Rosenstein Announces Worthless Indictments

What is going to force the 12 Russians to show up in an American court? But, here’s the part the media won’t report:

The indictment does not allege that Trump campaign associates were involved in the hacking efforts or that any American was knowingly in contact with Russian intelligence officers.

The indictment also does not allege that any vote tallies were altered by hacking.

In other words, the entire Mueller investigation is a farce and has no reason to continue.

More @ Mueller Charges 12 Russians in 2016 Election Hacking of Democrats

"DOJ/Mueller release their indictments against 12 Russians outside the jurisdiction of the US. @ Thread by @Techno_Fog: "DOJ/Mueller release their indictments against 12 Russians outside the jurisdiction of the US. Rosenstein announces no American was involved. […]"
That doesn't show that the Mueller investigation is a farce; the extent of Russian interference was his brief. Whether or not any Americans were involved in it is another piece of it that he has not spoken to yet. The investigation IS NOT COMPLETED.
 
No "hacking" occurred. Digital propaganda campaigns did occur, but many countries participated in that, perhaps this time around Russia may have done more.

There is no evidence whatsoever that a single vote was changed or a single voting system was affected in any way.

Yup. They hacked the DNC servers. The FBI had already told the DNC IT guy that it could happen and he did nothing. What a moron.
And we don't know WHO hacked the DNC servers, because the crooks in the DNC did not allow the FBI to see it, just like Hillary smashed all those cell phones and ipads. We do know that Hillary's IT guy, a Pakistani was arrested trying to flee the country. Somehow THOSE servers also seemed to disappear. Amazing, the criminal behavior the DNC and Hillary got away with.
 
No "hacking" occurred. Digital propaganda campaigns did occur, but many countries participated in that, perhaps this time around Russia may have done more.

There is no evidence whatsoever that a single vote was changed or a single voting system was affected in any way.

Yup. They hacked the DNC servers. The FBI had already told the DNC IT guy that it could happen and he did nothing. What a moron.
And we don't know WHO hacked the DNC servers, because the crooks did not allow the FBI to see it, just like Hillary smashed all those cell phones and ipads. Amazing, the criminal behavior the DNC and Hillary got away with.

Well they couldn't have been to concerned or they would have let the FBI have the servers.

One has to wonder why the FBI didn't cease those servers??
 
No "hacking" occurred. Digital propaganda campaigns did occur, but many countries participated in that, perhaps this time around Russia may have done more.

There is no evidence whatsoever that a single vote was changed or a single voting system was affected in any way.

Yup. They hacked the DNC servers. The FBI had already told the DNC IT guy that it could happen and he did nothing. What a moron.
And we don't know WHO hacked the DNC servers, because the crooks did not allow the FBI to see it, just like Hillary smashed all those cell phones and ipads. Amazing, the criminal behavior the DNC and Hillary got away with.

Well they couldn't have been to concerned or they would have let the FBI have the servers.

One has to wonder why the FBI didn't cease those servers??
Obviously, the DNC must have had many things to HIDE, which is why they refused access to their servers.
 
Hmmm don't see anything there about China trying to hack our election.
No "hacking" occurred. Digital propaganda campaigns did occur, but many countries participated in that, perhaps this time around Russia may have done more.

There is no evidence whatsoever that a single vote was changed or a single voting system was affected in any way.

Yup. They hacked the DNC servers. The FBI had already told the DNC IT guy that it could happen and he did nothing. What a moron.
And we don't know WHO hacked the DNC servers, because the crooks did not allow the FBI to see it, just like Hillary smashed all those cell phones and ipads. Amazing, the criminal behavior the DNC and Hillary got away with.

Well they couldn't have been to concerned or they would have let the FBI have the servers.

One has to wonder why the FBI didn't cease those servers??
Obviously, the DNC must have had many things to HIDE, which is why they refused access to their servers.

LOL Well the Russians revealed a lot of what was on those servers.
 
In fact, the Russians haven't done jack compared to the Chinese, but you won't find any Leftard politician or the media saying shit about it, because they are as crooked as they come, all bought and paid for by the Chinese!

I don't think we'll see any "sanctions" or threats against the Chinese anytime soon....

China hacked a Navy contractor and secured a trove of highly sensitive data on submarine warfare

Hackers in China are conducting covert cyberattacks on the U.S.

Chinese group hacks a Tesla for the second year in a row

Siemens, Trimble, Moody's breached by Chinese hackers, U.S. charges

Chinese hack of Newport Navy contractor is 'very serious,' Reed says

I don't see anything there about China trying to hack our elections.

You do realize this thread is about indictments for hacking in order to attempt to influence the American election in 2016?

Right?
 
Hmmm don't see anything there about China trying to hack our election.
No "hacking" occurred. Digital propaganda campaigns did occur, but many countries participated in that, perhaps this time around Russia may have done more.

There is no evidence whatsoever that a single vote was changed or a single voting system was affected in any way.

Yup. They hacked the DNC servers. The FBI had already told the DNC IT guy that it could happen and he did nothing. What a moron.
And we don't know WHO hacked the DNC servers, because the crooks did not allow the FBI to see it, just like Hillary smashed all those cell phones and ipads. Amazing, the criminal behavior the DNC and Hillary got away with.

Well they couldn't have been to concerned or they would have let the FBI have the servers.

One has to wonder why the FBI didn't cease those servers??
Obviously, the DNC must have had many things to HIDE, which is why they refused access to their servers.

Except of course that is just a Contard lie.

But I find it fascinating about how you Trumpkins want to talk about anything but the Russians and their attempt to hack the election.

What Mueller Knows About the DNC Hack—And Trump Doesn’t

And a close read of it all shows why Trump’s “DNC didn’t give the server to the FBI” conspiracy theory makes no sense.

First off, CrowdStrike, the company the DNC brought in to initially investigate and remediate the hack, actually shared images of the DNC servers with the FBI. For the purposes of an investigation of this type, images are much more useful than handing over metal and hardware, because they are bit-by-bit copies of a crime scene taken while the crime was going on. Live hard drive and memory snapshots of blinking, powered-on machines in a network reveal significantly more forensic data than some powered-off server removed from a network. It’s the difference between watching a house over time, carefully noting down who comes and goes and when and how, versus handing over a key to a lonely boarded-up building. By physically handing over a server to the FBI as Trump suggested, the DNC would in fact have destroyed evidence. (Besides, there wasn’t just one server, but 140.)


An advanced investigation of an advanced hacking operation requires significantly more than just access to servers. Investigators want access to the attack infrastructure—the equivalent to a chain of getaway cars of a team of burglars. And the latest indictments are rich with details that likely come from intercepting command-and-control boxes (in effect, bugging those getaway cars) and have nothing to do with physical access to the DNC’s servers.


The FBI and Robert Mueller’s investigators discovered when and how specific Russian military officers logged into a control panel on a leased machine in Arizona. They found that the GRU officers secretly surveiled an empoyee of the Democratic Congressional Campaign Committee all day in real time, including spying on “her individual banking information and other personal topics.” They showed that “Guccifer 2.0,” the supposed lone hacker behind the DNC hack, was in fact managed by a specific GRU unit, and even reconstructed the internet searches made within that unit while a GRU officer with shoddy English skills was drafting the first post as Guccifer 2.0. None of this information could have possibly come from any DNC server.


With help from the broader intelligence community, the FBI was able to piece all these details together into the bigger picture of the GRU’s vast hacking effort. The complexity of high-tempo, high-volume hacking campaigns means that attackers can make myriad mistakes; Mueller’s latest indictments reveal just how successful American investigators have been at exploiting those repeated errors and uncovering more and more information about what Russia did.


The Russian spies, for example, reused a specific account for a virtual private network (a purportedly secure communication link) to register deceptive internet domains for the DNC hack, as well as to post stolen material online under the Guccifer 2.0 front. Cryptocurrency payments—the kind the Russians used to pay for registering the DCLeaks.com site and their VPN—were neither as anonymous nor as secure as the GRU thought they would be. Third-party platforms including Google, Twitter and the link-shortening service Bitly were convenient and reliable for Russian hackers, but they could also be subpoenaed. Mueller’s team did exactly that, reconstructing how, when and how frequently Russian intelligence officers communicated with WikiLeaks, which they used as an outlet for the stolen material. The Russians weren’t even particularly careful: WikiLeaks and the Russians officers, in a major cock-up, encrypted the hacked emails, but did not encrypt the details of their collaboration. And in using a Bitly account to automate the shortened links sent out to targets of their email-phishing scheme, the GRU left an investigative gold mine: a vast target list of more than 10,000 potential victims’ email addresses.
 
Yes this done before the day Trump is supposed to meet with Putin, partisan hacks..

Yet there is nothing that can be done to them since they are not in the US.

Although did anyone at these "intelligence" agencies look at the DNC server?
 
Fact is, the Chinese, Iranians, and North Koreans have done far worse than the Russians,.

Well if that is a fact- then lay out those facts- tell us all how China, Iran and North Korea have all done worse to attack the American electoral system than the Russians.

Because so far all it seems is that you want to protect Russia from these charges.
Russians unsuccessfully made a futile attempt using digital medium mainly to affect the election.

'unsuccessfully made a futile attempt'- is a double negative- which is pretty funny.

The Russians successfully hacked the DNC and released documents to attempt to influence the election.

Whether that attempt to influence the election was successful or not we will never know.

The Indictment has all of the information and it is very damning- but you Trumpkins seem determined to protect the Russians from all of this.
 
Fact is, the Chinese, Iranians, and North Koreans have done far worse than the Russians,.

Well if that is a fact- then lay out those facts- tell us all how China, Iran and North Korea have all done worse to attack the American electoral system than the Russians.

Because so far all it seems is that you want to protect Russia from these charges.
Russians unsuccessfully made a futile attempt using digital medium mainly to affect the election. The Chinese have done far more damage to our country by hacking into and stealing from all sectors of our economy and military. Like Trump says the Mueller investigation is indeed a witch hunt by butt hurt losers in order to handicap his presidency.

Why do you think that Republicans Mueller and Rosenstein are 'butt hurt losers"?

Still not seeing how China tried to attack our elections- certainly there are ongoing attempts by both countries and private criminals to hack both private and government systems.

But these indictments were for Russians trying to hack our elections.

Why are you so determined to protect Russia from criticism?
 
No "hacking" occurred. Digital propaganda campaigns did occur, but many countries participated in that, perhaps this time around Russia may have done more.

There is no evidence whatsoever that a single vote was changed or a single voting system was affected in any way.

Yup. They hacked the DNC servers. The FBI had already told the DNC IT guy that it could happen and he did nothing. What a moron.
And we don't know WHO hacked the DNC servers, because the crooks did not allow the FBI to see it, just like Hillary smashed all those cell phones and ipads. Amazing, the criminal behavior the DNC and Hillary got away with.

Well they couldn't have been to concerned or they would have let the FBI have the servers.

One has to wonder why the FBI didn't cease those servers??
Obviously, the DNC must have had many things to HIDE, which is why they refused access to their servers.

LOL Well the Russians revealed a lot of what was on those servers.

Certainly the Russians did- specifically they did it to hurt Clinton- and help Trump in the election.
 
Yes this done before the day Trump is supposed to meet with Putin, partisan hacks..

Yet there is nothing that can be done to them since they are not in the US.

Although did anyone at these "intelligence" agencies look at the DNC server?


First off, CrowdStrike, the company the DNC brought in to initially investigate and remediate the hack, actually shared images of the DNC servers with the FBI. For the purposes of an investigation of this type, images are much more useful than handing over metal and hardware, because they are bit-by-bit copies of a crime scene taken while the crime was going on. Live hard drive and memory snapshots of blinking, powered-on machines in a network reveal significantly more forensic data than some powered-off server removed from a network. It’s the difference between watching a house over time, carefully noting down who comes and goes and when and how, versus handing over a key to a lonely boarded-up building. By physically handing over a server to the FBI as Trump suggested, the DNC would in fact have destroyed evidence. (Besides, there wasn’t just one server, but 140.)


An advanced investigation of an advanced hacking operation requires significantly more than just access to servers. Investigators want access to the attack infrastructure—the equivalent to a chain of getaway cars of a team of burglars. And the latest indictments are rich with details that likely come from intercepting command-and-control boxes (in effect, bugging those getaway cars) and have nothing to do with physical access to the DNC’s servers.


The FBI and Robert Mueller’s investigators discovered when and how specific Russian military officers logged into a control panel on a leased machine in Arizona. They found that the GRU officers secretly surveiled an empoyee of the Democratic Congressional Campaign Committee all day in real time, including spying on “her individual banking information and other personal topics.” They showed that “Guccifer 2.0,” the supposed lone hacker behind the DNC hack, was in fact managed by a specific GRU unit, and even reconstructed the internet searches made within that unit while a GRU officer with shoddy English skills was drafting the first post as Guccifer 2.0. None of this information could have possibly come from any DNC server.


With help from the broader intelligence community, the FBI was able to piece all these details together into the bigger picture of the GRU’s vast hacking effort. The complexity of high-tempo, high-volume hacking campaigns means that attackers can make myriad mistakes; Mueller’s latest indictments reveal just how successful American investigators have been at exploiting those repeated errors and uncovering more and more information about what Russia did.


The Russian spies, for example, reused a specific account for a virtual private network (a purportedly secure communication link) to register deceptive internet domains for the DNC hack, as well as to post stolen material online under the Guccifer 2.0 front. Cryptocurrency payments—the kind the Russians used to pay for registering the DCLeaks.com site and their VPN—were neither as anonymous nor as secure as the GRU thought they would be. Third-party platforms including Google, Twitter and the link-shortening service Bitly were convenient and reliable for Russian hackers, but they could also be subpoenaed. Mueller’s team did exactly that, reconstructing how, when and how frequently Russian intelligence officers communicated with WikiLeaks, which they used as an outlet for the stolen material. The Russians weren’t even particularly careful: WikiLeaks and the Russians officers, in a major cock-up, encrypted the hacked emails, but did not encrypt the details of their collaboration. And in using a Bitly account to automate the shortened links sent out to targets of their email-phishing scheme, the GRU left an investigative gold mine: a vast target list of more than 10,000 potential victims’ email addresses.
 
?
Yup. They hacked the DNC servers. The FBI had already told the DNC IT guy that it could happen and he did nothing. What a moron.
And we don't know WHO hacked the DNC servers, because the crooks did not allow the FBI to see it, just like Hillary smashed all those cell phones and ipads. Amazing, the criminal behavior the DNC and Hillary got away with.

Well they couldn't have been to concerned or they would have let the FBI have the servers.

One has to wonder why the FBI didn't cease those servers??
Obviously, the DNC must have had many things to HIDE, which is why they refused access to their servers.

LOL Well the Russians revealed a lot of what was on those servers.

Certainly the Russians did- specifically they did it to hurt Clinton- and help Trump in the election.

Of course they did because Putin hates Hitlery. She tried to interfere with the Russian elections.

You can bet he would have done the same thing no matter who her opponent was.

Oh and you still haven't answered the question. What do you think Trump could have done? He had no power to do anything. He wasn't POTUS. Barry was.
 
What is going to force the 12 Russians to show up in an American court? But, here’s the part the media won’t report:

The indictment does not allege that Trump campaign associates were involved in the hacking efforts or that any American was knowingly in contact with Russian intelligence officers.

The indictment also does not allege that any vote tallies were altered by hacking.

In other words, the entire Mueller investigation is a farce and has no reason to continue.

More @ Mueller Charges 12 Russians in 2016 Election Hacking of Democrats

"DOJ/Mueller release their indictments against 12 Russians outside the jurisdiction of the US. @ Thread by @Techno_Fog: "DOJ/Mueller release their indictments against 12 Russians outside the jurisdiction of the US. Rosenstein announces no American was involved. […]"
are you actually suggesting that these criminals should not be charged with the crimes they committed...that prosecutors should simply sweep them under the rug if they are not citizens and can't be forced to come here for trial?

here's a clue,

it doesn't work that way.....
 
Yes this done before the day Trump is supposed to meet with Putin, partisan hacks..

Yet there is nothing that can be done to them since they are not in the US.

Although did anyone at these "intelligence" agencies look at the DNC server?


First off, CrowdStrike, the company the DNC brought in to initially investigate and remediate the hack, actually shared images of the DNC servers with the FBI. For the purposes of an investigation of this type, images are much more useful than handing over metal and hardware, because they are bit-by-bit copies of a crime scene taken while the crime was going on. Live hard drive and memory snapshots of blinking, powered-on machines in a network reveal significantly more forensic data than some powered-off server removed from a network. It’s the difference between watching a house over time, carefully noting down who comes and goes and when and how, versus handing over a key to a lonely boarded-up building. By physically handing over a server to the FBI as Trump suggested, the DNC would in fact have destroyed evidence. (Besides, there wasn’t just one server, but 140.)


An advanced investigation of an advanced hacking operation requires significantly more than just access to servers. Investigators want access to the attack infrastructure—the equivalent to a chain of getaway cars of a team of burglars. And the latest indictments are rich with details that likely come from intercepting command-and-control boxes (in effect, bugging those getaway cars) and have nothing to do with physical access to the DNC’s servers.


The FBI and Robert Mueller’s investigators discovered when and how specific Russian military officers logged into a control panel on a leased machine in Arizona. They found that the GRU officers secretly surveiled an empoyee of the Democratic Congressional Campaign Committee all day in real time, including spying on “her individual banking information and other personal topics.” They showed that “Guccifer 2.0,” the supposed lone hacker behind the DNC hack, was in fact managed by a specific GRU unit, and even reconstructed the internet searches made within that unit while a GRU officer with shoddy English skills was drafting the first post as Guccifer 2.0. None of this information could have possibly come from any DNC server.


With help from the broader intelligence community, the FBI was able to piece all these details together into the bigger picture of the GRU’s vast hacking effort. The complexity of high-tempo, high-volume hacking campaigns means that attackers can make myriad mistakes; Mueller’s latest indictments reveal just how successful American investigators have been at exploiting those repeated errors and uncovering more and more information about what Russia did.


The Russian spies, for example, reused a specific account for a virtual private network (a purportedly secure communication link) to register deceptive internet domains for the DNC hack, as well as to post stolen material online under the Guccifer 2.0 front. Cryptocurrency payments—the kind the Russians used to pay for registering the DCLeaks.com site and their VPN—were neither as anonymous nor as secure as the GRU thought they would be. Third-party platforms including Google, Twitter and the link-shortening service Bitly were convenient and reliable for Russian hackers, but they could also be subpoenaed. Mueller’s team did exactly that, reconstructing how, when and how frequently Russian intelligence officers communicated with WikiLeaks, which they used as an outlet for the stolen material. The Russians weren’t even particularly careful: WikiLeaks and the Russians officers, in a major cock-up, encrypted the hacked emails, but did not encrypt the details of their collaboration. And in using a Bitly account to automate the shortened links sent out to targets of their email-phishing scheme, the GRU left an investigative gold mine: a vast target list of more than 10,000 potential victims’ email addresses.

See far left drone troll can not do anything except cite far left religious dogma.

Just a cut and paste that explains nothing other than the fact that Hilary should be in jail..

Yes this should have come out long ago, but they waited toil the day before Trump meets with Putin, it is partisan in nature.

Just like now the far left wants to know what Trump discussed with Putin, yet did not care about anything Obama or his Justice department did and said on a tarmac..
 
?
And we don't know WHO hacked the DNC servers, because the crooks did not allow the FBI to see it, just like Hillary smashed all those cell phones and ipads. Amazing, the criminal behavior the DNC and Hillary got away with.

Well they couldn't have been to concerned or they would have let the FBI have the servers.

One has to wonder why the FBI didn't cease those servers??
Obviously, the DNC must have had many things to HIDE, which is why they refused access to their servers.

LOL Well the Russians revealed a lot of what was on those servers.

Certainly the Russians did- specifically they did it to hurt Clinton- and help Trump in the election.

Of course they did because Putin hates Hitlery. She tried to interfere with the Russian elections.

You can bet he would have done the same thing no matter who her opponent was.

Oh and you still haven't answered the question. What do you thing Trump could have done? He had no power to do anything. He wasn't POTUS. Barry was.

The far left does not want to admit that Hilary is worse than Trump.

They did not care when Obama allowed Putin to expand his influence in the world.

Yet they blame Trump for what Obama would not do!
 
Yes this done before the day Trump is supposed to meet with Putin, partisan hacks..

Yet there is nothing that can be done to them since they are not in the US.

Although did anyone at these "intelligence" agencies look at the DNC server?


First off, CrowdStrike, the company the DNC brought in to initially investigate and remediate the hack, actually shared images of the DNC servers with the FBI. For the purposes of an investigation of this type, images are much more useful than handing over metal and hardware, because they are bit-by-bit copies of a crime scene taken while the crime was going on. Live hard drive and memory snapshots of blinking, powered-on machines in a network reveal significantly more forensic data than some powered-off server removed from a network. It’s the difference between watching a house over time, carefully noting down who comes and goes and when and how, versus handing over a key to a lonely boarded-up building. By physically handing over a server to the FBI as Trump suggested, the DNC would in fact have destroyed evidence. (Besides, there wasn’t just one server, but 140.)


An advanced investigation of an advanced hacking operation requires significantly more than just access to servers. Investigators want access to the attack infrastructure—the equivalent to a chain of getaway cars of a team of burglars. And the latest indictments are rich with details that likely come from intercepting command-and-control boxes (in effect, bugging those getaway cars) and have nothing to do with physical access to the DNC’s servers.


The FBI and Robert Mueller’s investigators discovered when and how specific Russian military officers logged into a control panel on a leased machine in Arizona. They found that the GRU officers secretly surveiled an empoyee of the Democratic Congressional Campaign Committee all day in real time, including spying on “her individual banking information and other personal topics.” They showed that “Guccifer 2.0,” the supposed lone hacker behind the DNC hack, was in fact managed by a specific GRU unit, and even reconstructed the internet searches made within that unit while a GRU officer with shoddy English skills was drafting the first post as Guccifer 2.0. None of this information could have possibly come from any DNC server.


With help from the broader intelligence community, the FBI was able to piece all these details together into the bigger picture of the GRU’s vast hacking effort. The complexity of high-tempo, high-volume hacking campaigns means that attackers can make myriad mistakes; Mueller’s latest indictments reveal just how successful American investigators have been at exploiting those repeated errors and uncovering more and more information about what Russia did.


The Russian spies, for example, reused a specific account for a virtual private network (a purportedly secure communication link) to register deceptive internet domains for the DNC hack, as well as to post stolen material online under the Guccifer 2.0 front. Cryptocurrency payments—the kind the Russians used to pay for registering the DCLeaks.com site and their VPN—were neither as anonymous nor as secure as the GRU thought they would be. Third-party platforms including Google, Twitter and the link-shortening service Bitly were convenient and reliable for Russian hackers, but they could also be subpoenaed. Mueller’s team did exactly that, reconstructing how, when and how frequently Russian intelligence officers communicated with WikiLeaks, which they used as an outlet for the stolen material. The Russians weren’t even particularly careful: WikiLeaks and the Russians officers, in a major cock-up, encrypted the hacked emails, but did not encrypt the details of their collaboration. And in using a Bitly account to automate the shortened links sent out to targets of their email-phishing scheme, the GRU left an investigative gold mine: a vast target list of more than 10,000 potential victims’ email addresses.
and making the mirror copy allows more than one agent or cyber expert, to work on these discoveries at the same time!
 
Yes this done before the day Trump is supposed to meet with Putin, partisan hacks..

Yet there is nothing that can be done to them since they are not in the US.

Although did anyone at these "intelligence" agencies look at the DNC server?


First off, CrowdStrike, the company the DNC brought in to initially investigate and remediate the hack, actually shared images of the DNC servers with the FBI. For the purposes of an investigation of this type, images are much more useful than handing over metal and hardware, because they are bit-by-bit copies of a crime scene taken while the crime was going on. Live hard drive and memory snapshots of blinking, powered-on machines in a network reveal significantly more forensic data than some powered-off server removed from a network. It’s the difference between watching a house over time, carefully noting down who comes and goes and when and how, versus handing over a key to a lonely boarded-up building. By physically handing over a server to the FBI as Trump suggested, the DNC would in fact have destroyed evidence. (Besides, there wasn’t just one server, but 140.)


An advanced investigation of an advanced hacking operation requires significantly more than just access to servers. Investigators want access to the attack infrastructure—the equivalent to a chain of getaway cars of a team of burglars. And the latest indictments are rich with details that likely come from intercepting command-and-control boxes (in effect, bugging those getaway cars) and have nothing to do with physical access to the DNC’s servers.


The FBI and Robert Mueller’s investigators discovered when and how specific Russian military officers logged into a control panel on a leased machine in Arizona. They found that the GRU officers secretly surveiled an empoyee of the Democratic Congressional Campaign Committee all day in real time, including spying on “her individual banking information and other personal topics.” They showed that “Guccifer 2.0,” the supposed lone hacker behind the DNC hack, was in fact managed by a specific GRU unit, and even reconstructed the internet searches made within that unit while a GRU officer with shoddy English skills was drafting the first post as Guccifer 2.0. None of this information could have possibly come from any DNC server.


With help from the broader intelligence community, the FBI was able to piece all these details together into the bigger picture of the GRU’s vast hacking effort. The complexity of high-tempo, high-volume hacking campaigns means that attackers can make myriad mistakes; Mueller’s latest indictments reveal just how successful American investigators have been at exploiting those repeated errors and uncovering more and more information about what Russia did.


The Russian spies, for example, reused a specific account for a virtual private network (a purportedly secure communication link) to register deceptive internet domains for the DNC hack, as well as to post stolen material online under the Guccifer 2.0 front. Cryptocurrency payments—the kind the Russians used to pay for registering the DCLeaks.com site and their VPN—were neither as anonymous nor as secure as the GRU thought they would be. Third-party platforms including Google, Twitter and the link-shortening service Bitly were convenient and reliable for Russian hackers, but they could also be subpoenaed. Mueller’s team did exactly that, reconstructing how, when and how frequently Russian intelligence officers communicated with WikiLeaks, which they used as an outlet for the stolen material. The Russians weren’t even particularly careful: WikiLeaks and the Russians officers, in a major cock-up, encrypted the hacked emails, but did not encrypt the details of their collaboration. And in using a Bitly account to automate the shortened links sent out to targets of their email-phishing scheme, the GRU left an investigative gold mine: a vast target list of more than 10,000 potential victims’ email addresses.
and making the mirror copy allows more than one agent or cyber expert, to work on these discoveries at the same time!

Yet we are supposed to believe it was the Russians, even when the DNC would not turn over their servers.

It is still speculation, based on a debunked narrative.

The far left just needs to admit that Hilary is worse than Trump and move on..
 
Yes this done before the day Trump is supposed to meet with Putin, partisan hacks..

Yet there is nothing that can be done to them since they are not in the US.

Although did anyone at these "intelligence" agencies look at the DNC server?


First off, CrowdStrike, the company the DNC brought in to initially investigate and remediate the hack, actually shared images of the DNC servers with the FBI. For the purposes of an investigation of this type, images are much more useful than handing over metal and hardware, because they are bit-by-bit copies of a crime scene taken while the crime was going on. Live hard drive and memory snapshots of blinking, powered-on machines in a network reveal significantly more forensic data than some powered-off server removed from a network. It’s the difference between watching a house over time, carefully noting down who comes and goes and when and how, versus handing over a key to a lonely boarded-up building. By physically handing over a server to the FBI as Trump suggested, the DNC would in fact have destroyed evidence. (Besides, there wasn’t just one server, but 140.)


An advanced investigation of an advanced hacking operation requires significantly more than just access to servers. Investigators want access to the attack infrastructure—the equivalent to a chain of getaway cars of a team of burglars. And the latest indictments are rich with details that likely come from intercepting command-and-control boxes (in effect, bugging those getaway cars) and have nothing to do with physical access to the DNC’s servers.


The FBI and Robert Mueller’s investigators discovered when and how specific Russian military officers logged into a control panel on a leased machine in Arizona. They found that the GRU officers secretly surveiled an empoyee of the Democratic Congressional Campaign Committee all day in real time, including spying on “her individual banking information and other personal topics.” They showed that “Guccifer 2.0,” the supposed lone hacker behind the DNC hack, was in fact managed by a specific GRU unit, and even reconstructed the internet searches made within that unit while a GRU officer with shoddy English skills was drafting the first post as Guccifer 2.0. None of this information could have possibly come from any DNC server.


With help from the broader intelligence community, the FBI was able to piece all these details together into the bigger picture of the GRU’s vast hacking effort. The complexity of high-tempo, high-volume hacking campaigns means that attackers can make myriad mistakes; Mueller’s latest indictments reveal just how successful American investigators have been at exploiting those repeated errors and uncovering more and more information about what Russia did.


The Russian spies, for example, reused a specific account for a virtual private network (a purportedly secure communication link) to register deceptive internet domains for the DNC hack, as well as to post stolen material online under the Guccifer 2.0 front. Cryptocurrency payments—the kind the Russians used to pay for registering the DCLeaks.com site and their VPN—were neither as anonymous nor as secure as the GRU thought they would be. Third-party platforms including Google, Twitter and the link-shortening service Bitly were convenient and reliable for Russian hackers, but they could also be subpoenaed. Mueller’s team did exactly that, reconstructing how, when and how frequently Russian intelligence officers communicated with WikiLeaks, which they used as an outlet for the stolen material. The Russians weren’t even particularly careful: WikiLeaks and the Russians officers, in a major cock-up, encrypted the hacked emails, but did not encrypt the details of their collaboration. And in using a Bitly account to automate the shortened links sent out to targets of their email-phishing scheme, the GRU left an investigative gold mine: a vast target list of more than 10,000 potential victims’ email addresses.
and making the mirror copy allows more than one agent or cyber expert, to work on these discoveries at the same time!

Yet we are supposed to believe it was the Russians, even when the DNC would not turn over their servers..

YOU are supposed to believe whatever Don the Con tells you to believe.

I don't expect you to ever believe anything more complicated than that.
 
?
Well they couldn't have been to concerned or they would have let the FBI have the servers.

One has to wonder why the FBI didn't cease those servers??
Obviously, the DNC must have had many things to HIDE, which is why they refused access to their servers.

LOL Well the Russians revealed a lot of what was on those servers.

Certainly the Russians did- specifically they did it to hurt Clinton- and help Trump in the election.

Of course they did because Putin hates Hitlery. She tried to interfere with the Russian elections.

You can bet he would have done the same thing no matter who her opponent was.

Oh and you still haven't answered the question. What do you thing Trump could have done? He had no power to do anything. He wasn't POTUS. Barry was.

The far left does not want to admit that Hilary is worse than Trump.

They did not care when Obama allowed Putin to expand his influence in the world.

Yet they blame Trump for what Obama would not do!

The far right only wants to blame Obama and Clinton- whenever Don the Con inevitably kow tows to another dictator.
 

Forum List

Back
Top