a statement. "In either case, they should be taken off the air because they are either blind to the damage they are doing to a murder victim's family or don't care, showing a profound lack of judgement and common decency."
The article in the inetrcept is saying that Crowdstrike praised the hackers as being very shrewd, yet claims they caught them because of things such as signatures they left in. Here is what your motherboard article states.
Compare that description to CrowdStrike’s claim it was able to finger APT 28 and 29, described above as digital spies par excellence, because they were so incredibly sloppy. Would a group whose “tradecraft is superb” with “operational security second to none” really leave behind the name of a Soviet spy chief imprinted on a document it sent to American journalists?
The metadata in the leaked documents are perhaps most revealing: one dumped document was modified using Russian language settings, by a user named "Феликс Эдмундович," a code name referring to the founder of the Soviet Secret Police, the Cheka, memorialised in a 15-ton iron statue in front of the old KGB headquarters during Soviet times.
Its been covered. They also put out a video thanking people online for helping getting to the bottom of this investigation.
originally posted by: Grambler
a reply to: GD21D
Its been covered. They also put out a video thanking people online for helping getting to the bottom of this investigation.
His cousin also reportedly said right after the murder that he felt it was more than a simple robbery.
But kudos for trying to stop any questions or discussions!
"Anyone who continues to push this fake news story after it was so thoroughly debunked is proving to the world they have a transparent political agenda or are a sociopath," Brad Bauman, the family spokesperson, wrote in a statement. "In either case, they should be taken off the air because they are either blind to the damage they are doing to a murder victim's family or don't care, showing a profound lack of judgement and common decency."
The evidence linking the Guccifer 2.0 account to the same Russian operators is not as solid, yet a deception operation—a GRU false flag, in technical jargon—is still highly likely. Intelligence operatives and cybersecurity professionals long knew that such false flags were becoming more common. One noteworthy example was the sabotage of France's TV5 Monde station on 9/10 April 2015, initially claimed by the mysterious "CyberCaliphate," a group allegedly linked to ISIS. Then, in June, the French authorities suspected the same infamous APT 28 group behind the TV5 Monde breach, in preparation since January of that year. But the DNC deception is the most detailed and most significant case study so far. The technical details are as remarkable as its strategic context.
The metadata in the leaked documents are perhaps most revealing: one dumped document was modified using Russian language settings, by a user named "Феликс Эдмундович," a code name referring to the founder of the Soviet Secret Police, the Cheka, memorialised in a 15-ton iron statue in front of the old KGB headquarters during Soviet times. The original intruders made other errors: one leaked document included hyperlink error messages in Cyrillic, the result of editing the file on a computer with Russian language settings. After this mistake became public, the intruders removed the Cyrillic information from the metadata in the next dump and carefully used made-up user names from different world regions, thereby confirming they had made a mistake in the first round.
Then there is the language issue. "I hate being attributed to Russia," the Guccifer 2.0 account told Motherboard, probably accurately. The person at the keyboard then claimed in a chat with Motherboard's Lorenzo Franceschi-Bicchierai that Guccifer 2.0 was from Romania, like the original Guccifer, a well-known hacker. But when asked to explain his hack in Romanian, he was unable to respond colloquially and without errors. Guccifer 2.0's English initially was also weak, but in subsequent posts the quality improved sharply, albeit only on political subjects, not in technical matters—an indication of a team of operators at work behind the scenes.
...
The combative yet error-prone handling of the Guccifer account is in line with the GRU's aggressive and risk-taking organizational culture and a wartime mindset prevalent in the Russian intelligence community. Russia's agencies see themselves as instruments of direct action, working in support of a fragile Russia under siege by the West, especially the United States.
UPDATE: Former DNC director of Data Science Andrew Therriault shot off a tweet posthumously mocking Seth Rich - referring to him as "An Embarrasment." Clearly he knew this was Rich's account. Therriault deleted the tweet today, but the internet never forgets...
originally posted by: theantediluvian
a reply to: Grambler
Another meme that has been deliberately spread has to do with a Tweet that is being mischaracterized as referring to Seth Rich as an embarassment.
Here's an example from Zero Hedge
UPDATE: Former DNC director of Data Science Andrew Therriault shot off a tweet posthumously mocking Seth Rich - referring to him as "An Embarrasment." Clearly he knew this was Rich's account. Therriault deleted the tweet today, but the internet never forgets...
What was retweeted to the account which is alleged to be Seth Rich's was a tweet that said:
"TIL: A group of Pandas is called an "Embarassment" #pandafacts"
Somehow this becomes not only proof that "Clearly he knew this was Rich's account" but furthermore, that it was "mocking" Seth Rich posthumously.
As it turns out, an "embarassment of pandas" is actually one of the ways to refer to a group of pandas. It is indeed a fun fact about pandas. The sort of thing you might tweet to somebody who loves pandas. If that was Seth Rich's account, Therriault knew that it was, Seth Rich was murdered by the DNC and Therriault had some knowledge of this — why in the hell would he tweet a "mocking" tweet to him in April?
Does that make sense? No, it doesn't make sense unless you assume that Therriault is bats# insane and trying to implicate himself by tweeting to a dead man. Yet, that's more "proof" for the true believers.
I'm a little burned out on this topic for the day. We'll see what happens with KDC tomorrow but I will go on record as saying that the chances of KDC releasing a bombshell that conclusively proves Seth Rich was the source of the emails leaked by WikiLekas is next to nil in my opinion.
Please explain to me how Seth rich is more of a conspiracy than Russia collusion.
originally posted by: introvert
a reply to: proximo
Please explain to me how Seth rich is more of a conspiracy than Russia collusion.
Because you do not have an entire nation's IC community not only saying Russia may be involved, but they are currently investigating other Russian connections.
Seth Rich...nothing more than some people suggesting some things, being reported and then retracted.
The hatred of the media towards trump is unprecedented, as even liberal such as Glenn Greenwald agree.