BlindBoo
Diamond Member
- Sep 28, 2010
- 57,376
- 17,026
- 2,180
great - now give me 1 good reason why they couldn't examine the actual server itself. lobbing daily beast at me is, at best, that broken turd i was flushing.i've given up trying to explain this. a copy can be anything and certainly no guarantee it's of the original unmodified server. i can also get zero reasonable explanations why a copy vs. the original is necessary.Crowdstrike gave the FBI and others a copy of the server.... to verify it themselves.... And the FBI did just that..... And more....
A copy doesn't tell you squat!
You can't track the download speeds from a copy...Which could say the download speed was faster than any comm lines in existence...which would mean it would have to be a device that is physically attached to the server (thumb drive)...Which would mean it was not a "hack" but a "leak" (inside job).Which would mean it wasn't the russians...unless the democrats hired russians (which is plausible).
You can't tell any of that from a "copy".
if trump were to pull ANY OF THIS they would scream unholy hell at the party foul, and rightfully so - it would be. yet if "their side" does it, they protect to the death what they would want to "kill" others for doing.
go figure these people. may as well flush a broken turd as it would be more productive than talking with these people.
'Pull any of this'?
Tell us more about this mythical server you believe is hidden away in Ukraine......
![]()
Meanwhile in the real world....
The āserverā Trump is obsessed with is actually 140 servers, most of them cloud-based, which the DNC was forced to decommission in June 2016 while trying to rid its network of the Russian GRU officers working to help Trump win the election, according to the figures in the DNCās civil lawsuit against Russia and the Trump campaign. Another 180 desktop and laptop computers were also swapped out as the DNC raced to get the organization back on its feet and free of Putinās surveillance.
But despite Trumpās repeated feverish claims to the contrary, no machines are actually missing.
Itās true that the FBI doesnāt have the DNCās computer hardware. Agents didnāt sweep into DNC headquarters, load up all the equipment and leave Democrats standing stunned beside empty desks and dangling cables. Thereās a reason for that, and it has nothing to do with a deep state conspiracy to frame Putin.
Trump and his allies are capitalizing on a basic misapprehension of how computer intrusion investigations work. Investigating a virtual crime isnāt a like investigating a murder. The Russians didnāt leave DNA evidence on the server racks and fingerprints on the keyboards. All the evidence of their comings and goings was on the computer hard drives, and in memory, and in the ephemeral network transmissions to and from the GRUās command-and-control servers.
When cyber investigators respond to an incident, they capture that evidence in a process called āimaging.ā They make an exact byte-for-byte copy of the hard drives. They do the same for the machineās memory, capturing evidence that would otherwise be lost at the next reboot, and they monitor and store the traffic passing through the victimās network. This has been standard procedure in computer intrusion investigations for decades. The images, not the computerās hardware, provide the evidence.
Both the DNC and the security firm Crowdstrike, hired to respond to the breach, have said repeatedly over the years that they gave the FBI a copy of all the DNC images back in 2016. The DNC reiterated that Monday in a statement to the Daily Beast.
āThe FBI was given images of servers, forensic copies, as well as a host of other forensic information we collected from our systems,ā said Adrienne Watson, the DNCās deputy communications director. āWe were in close contact and worked cooperatively with the FBI and were always responsive to their requests. Any suggestion that they were denied access to what they wanted for their investigation is completely incorrect.ā
Itās also consistent with the Department of Justiceās electronic evidence manual, which recommends capturing images when practical even when the FBI is executing a search warrant against a uncooperative suspect. When the computers belong to a cooperating victim, seizing the machines is pretty much out of the question, said James Harris, a former FBI cybercrime agent who worked on a 2009 breach at Google thatās been linked to the Chinese government.
āIn most cases you donāt even ask, you just assume youāre going to make forensic copies,ā said Harris, now vice president of engineering at PFP Cyber. āFor example when the Google breach happened back in 2009, agents were sent out with express instructions that you image what they allow you to image, because theyāre the victim, you donāt have a search warrant, and you donāt want to disrupt their business.ā
Thereās a final bit of evidence that the FBI got what it wanted from the DNC, and it was filed in the U.S. District Court in Washington, D.C. last Friday: 29-pages of inside details showing exactly how and when the GRUās hackers moved through the DNCās network on their mission to help Trump.
Trumpās āMissing DNC Serverā Is Neither Missing Nor a Server
Just one? There was no actual server itself.