CIA Concludes Russia Interfered In Election To Help Trump Win

Likely never because I don't think they have any hard evidence, they just have assumptions and presumptions based on their personal opinions and analysis of the information taken.

They're basically saying (with the information they've provided us) that no random black hacker on the planet would take X government intel to sell, no, it had to be a foreign government with "x" opinioned goal. thus why everyone is skeptical.
 
I dont think I agree with that 100%
lets put the same basic concept to work in your or anyone elses live at a personal level.
Lets say someone comes home from work one day expecting to have the kids run up and greet them, give hugs, they are expecting like every other day to smell dinner cooking, and to have their wife come out of the kitchen to give them a hug and ask how their day was. But one day what they walk into is a murder scene, wife and kids are dead. blood everywhere.
no leads as far as who did it.
then a few months later, someone hacked the next door neighbors computer and came across picture and or video of them committing the murders.
Now lets say this neighbor is running for some public office. Would you rather the video and photos be hidden or do you think that its more important for this evidence to be made public.
As far as how I would feel about this if the Republicans were the ones being hacked. it would be the same in my eyes. Knowing what they had done would be very important when it came to deciding who to trust in office.
I dont like the idea or practice of hacking, however I do think that it is important that information about misconduct is made public.
The whole idea behind making this about Russia trying to sway the vote with the information is in my opinion, nothing more that a way for the left to try and get peoples minds off of what Hillary had done. The outrage over the hacking is nothing more than an attempt at damage control.
All good points. There are, indeed, two things going on here; exposing corruption, lies, cronyism, etc in government and a hostile act by Russia.

I have no problem with exposing corruption and will applaud the release of Republican emails and papers like I did the Democrats. OTOH, if a gang-banger takes a shot at me or my family and misses, just because they missed doesn't mean all is forgiven. Time will tell how President Trump acts as opposed to businessman Trump regardless if it's the Russians, Chinese or anyone else. When he does confront Putin, and I expect he will, we'll see how the Republicans react to the consequences of Wikileaks suddenly releasing all the evidence of Republican corruption, lies and cronyism.
 
I dont think I agree with that 100%
lets put the same basic concept to work in your or anyone elses live at a personal level.
Lets say someone comes home from work one day expecting to have the kids run up and greet them, give hugs, they are expecting like every other day to smell dinner cooking, and to have their wife come out of the kitchen to give them a hug and ask how their day was. But one day what they walk into is a murder scene, wife and kids are dead. blood everywhere.
no leads as far as who did it.
then a few months later, someone hacked the next door neighbors computer and came across picture and or video of them committing the murders.
Now lets say this neighbor is running for some public office. Would you rather the video and photos be hidden or do you think that its more important for this evidence to be made public.
As far as how I would feel about this if the Republicans were the ones being hacked. it would be the same in my eyes. Knowing what they had done would be very important when it came to deciding who to trust in office.
I dont like the idea or practice of hacking, however I do think that it is important that information about misconduct is made public.
The whole idea behind making this about Russia trying to sway the vote with the information is in my opinion, nothing more that a way for the left to try and get peoples minds off of what Hillary had done. The outrage over the hacking is nothing more than an attempt at damage control.
All good points. There are, indeed, two things going on here; exposing corruption, lies, cronyism, etc in government and a hostile act by Russia.

I have no problem with exposing corruption and will applaud the release of Republican emails and papers like I did the Democrats. OTOH, if a gang-banger takes a shot at me or my family and misses, just because they missed doesn't mean all is forgiven. Time will tell how President Trump acts as opposed to businessman Trump regardless if it's the Russians, Chinese or anyone else. When he does confront Putin, and I expect he will, we'll see how the Republicans react to the consequences of Wikileaks suddenly releasing all the evidence of Republican corruption, lies and cronyism.
When it comes to how Trump works with Russia, I would hope that he does so with open arms for a change. We have been through the cold war era, what did we get from it? I grew up in the 60s, I know how to hide under a school desk to survive a nuclear attack, They dont teach these life saving techniques to kids anymore. But, honestly what we did get from it was a proliferation of nuclear warheads on both sides as we played the we have more game with them. It didnt work.
Working together and not trying to change the way the other country governs themselves, Might have an opposite effect. maybe after enough trust is built we could get rid of the warheads and start working on a joint effort for the exploration of space? Maybe I can finally get rid of that school desk I have because I wont fear a nuclear attack?
Maybe and this is a stretch, but maybe other countries will see to countries put differences aside and start working with each other for things that are beneficial and they start doing the same? Even those "terrorist" nations might decide to put down their weapons and step in on the space programs, After all, if man goes into space, it is only right that we bring Allah along with us right?
personally, I think that a working relationship with Russia would be a great benefit to the entire world. If the two big hoarders of nuclear weapons back down, maybe the smaller nations will decide to do the same.
We have tried for many years to keep Russia as our enemy and we gained nothing from it. Working with them could only bring a more peaceful solution to many of the worlds problems.
As the two biggest and most feared countries, I think it is our responsibility to lead by example.
or, Im wrong and we get fucked.
 
.....I grew up in the 60s, I know how to hide under a school desk to survive a nuclear attack, They dont teach these life saving techniques to kids anymore. But, honestly what we did get from it was a proliferation of nuclear warheads on both sides as we played the we have more game with them. It didnt work.
Working together and not trying to change the way the other country governs themselves, Might have an opposite effect. maybe after enough trust is built we could get rid of the warheads and start working on a joint effort for the exploration of space? Maybe I can finally get rid of that school desk I have because I wont fear a nuclear attack?
Maybe and this is a stretch, but maybe other countries will see to countries put differences aside and start working with each other for things that are beneficial and they start doing the same? Even those "terrorist" nations might decide to put down their weapons and step in on the space programs, After all, if man goes into space, it is only right that we bring Allah along with us right?
personally, I think that a working relationship with Russia would be a great benefit to the entire world. If the two big hoarders of nuclear weapons back down, maybe the smaller nations will decide to do the same.
We have tried for many years to keep Russia as our enemy and we gained nothing from it. Working with them could only bring a more peaceful solution to many of the worlds problems.
As the two biggest and most feared countries, I think it is our responsibility to lead by example.
or, Im wrong and we get fucked.
I grew up in the 60s too. I remember all the hippies singing "Kumbaya" and "Give peace a chance". I remember them saying "Make peace, not war" and advising that if we just laid down our weapons and welcomed the Soviets, Chinese and VC with "open arms" they would do the same.

Sorry, but the real world doesn't work that way. The real world works like Roman military expert Vegetius wrote: "If you want peace, prepare for war".

A more modern and similar version is from General Mattis: "I come in peace. I didn’t bring artillery. But I’m pleading with you, with tears in my eyes: If you **** with me, I’ll kill you all."

We should be willing to discuss peace, but we should also be ready to fight to defend ourselves against aggressors.
 
A Trojan horse virus. Alas, it's not so simple. Even /if/ we could piggy back a modified code to existing malware, the chances of them running their own malware on their systems is about nill. If someone creates a malware that has a feedback to them, they don't even run it, they just go retrieve the data dump (which in itself is very likely to be a cloaked end point that's bounced 6 ways to Tuesday.) There is almost no limit to how many IP bounces you want to make out there. Hell I have to go through like 10 just to get to Google...

PS you can try it yourself: start -> run -> type "cmd" (no quotes) -> hit enter -> type in "ping google.com" (without quotes, and you can do any site you want) -> hit enter

I don't mean pigging backing their code. That would be even more difficult, yes.

I send out the phishing attack. You click a link and install the malware.

The entire point of their malware is to allow me, to access your computer, and get your files.

My plan...... you replace your files with.... malware.

I would never expect that your files are all malware. And the entire point of me getting your files is to open them and examine the information.

So I get your files and documents, and yes I bounce it off a hundred IPs in the end, I have to open that document on my computer and look at it, to see whatever is in your documents.

Well there you go. They open the document, it installs our malware. We don't need to conceal anything, or do any routing. All we need our malware to do, is give us the user information, and it's location, and send that back to the CIA or DOD. I would guess that the malware package could be pretty small.

Additionally, have the malware self delete after sending the ID markers back to the CIA, to avoid the source knowing we were there.

I think it could work. The trick is to get the files onto the computer, after the malware was installed, but before they access and download the files.

But even that should be easy. The phishing attack comes via Email, looking like an alert from Google. Locate a computer that just got an email, but don't open it yet. Remove sensitive documents, install Trojan horse documents. Then open the mail, and let it go.

Come on, this is so obvious. I can't be the only guy to come up with this.
 
I dont think I agree with that 100%
lets put the same basic concept to work in your or anyone elses live at a personal level.
Lets say someone comes home from work one day expecting to have the kids run up and greet them, give hugs, they are expecting like every other day to smell dinner cooking, and to have their wife come out of the kitchen to give them a hug and ask how their day was. But one day what they walk into is a murder scene, wife and kids are dead. blood everywhere.
no leads as far as who did it.
then a few months later, someone hacked the next door neighbors computer and came across picture and or video of them committing the murders.
Now lets say this neighbor is running for some public office. Would you rather the video and photos be hidden or do you think that its more important for this evidence to be made public.
As far as how I would feel about this if the Republicans were the ones being hacked. it would be the same in my eyes. Knowing what they had done would be very important when it came to deciding who to trust in office.
I dont like the idea or practice of hacking, however I do think that it is important that information about misconduct is made public.
The whole idea behind making this about Russia trying to sway the vote with the information is in my opinion, nothing more that a way for the left to try and get peoples minds off of what Hillary had done. The outrage over the hacking is nothing more than an attempt at damage control.
All good points. There are, indeed, two things going on here; exposing corruption, lies, cronyism, etc in government and a hostile act by Russia.

I have no problem with exposing corruption and will applaud the release of Republican emails and papers like I did the Democrats. OTOH, if a gang-banger takes a shot at me or my family and misses, just because they missed doesn't mean all is forgiven. Time will tell how President Trump acts as opposed to businessman Trump regardless if it's the Russians, Chinese or anyone else. When he does confront Putin, and I expect he will, we'll see how the Republicans react to the consequences of Wikileaks suddenly releasing all the evidence of Republican corruption, lies and cronyism.
When it comes to how Trump works with Russia, I would hope that he does so with open arms for a change. We have been through the cold war era, what did we get from it? I grew up in the 60s, I know how to hide under a school desk to survive a nuclear attack, They dont teach these life saving techniques to kids anymore. But, honestly what we did get from it was a proliferation of nuclear warheads on both sides as we played the we have more game with them. It didnt work.
Working together and not trying to change the way the other country governs themselves, Might have an opposite effect. maybe after enough trust is built we could get rid of the warheads and start working on a joint effort for the exploration of space? Maybe I can finally get rid of that school desk I have because I wont fear a nuclear attack?
Maybe and this is a stretch, but maybe other countries will see to countries put differences aside and start working with each other for things that are beneficial and they start doing the same? Even those "terrorist" nations might decide to put down their weapons and step in on the space programs, After all, if man goes into space, it is only right that we bring Allah along with us right?
personally, I think that a working relationship with Russia would be a great benefit to the entire world. If the two big hoarders of nuclear weapons back down, maybe the smaller nations will decide to do the same.
We have tried for many years to keep Russia as our enemy and we gained nothing from it. Working with them could only bring a more peaceful solution to many of the worlds problems.
As the two biggest and most feared countries, I think it is our responsibility to lead by example.
or, Im wrong and we get fucked.

I think you are wrong about that.

The exact same idealism was used to "build trust with Nazi Germany". We tried working with Hitler on the Rhineland. We worked with him on everything, to bring about a peaceful solution. And the more he got what he wanted, the more he wanted to get.

Read about the events that lead up to WW2. A great book you can pick up is Munich, 1938 by David Faber. It details all the decisions the led straight to war, and each and every single one was peace... working towards peace. And they got peace.... peace at the highest price. Peace for Austria. Peace for Czechoslovakia. Peace for rebuilding their military. Peace for everything. The more Hitler got, the more he demanded.

I guess you didn't have bullies at school when you grew up. I did. The more you do what they say, and try and appease them, the more emboldened they get in their intimidation, and the more they demand.

This happened to me until finally I rolled my hand up into a ball, and planted it as hard as I possibly could, on the side of one's face. Suddenly the bully backed down.

That's how you teach someone to be civil. You cause them pain until they stop being a jerk.

Well... Putin is playing the exact same game. He rolled into Gergia, and got peace. He annexed Crimea, and now has peace. He's funding a war in the Ukraine, and now wants peace.

If we do not teach him that there is a hard limit to his ability to just roll over people... he'll keep doing it, and it's possible whoever takes over for Putin will follow the same path.
 
The idea is lovely Andylusion, unfortunately it doesn't really work like that. Best way to explain... essentially malware has to be compiled... it has to be "executable" (the .exe of applications) and it must be "run" to do anything vs whats being stolen is documents and emails which are essentially text - they themselves are not "ran" or "executed" but rather the program to read them is (word, notepad, etc.)

That said, there is a chance of such things with Word these days because Word is script capable, however that presumes they're using word, acrobat, etc. rather than some safer pure text based program to view their stolen data. - See also The Rise of Document based Malware - Data Threat Detection and Prevention | Sophos Security Topics - Virus, Malware, Web, Antivirus and Social Media Security Trends

Personally, I'm old school as shit, I've been using a program called EditPro since oh 1990 I suppose lol It's pure text based simplicity with keyword highlighting:

HiDPmqE.png

That's some pro-bono work I'd done for Veteran's Party of Alaska (their political platform, thought it was appropriate for the board heh)

As an added FYI for ya'll, the items I've circled in red on there are the scant body of evidence that our gov is linking the coding of the malware to Russian's with. Those are customize-able "identifiers" that the coder can name themselves, ( aka class="mainlink" and id="vpofa" and maybe src="menudeco.gif" ) - that is what our government based their supposed claim that they "traced the malware to keyboards" bullshit on - those bits being in Russian (the language of 180million - it's ******* laughable.)

Anyway, the text in there that is written in red, blue, and green are the keywords of the programming language (In this case, HTML and CSS - the code for simple webpage's) Those keywords don't come in foreign languages, they are always English. That holds true for all programming languages; generally because American's wrote the compilers (the program that turns the code into an executable; which is the kind of 1s and 0s language the computer reads - be that DOS, which is the layer beneath Windows, Windows itself, the web browser itself, the document readers itself, etc. all of the "applications" [as they call them these days] are coded in English.)

EDIT: For clarification, the text in the screenshot that's in black is the text that would display on the screen/webpage for the visitor to the website. The code for malware wouldn't include any of that because obviously it's intention is to remain unnoticed and gather data in the background, not blare out text messages to the infected user heh Too be fair, there's one other as well "comments" for HTML it looks like this <!-- "comment" --> and is basically used to let others know what the next part of the code does. That could also be in a foreign language, but frankly any hacker that comments their malware is a kiddy scripter or "white hacker" trying to help out others to understand what their program does, not a professional "cracker" or "black hacker" who would be engaged in espionage, where the goal is to hide what the code/malware actually does.


Essentially, if I were to write class="Главнаяссылка" instead of class="mainlink" our stupid government would allege that I'm Russian, and working for the Kremlin - aka they're dumbasses.
 
Last edited:
....Well there you go. They open the document, it installs our malware. We don't need to conceal anything, or do any routing. All we need our malware to do, is give us the user information, and it's location, and send that back to the CIA or DOD. I would guess that the malware package could be pretty small.

Additionally, have the malware self delete after sending the ID markers back to the CIA, to avoid the source knowing we were there. .....
Funny how anti-American asshats believe the US is so evil but never have a harsh word to say about Russia, China or North Korea.
 
^ Disingenuous at best. Most folks questioning the Russian hack scheme have been critical of China, North Korea, and Russia - just not on this particular incidence due to the faultiness of the "evidence."
 
The idea is lovely Andylusion, unfortunately it doesn't really work like that. Best way to explain... essentially malware has to be compiled... it has to be "executable" (the .exe of applications) and it must be "run" to do anything vs whats being stolen is documents and emails which are essentially text - they themselves are not "ran" or "executed" but rather the program to read them is (word, notepad, etc.)

That said, there is a chance of such things with Word these days because Word is script capable, however that presumes they're using word, acrobat, etc. rather than some safer pure text based program to view their stolen data. - See also The Rise of Document based Malware - Data Threat Detection and Prevention | Sophos Security Topics - Virus, Malware, Web, Antivirus and Social Media Security Trends

Personally, I'm old school as shit, I've been using a program called EditPro since oh 1990 I suppose lol It's pure text based simplicity with keyword highlighting:


That's some pro-bono work I'd done for Veteran's Party of Alaska (their political platform, thought it was appropriate for the board heh)

As an added FYI for ya'll, the items I've circled in red on there are the scant body of evidence that our gov is linking the coding of the malware to Russian's with. Those are customize-able "identifiers" that the coder can name themselves, ( aka class="mainlink" and id="vpofa" and maybe src="menudeco.gif" ) - that is what our government based their supposed claim that they "traced the malware to keyboards" bullshit on - those bits being in Russian (the language of 180million - it's ******* laughable.)

Anyway, the text in there that is written in red, blue, and green are the keywords of the programming language (In this case, HTML and CSS - the code for simple webpage's) Those keywords don't come in foreign languages, they are always English. That holds true for all programming languages; generally because American's wrote the compilers (the program that turns the code into an executable; which is the kind of 1s and 0s language the computer reads - be that DOS, which is the layer beneath Windows, Windows itself, the web browser itself, the document readers itself, etc. all of the "applications" [as they call them these days] are coded in English.)

EDIT: For clarification, the text in the screenshot that's in black is the text that would display on the screen/webpage for the visitor to the website. The code for malware wouldn't include any of that because obviously it's intention is to remain unnoticed and gather data in the background, not blare out text messages to the infected user heh Too be fair, there's one other as well "comments" for HTML it looks like this <!-- "comment" --> and is basically used to let others know what the next part of the code does. That could also be in a foreign language, but frankly any hacker that comments their malware is a kiddy scripter or "white hacker" trying to help out others to understand what their program does, not a professional "cracker" or "black hacker" who would be engaged in espionage, where the goal is to hide what the code/malware actually does.


Essentially, if I were to write class="Главнаяссылка" instead of class="mainlink" our stupid government would allege that I'm Russian, and working for the Kremlin - aka they're dumbasses.

Then I'm confused about what you are saying. I've worked in IT for years, and if that stuff did not work, then why did I constantly have to reinstall operating systems on computers where the user opened a Trojan file?

Because that's all my plan involves. They download stolen files from computers they connected to... and open the Trojan file, thinking it's a report.

Malware creators make files that look like emails and reports all the time, to trick people into executing their Malware. Are you saying the people in Russia are so infinitely brilliant, they'll never open a file? And that all the people in our government cyber crime units, are all too incompetent to do what malware makers have been doing for decades now?

They are stealing emails, as you said. Well Email is how we got the Trojan to begin with. We can't put a Trojan file as an attachment in an email on a computer they hacked, and let them steal it? Why wouldn't that work? I don't understand.

If that can't work, then how are all these Trojans working already?
 
Because you have to open the "email" or whatever to actually "catch" the virus/trojan. See - The Difference Between a Virus, Worm and Trojan Horse - Webopedia & Difference Between Malware, Virus, Rootkits, Spyware, Worm and Trojans

Hackers however deal in raw data and don't typically use a secondary email program to read their stolen data - specifically for that reason heh

When you look at raw data, the emails that Wikileak posted for example:

Code:
Delivered-To: john.podesta@gmail.com
Received: by 10.25.80.78 with SMTP id e75csp473911lfb;
        Wed, 12 Nov 2014 18:59:56 -0800 (PST)
X-Received: by 10.224.130.71 with SMTP id r7mr66512753qas.69.1415847596397;
        Wed, 12 Nov 2014 18:59:56 -0800 (PST)
Return-Path: <gene_karpinski@lcv.org>
Received: from mail.lcv.org (mail.lcv.org. [208.118.179.19])
        by mx.google.com with ESMTPS id n91si37057177qgd.8.2014.11.12.18.59.55
        for <john.podesta@gmail.com>
        (version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
        Wed, 12 Nov 2014 18:59:56 -0800 (PST)
Received-SPF: softfail (google.com: domain of transitioning gene_karpinski@lcv.org does not designate 208.118.179.19 as permitted sender) client-ip=208.118.179.19;
Authentication-Results: mx.google.com;
       spf=softfail (google.com: domain of transitioning gene_karpinski@lcv.org does not designate 208.118.179.19 as permitted sender) smtp.mail=gene_karpinski@lcv.org
Received: from MAILVM.lcv.local ([fe80::20a2:dda1:b128:d787]) by
 MAILVM.lcv.local ([fe80::20a2:dda1:b128:d787%13]) with mapi id
 14.01.0438.000; Wed, 12 Nov 2014 22:00:25 -0500
From: Gene Karpinski <gene_karpinski@lcv.org>
To: 'John Podesta' <john.podesta@gmail.com>
Subject: RE: Great job!
Thread-Topic: Great job!
Thread-Index: Ac/+K5D6a6sKTEe9TKWCAomziaAA/QA62ngAAApwCIA=
Date: Thu, 13 Nov 2014 03:00:24 +0000
Message-ID: <EC293831314D41489E5B0AAC104A6A3E925F5230@MAILVM.lcv.local>
References: <3A1A055C-F199-44A0-B744-460BED51CCA7@lcv.org>
 <4862652E-11F4-4CFC-BFCB-655DCA2B92E3@gmail.com>
In-Reply-To: <4862652E-11F4-4CFC-BFCB-655DCA2B92E3@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.16.0.165]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

And it got the fantastic media attention it deserved!

Btw I am still hoping if your schedule permits that you can slide up to NYC=
 for our annual LCV dinner.  As I mentioned earlier, Hillary is the keynote=
 speaker and we are honoring Frances B for her many years of enviro service=
.  If you could make it you could intro Hillary and help present the award =
to Frances.        =20

-----Original Message-----
From: John Podesta [mailto:john.podesta@gmail.com]=20
Sent: Wednesday, November 12, 2014 9:54 PM
To: Gene Karpinski
Subject: Re: Great job!

Thx Gene.

JP
--Sent from my iPad--
john.podesta@gmail.com
For scheduling: eryn.sepp@gmail.com

> On Nov 11, 2014, at 10:48 PM, Gene Karpinski <gene_karpinski@lcv.org> wro=
te:
>=20
>=20

This is non compiled, or purely "textual data," you are not using an email program to open them therefore there's nothing to "attach" a trojan, worm, or virus to. It's like... bird flu on its own is harmless, it's only when it infects and spreads to other birds that it becomes a problem, a trojan, worm, or virus coded up is meaningless unless there is a "carrier" to attach it to - Trojans, viruses, and worms use security vulnerabilities within the program that is opening them to infect your system. They can use Windows vulnerabilities, Outlook/Word/Excel vulnerabilities, Browser vulnerabilities, etc.

Malware is a complete rewrite of the program, or parts of the program. So again, if no program is used to open the stolen data, then nothing will be passed on. The data dumps that hackers work in are textual and there's about 16 billion text editors out there - the amount of coding it would take to counter-infect all of those potential software programs (or even just the most common ones) would be pretty readily apparent because of the size of the data file. At which point the hacker then shifts to pure binary, which is literally 1s and 0s with no processing by anything at all - it's the raw data stream sent though the Ethernet cable - and yes, a pro government hacker can mostly likely speak to anyone in binary heh
 
Because you have to open the "email" or whatever to actually "catch" the virus/trojan. See - The Difference Between a Virus, Worm and Trojan Horse - Webopedia & Difference Between Malware, Virus, Rootkits, Spyware, Worm and Trojans

Hackers however deal in raw data and don't typically use a secondary email program to read their stolen data - specifically for that reason heh

When you look at raw data, the emails that Wikileak posted for example:

Code:
Delivered-To: john.podesta@gmail.com
Received: by 10.25.80.78 with SMTP id e75csp473911lfb;
        Wed, 12 Nov 2014 18:59:56 -0800 (PST)
X-Received: by 10.224.130.71 with SMTP id r7mr66512753qas.69.1415847596397;
        Wed, 12 Nov 2014 18:59:56 -0800 (PST)
Return-Path: <gene_karpinski@lcv.org>
Received: from mail.lcv.org (mail.lcv.org. [208.118.179.19])
        by mx.google.com with ESMTPS id n91si37057177qgd.8.2014.11.12.18.59.55
        for <john.podesta@gmail.com>
        (version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
        Wed, 12 Nov 2014 18:59:56 -0800 (PST)
Received-SPF: softfail (google.com: domain of transitioning gene_karpinski@lcv.org does not designate 208.118.179.19 as permitted sender) client-ip=208.118.179.19;
Authentication-Results: mx.google.com;
       spf=softfail (google.com: domain of transitioning gene_karpinski@lcv.org does not designate 208.118.179.19 as permitted sender) smtp.mail=gene_karpinski@lcv.org
Received: from MAILVM.lcv.local ([fe80::20a2:dda1:b128:d787]) by
 MAILVM.lcv.local ([fe80::20a2:dda1:b128:d787%13]) with mapi id
 14.01.0438.000; Wed, 12 Nov 2014 22:00:25 -0500
From: Gene Karpinski <gene_karpinski@lcv.org>
To: 'John Podesta' <john.podesta@gmail.com>
Subject: RE: Great job!
Thread-Topic: Great job!
Thread-Index: Ac/+K5D6a6sKTEe9TKWCAomziaAA/QA62ngAAApwCIA=
Date: Thu, 13 Nov 2014 03:00:24 +0000
Message-ID: <EC293831314D41489E5B0AAC104A6A3E925F5230@MAILVM.lcv.local>
References: <3A1A055C-F199-44A0-B744-460BED51CCA7@lcv.org>
 <4862652E-11F4-4CFC-BFCB-655DCA2B92E3@gmail.com>
In-Reply-To: <4862652E-11F4-4CFC-BFCB-655DCA2B92E3@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.16.0.165]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

And it got the fantastic media attention it deserved!

Btw I am still hoping if your schedule permits that you can slide up to NYC=
 for our annual LCV dinner.  As I mentioned earlier, Hillary is the keynote=
 speaker and we are honoring Frances B for her many years of enviro service=
.  If you could make it you could intro Hillary and help present the award =
to Frances.        =20

-----Original Message-----
From: John Podesta [mailto:john.podesta@gmail.com]=20
Sent: Wednesday, November 12, 2014 9:54 PM
To: Gene Karpinski
Subject: Re: Great job!

Thx Gene.

JP
--Sent from my iPad--
john.podesta@gmail.com
For scheduling: eryn.sepp@gmail.com

> On Nov 11, 2014, at 10:48 PM, Gene Karpinski <gene_karpinski@lcv.org> wro=
te:
>=20
>=20

This is non compiled, or purely "textual data," you are not using an email program to open them therefore there's nothing to "attach" a trojan, worm, or virus to. It's like... bird flu on its own is harmless, it's only when it infects and spreads to other birds that it becomes a problem, a trojan, worm, or virus coded up is meaningless unless there is a "carrier" to attach it to - Trojans, viruses, and worms use security vulnerabilities within the program that is opening them to infect your system. They can use Windows vulnerabilities, Outlook/Word/Excel vulnerabilities, Browser vulnerabilities, etc.

Malware is a complete rewrite of the program, or parts of the program. So again, if no program is used to open the stolen data, then nothing will be passed on. The data dumps that hackers work in are textual and there's about 16 billion text editors out there - the amount of coding it would take to counter-infect all of those potential software programs (or even just the most common ones) would be pretty readily apparent because of the size of the data file. At which point the hacker then shifts to pure binary, which is literally 1s and 0s with no processing by anything at all - it's the raw data stream sent though the Ethernet cable - and yes, a pro government hacker can mostly likely speak to anyone in binary heh

Malware is not spread by the actual email anyway. So whether they used an email program, or a text editor wouldn't matter.

Now I get your point. You say that if they are looking at stuff through a text editor, then it would be impossible to get a Trojan to work.

But are you positive they are only using text editors? That seems far fetched to me.

I've opened PDF files and MS Word documents in a text editor before. It's a complete and total mess. It would take the most dedicated of idiots to sit there and figure out that hurricane of symbols and crap, to determine what was on that document.

So you are telling me, that if a Russian spy transfers back to Moscow, a bunch of emails, that have attachments marked "Raytheon Expense Report.pdf", or .doc, or .jpg, or anything else, that they are looking at those with text editors? Or that they are not looking at those at all?

Granted I'm no Ph.D expert in modern hacking, but without additional evidence, I'd be willing to place a wager that if a hacker got an Email with an attachment, he'd try and open it.

If he tries to open it, and look at it, then I betcha we could put a Trojan in place of that file, and he'd open that Trojan.

Maybe I'm wrong. Maybe you can't disguise a file that well.
 
Why won't Trump at least admit that Russians hacked the DNC - even if he won't admit that it influenced the election?

SPY REPORT LANDS

PUTIN ‘ORDERED’ HACK

‘INFLUENCE’ ELECTION FOR TRUMP

U.S. Intel Report Identifies Russians Who Gave Emails To WikiLeaks

TRUMP: IT CHANGED NOTHING

It didn't change anything. The fact Hillary was hated, isn't shocking or new.

Now as to the rest of this.... great. Where is the evidence? Show me the evidence. I want to see the actual evidence.

I read your "Putin ordered it" link, and it showed no evidence at all that Putin ordered anything. Only that "Senior officials claimed".

Right, we heard that before didn't we? Just a few years back "Senior officials claimed" that Saddam had mobile chemical weapons labs.

Should we take what these 'senior officials claimed' this time at face value with no evidence?

Now it could be true, I don't know.

But you are stating this with your childish 80 point font, and bright red letters, like it's a divine Truth from G-d above.

Why is it ok to be a mindless lemming following the divine edicts from "senior officials" now, when it wasn't a few years ago?
 
The CIA has concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just toundermine confidence in the U.S. electoral system, according to officials briefed on the matter.

Intelligence agencies have identified individuals with connections to the Russian government who provided WikiLeaks with thousands of hacked emails from the Democratic National Committee and others, including Hillary Clinton’s campaign chairman, according to U.S. officials. Those officials described the individuals as actors known to the intelligence community and part of a wider Russian operation to boost Trump and hurt Clinton’s chances.

“It is the assessment of the intelligence community that Russia’s goal here was to favor one candidate over the other, to help Trump get elected,” said a senior U.S. official briefed on an intelligence presentation made to U.S. senators. “That’s the consensus view.”

Much more...

REPORT: CIA Concludes Russia Interfered In Election To Help Trump Win

Obama Demands Answers


More proof that Hillary was swiftboated. Her popular vote lead is now over 2.8 million. Trump was not fairly elected. Putin, Wikileaks, and Comey all had their thumbs on the scale for Trump - including other idiots who were pumping out conspiracy theories and fake news for fun and profit to discredit Hillary.


BULLSHIT

It was Clapper, after all, who lied under oath to Sen. Ron Wyden and the Senate when asked about the extent of spying on US citizens engaged in by the National Security Agency, and later was forced to apologize for it.



YOU STUPID ***** DECEIVED NO ONE BEFORE THE ELECTION - AND WE WILL NOT LET YOU DERAIL HIS PRESIDENCY.

NOT GONNA HAPPEN


.

 
Because you have to open the "email" or whatever to actually "catch" the virus/trojan. See - The Difference Between a Virus, Worm and Trojan Horse - Webopedia & Difference Between Malware, Virus, Rootkits, Spyware, Worm and Trojans

Hackers however deal in raw data and don't typically use a secondary email program to read their stolen data - specifically for that reason heh

When you look at raw data, the emails that Wikileak posted for example:

Code:
Delivered-To: john.podesta@gmail.com
Received: by 10.25.80.78 with SMTP id e75csp473911lfb;
        Wed, 12 Nov 2014 18:59:56 -0800 (PST)
X-Received: by 10.224.130.71 with SMTP id r7mr66512753qas.69.1415847596397;
        Wed, 12 Nov 2014 18:59:56 -0800 (PST)
Return-Path: <gene_karpinski@lcv.org>
Received: from mail.lcv.org (mail.lcv.org. [208.118.179.19])
        by mx.google.com with ESMTPS id n91si37057177qgd.8.2014.11.12.18.59.55
        for <john.podesta@gmail.com>
        (version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
        Wed, 12 Nov 2014 18:59:56 -0800 (PST)
Received-SPF: softfail (google.com: domain of transitioning gene_karpinski@lcv.org does not designate 208.118.179.19 as permitted sender) client-ip=208.118.179.19;
Authentication-Results: mx.google.com;
       spf=softfail (google.com: domain of transitioning gene_karpinski@lcv.org does not designate 208.118.179.19 as permitted sender) smtp.mail=gene_karpinski@lcv.org
Received: from MAILVM.lcv.local ([fe80::20a2:dda1:b128:d787]) by
 MAILVM.lcv.local ([fe80::20a2:dda1:b128:d787%13]) with mapi id
 14.01.0438.000; Wed, 12 Nov 2014 22:00:25 -0500
From: Gene Karpinski <gene_karpinski@lcv.org>
To: 'John Podesta' <john.podesta@gmail.com>
Subject: RE: Great job!
Thread-Topic: Great job!
Thread-Index: Ac/+K5D6a6sKTEe9TKWCAomziaAA/QA62ngAAApwCIA=
Date: Thu, 13 Nov 2014 03:00:24 +0000
Message-ID: <EC293831314D41489E5B0AAC104A6A3E925F5230@MAILVM.lcv.local>
References: <3A1A055C-F199-44A0-B744-460BED51CCA7@lcv.org>
 <4862652E-11F4-4CFC-BFCB-655DCA2B92E3@gmail.com>
In-Reply-To: <4862652E-11F4-4CFC-BFCB-655DCA2B92E3@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.16.0.165]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

And it got the fantastic media attention it deserved!

Btw I am still hoping if your schedule permits that you can slide up to NYC=
 for our annual LCV dinner.  As I mentioned earlier, Hillary is the keynote=
 speaker and we are honoring Frances B for her many years of enviro service=
.  If you could make it you could intro Hillary and help present the award =
to Frances.        =20

-----Original Message-----
From: John Podesta [mailto:john.podesta@gmail.com]=20
Sent: Wednesday, November 12, 2014 9:54 PM
To: Gene Karpinski
Subject: Re: Great job!

Thx Gene.

JP
--Sent from my iPad--
john.podesta@gmail.com
For scheduling: eryn.sepp@gmail.com

> On Nov 11, 2014, at 10:48 PM, Gene Karpinski <gene_karpinski@lcv.org> wro=
te:
>=20
>=20

This is non compiled, or purely "textual data," you are not using an email program to open them therefore there's nothing to "attach" a trojan, worm, or virus to. It's like... bird flu on its own is harmless, it's only when it infects and spreads to other birds that it becomes a problem, a trojan, worm, or virus coded up is meaningless unless there is a "carrier" to attach it to - Trojans, viruses, and worms use security vulnerabilities within the program that is opening them to infect your system. They can use Windows vulnerabilities, Outlook/Word/Excel vulnerabilities, Browser vulnerabilities, etc.

Malware is a complete rewrite of the program, or parts of the program. So again, if no program is used to open the stolen data, then nothing will be passed on. The data dumps that hackers work in are textual and there's about 16 billion text editors out there - the amount of coding it would take to counter-infect all of those potential software programs (or even just the most common ones) would be pretty readily apparent because of the size of the data file. At which point the hacker then shifts to pure binary, which is literally 1s and 0s with no processing by anything at all - it's the raw data stream sent though the Ethernet cable - and yes, a pro government hacker can mostly likely speak to anyone in binary heh

Malware is not spread by the actual email anyway. So whether they used an email program, or a text editor wouldn't matter.

Now I get your point. You say that if they are looking at stuff through a text editor, then it would be impossible to get a Trojan to work.

But are you positive they are only using text editors? That seems far fetched to me.

I've opened PDF files and MS Word documents in a text editor before. It's a complete and total mess. It would take the most dedicated of idiots to sit there and figure out that hurricane of symbols and crap, to determine what was on that document.

So you are telling me, that if a Russian spy transfers back to Moscow, a bunch of emails, that have attachments marked "Raytheon Expense Report.pdf", or .doc, or .jpg, or anything else, that they are looking at those with text editors? Or that they are not looking at those at all?

Granted I'm no Ph.D expert in modern hacking, but without additional evidence, I'd be willing to place a wager that if a hacker got an Email with an attachment, he'd try and open it.

If he tries to open it, and look at it, then I betcha we could put a Trojan in place of that file, and he'd open that Trojan.

Maybe I'm wrong. Maybe you can't disguise a file that well.

The bigger thing though is that the virus, trojan, or malware has to be executed or run, which a flat text editor, say one designed for programming like the one I use, doesn't do - all it does is translate the 1s and 0s into letters - nothing runs but the software itself.

It's true some stolen documents surely come in PDF format, but just as with text editor programs there's a lot of different PDF readers as well, plus the coding to embed a virus or virus would still throw off the file size a bit (and it's probably more apparent on a PDF because the number of pages in the document is hidden in the PDF's creation.) I use ScanSoft PDF editor, it's from a company that doesn't even exist anymore.

There's also photos, but again there really there's so many photo and graphics editing software out there - Though that at least has a slight bit more opportunity if they could find a vulnerability in say the "album" thumbnails Windows makes or something...

And of course, all of this theory crafting is also ignoring the fact that the folks reading this stolen data (if they're smart) do so while not connected to the internet and while on an isolated system - for example I have an ITX system for coding (I write windows software for my custom created electronic gadgets) My ITX has no connection to my main system because a mistake in my driver coding could easily wreck havoc on the infrastructure of the Windows OS and I certainly don't want to reinstall my primary system (which takes DAYS)

So I mean even if the intelligence folks guess at the right text editor and/or PDF reader software to take advantage of, and manage to get around any built in security (anti-virus programs, firewalls, and so forth,) they may end up infecting a rig with no means to transmit anything at all back to them. Any sleeper program they managed to get installed would show up in the processes, any "load with" programs would show up as well. I mean this stuff might trick the kiddy scripters, but a professional who does it for a living (working for a government or selling the data they steal) isn't very likely to be so careless.
 
15th post
CIA, FBI, and 17 national security agencies all say Putin hacked to help Trump win - and they have submitted proof.
What did Russia hack that affected the vote count? A parking meter or someone's coffee machine?
 

New Topics

Back
Top Bottom