- Thread starter
- #161
Truth be told, you got beat like a dog with that word.
Only in your teeny tiny little mind.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Truth be told, you got beat like a dog with that word.
After you wrote this you need to walk away from this discussion you dumbassB) "Coupe Attempt' is not a crime. Nor by any stretch of the definition of 'coupe' is what is happening a coupe- except of course your Orange Messiah has told you to keep repeating 'its a coupe!"
.
So you wanna kill "leftists" too?I see leftist as enemies of America by the way they act.i've given up trying to explain this. a copy can be anything and certainly no guarantee it's of the original unmodified server.
The liberals on this board know that!
But they are lying filth...they can't help but argue because they don't want to see their heroes get the death penalty!
The 'death penalty'.....for what exactly?
I know you Trumpettes are big on wishing to be able to kill other Americans but what does your fevered brain tell you that is going to lead to you being able to legally kill other Americans?.
where was the data held, in space? too fking funny. nope the file was in limbo and not on any physical device. hey, it's why nothing was hacked, there was nothing to hack. you just admitted it.great - now give me 1 good reason why they couldn't examine the actual server itself. lobbing daily beast at me is, at best, that broken turd i was flushing.i've given up trying to explain this. a copy can be anything and certainly no guarantee it's of the original unmodified server. i can also get zero reasonable explanations why a copy vs. the original is necessary.A copy doesn't tell you squat!
You can't track the download speeds from a copy...Which could say the download speed was faster than any comm lines in existence...which would mean it would have to be a device that is physically attached to the server (thumb drive)...Which would mean it was not a "hack" but a "leak" (inside job).Which would mean it wasn't the russians...unless the democrats hired russians (which is plausible).
You can't tell any of that from a "copy".
if trump were to pull ANY OF THIS they would scream unholy hell at the party foul, and rightfully so - it would be. yet if "their side" does it, they protect to the death what they would want to "kill" others for doing.
go figure these people. may as well flush a broken turd as it would be more productive than talking with these people.
'Pull any of this'?
Tell us more about this mythical server you believe is hidden away in Ukraine......
![]()
Meanwhile in the real world....
The “server” Trump is obsessed with is actually 140 servers, most of them cloud-based, which the DNC was forced to decommission in June 2016 while trying to rid its network of the Russian GRU officers working to help Trump win the election, according to the figures in the DNC’s civil lawsuit against Russia and the Trump campaign. Another 180 desktop and laptop computers were also swapped out as the DNC raced to get the organization back on its feet and free of Putin’s surveillance.
But despite Trump’s repeated feverish claims to the contrary, no machines are actually missing.
It’s true that the FBI doesn’t have the DNC’s computer hardware. Agents didn’t sweep into DNC headquarters, load up all the equipment and leave Democrats standing stunned beside empty desks and dangling cables. There’s a reason for that, and it has nothing to do with a deep state conspiracy to frame Putin.
Trump and his allies are capitalizing on a basic misapprehension of how computer intrusion investigations work. Investigating a virtual crime isn’t a like investigating a murder. The Russians didn’t leave DNA evidence on the server racks and fingerprints on the keyboards. All the evidence of their comings and goings was on the computer hard drives, and in memory, and in the ephemeral network transmissions to and from the GRU’s command-and-control servers.
When cyber investigators respond to an incident, they capture that evidence in a process called “imaging.” They make an exact byte-for-byte copy of the hard drives. They do the same for the machine’s memory, capturing evidence that would otherwise be lost at the next reboot, and they monitor and store the traffic passing through the victim’s network. This has been standard procedure in computer intrusion investigations for decades. The images, not the computer’s hardware, provide the evidence.
Both the DNC and the security firm Crowdstrike, hired to respond to the breach, have said repeatedly over the years that they gave the FBI a copy of all the DNC images back in 2016. The DNC reiterated that Monday in a statement to the Daily Beast.
“The FBI was given images of servers, forensic copies, as well as a host of other forensic information we collected from our systems,” said Adrienne Watson, the DNC’s deputy communications director. “We were in close contact and worked cooperatively with the FBI and were always responsive to their requests. Any suggestion that they were denied access to what they wanted for their investigation is completely incorrect.”
It’s also consistent with the Department of Justice’s electronic evidence manual, which recommends capturing images when practical even when the FBI is executing a search warrant against a uncooperative suspect. When the computers belong to a cooperating victim, seizing the machines is pretty much out of the question, said James Harris, a former FBI cybercrime agent who worked on a 2009 breach at Google that’s been linked to the Chinese government.
“In most cases you don’t even ask, you just assume you’re going to make forensic copies,” said Harris, now vice president of engineering at PFP Cyber. “For example when the Google breach happened back in 2009, agents were sent out with express instructions that you image what they allow you to image, because they’re the victim, you don’t have a search warrant, and you don’t want to disrupt their business.”
There’s a final bit of evidence that the FBI got what it wanted from the DNC, and it was filed in the U.S. District Court in Washington, D.C. last Friday: 29-pages of inside details showing exactly how and when the GRU’s hackers moved through the DNC’s network on their mission to help Trump.
Trump’s ‘Missing DNC Server’ Is Neither Missing Nor a Server
Just one? There was no actual server itself.
You realize there isn't a rightard in this establishment who can understand any of that, right?i've given up trying to explain this. a copy can be anything and certainly no guarantee it's of the original unmodified server. i can also get zero reasonable explanations why a copy vs. the original is necessary.Crowdstrike gave the FBI and others a copy of the server.... to verify it themselves.... And the FBI did just that..... And more....
A copy doesn't tell you squat!
You can't track the download speeds from a copy...Which could say the download speed was faster than any comm lines in existence...which would mean it would have to be a device that is physically attached to the server (thumb drive)...Which would mean it was not a "hack" but a "leak" (inside job).Which would mean it wasn't the russians...unless the democrats hired russians (which is plausible).
You can't tell any of that from a "copy".
if trump were to pull ANY OF THIS they would scream unholy hell at the party foul, and rightfully so - it would be. yet if "their side" does it, they protect to the death what they would want to "kill" others for doing.
go figure these people. may as well flush a broken turd as it would be more productive than talking with these people.
'Pull any of this'?
Tell us more about this mythical server you believe is hidden away in Ukraine......
![]()
Meanwhile in the real world....
The “server” Trump is obsessed with is actually 140 servers, most of them cloud-based, which the DNC was forced to decommission in June 2016 while trying to rid its network of the Russian GRU officers working to help Trump win the election, according to the figures in the DNC’s civil lawsuit against Russia and the Trump campaign. Another 180 desktop and laptop computers were also swapped out as the DNC raced to get the organization back on its feet and free of Putin’s surveillance.
But despite Trump’s repeated feverish claims to the contrary, no machines are actually missing.
It’s true that the FBI doesn’t have the DNC’s computer hardware. Agents didn’t sweep into DNC headquarters, load up all the equipment and leave Democrats standing stunned beside empty desks and dangling cables. There’s a reason for that, and it has nothing to do with a deep state conspiracy to frame Putin.
Trump and his allies are capitalizing on a basic misapprehension of how computer intrusion investigations work. Investigating a virtual crime isn’t a like investigating a murder. The Russians didn’t leave DNA evidence on the server racks and fingerprints on the keyboards. All the evidence of their comings and goings was on the computer hard drives, and in memory, and in the ephemeral network transmissions to and from the GRU’s command-and-control servers.
When cyber investigators respond to an incident, they capture that evidence in a process called “imaging.” They make an exact byte-for-byte copy of the hard drives. They do the same for the machine’s memory, capturing evidence that would otherwise be lost at the next reboot, and they monitor and store the traffic passing through the victim’s network. This has been standard procedure in computer intrusion investigations for decades. The images, not the computer’s hardware, provide the evidence.
Both the DNC and the security firm Crowdstrike, hired to respond to the breach, have said repeatedly over the years that they gave the FBI a copy of all the DNC images back in 2016. The DNC reiterated that Monday in a statement to the Daily Beast.
“The FBI was given images of servers, forensic copies, as well as a host of other forensic information we collected from our systems,” said Adrienne Watson, the DNC’s deputy communications director. “We were in close contact and worked cooperatively with the FBI and were always responsive to their requests. Any suggestion that they were denied access to what they wanted for their investigation is completely incorrect.”
It’s also consistent with the Department of Justice’s electronic evidence manual, which recommends capturing images when practical even when the FBI is executing a search warrant against a uncooperative suspect. When the computers belong to a cooperating victim, seizing the machines is pretty much out of the question, said James Harris, a former FBI cybercrime agent who worked on a 2009 breach at Google that’s been linked to the Chinese government.
“In most cases you don’t even ask, you just assume you’re going to make forensic copies,” said Harris, now vice president of engineering at PFP Cyber. “For example when the Google breach happened back in 2009, agents were sent out with express instructions that you image what they allow you to image, because they’re the victim, you don’t have a search warrant, and you don’t want to disrupt their business.”
There’s a final bit of evidence that the FBI got what it wanted from the DNC, and it was filed in the U.S. District Court in Washington, D.C. last Friday: 29-pages of inside details showing exactly how and when the GRU’s hackers moved through the DNC’s network on their mission to help Trump.
Trump’s ‘Missing DNC Server’ Is Neither Missing Nor a Server
Because they didn't need to. A byte-for-byte copy is an appropriate substitute.great - now give me 1 good reason why they couldn't examine the actual server itself. lobbing daily beast at me is, at best, that broken turd i was flushing.i've given up trying to explain this. a copy can be anything and certainly no guarantee it's of the original unmodified server. i can also get zero reasonable explanations why a copy vs. the original is necessary.Crowdstrike gave the FBI and others a copy of the server.... to verify it themselves.... And the FBI did just that..... And more....
A copy doesn't tell you squat!
You can't track the download speeds from a copy...Which could say the download speed was faster than any comm lines in existence...which would mean it would have to be a device that is physically attached to the server (thumb drive)...Which would mean it was not a "hack" but a "leak" (inside job).Which would mean it wasn't the russians...unless the democrats hired russians (which is plausible).
You can't tell any of that from a "copy".
if trump were to pull ANY OF THIS they would scream unholy hell at the party foul, and rightfully so - it would be. yet if "their side" does it, they protect to the death what they would want to "kill" others for doing.
go figure these people. may as well flush a broken turd as it would be more productive than talking with these people.
'Pull any of this'?
Tell us more about this mythical server you believe is hidden away in Ukraine......
![]()
Meanwhile in the real world....
The “server” Trump is obsessed with is actually 140 servers, most of them cloud-based, which the DNC was forced to decommission in June 2016 while trying to rid its network of the Russian GRU officers working to help Trump win the election, according to the figures in the DNC’s civil lawsuit against Russia and the Trump campaign. Another 180 desktop and laptop computers were also swapped out as the DNC raced to get the organization back on its feet and free of Putin’s surveillance.
But despite Trump’s repeated feverish claims to the contrary, no machines are actually missing.
It’s true that the FBI doesn’t have the DNC’s computer hardware. Agents didn’t sweep into DNC headquarters, load up all the equipment and leave Democrats standing stunned beside empty desks and dangling cables. There’s a reason for that, and it has nothing to do with a deep state conspiracy to frame Putin.
Trump and his allies are capitalizing on a basic misapprehension of how computer intrusion investigations work. Investigating a virtual crime isn’t a like investigating a murder. The Russians didn’t leave DNA evidence on the server racks and fingerprints on the keyboards. All the evidence of their comings and goings was on the computer hard drives, and in memory, and in the ephemeral network transmissions to and from the GRU’s command-and-control servers.
When cyber investigators respond to an incident, they capture that evidence in a process called “imaging.” They make an exact byte-for-byte copy of the hard drives. They do the same for the machine’s memory, capturing evidence that would otherwise be lost at the next reboot, and they monitor and store the traffic passing through the victim’s network. This has been standard procedure in computer intrusion investigations for decades. The images, not the computer’s hardware, provide the evidence.
Both the DNC and the security firm Crowdstrike, hired to respond to the breach, have said repeatedly over the years that they gave the FBI a copy of all the DNC images back in 2016. The DNC reiterated that Monday in a statement to the Daily Beast.
“The FBI was given images of servers, forensic copies, as well as a host of other forensic information we collected from our systems,” said Adrienne Watson, the DNC’s deputy communications director. “We were in close contact and worked cooperatively with the FBI and were always responsive to their requests. Any suggestion that they were denied access to what they wanted for their investigation is completely incorrect.”
It’s also consistent with the Department of Justice’s electronic evidence manual, which recommends capturing images when practical even when the FBI is executing a search warrant against a uncooperative suspect. When the computers belong to a cooperating victim, seizing the machines is pretty much out of the question, said James Harris, a former FBI cybercrime agent who worked on a 2009 breach at Google that’s been linked to the Chinese government.
“In most cases you don’t even ask, you just assume you’re going to make forensic copies,” said Harris, now vice president of engineering at PFP Cyber. “For example when the Google breach happened back in 2009, agents were sent out with express instructions that you image what they allow you to image, because they’re the victim, you don’t have a search warrant, and you don’t want to disrupt their business.”
There’s a final bit of evidence that the FBI got what it wanted from the DNC, and it was filed in the U.S. District Court in Washington, D.C. last Friday: 29-pages of inside details showing exactly how and when the GRU’s hackers moved through the DNC’s network on their mission to help Trump.
Trump’s ‘Missing DNC Server’ Is Neither Missing Nor a Server
So what's the conspiracy theory? Crowdstrike covered up the Ukraineans stealing the DNc and podesta private emails and RELEASING the stolen emails to wikileaks, to the public so that it would actually help Hillary????WOW! Did this thread take off!
Ya see what the word CROWDSTRIKE does to liberals???
CROWDSTRIKE CROWDSTRIKE CROWDSTRIKE!!!
DRAIN THE SWAMP!
Dumbfuck.... indictments that go nowhere because the defendants can't be brought to trial -- NOT because the evidence is "worthless and can't be used in court."indictments that went nowhere. When the trial date? If it had gone to court Judge would have kick any evidence crowd stikr gave to the FBI out as inadmissibleA lot of claims have been made and anything crowdstrike gave to the FBI is worthless and can never be used in a court of law.LOLYou posted this lie way to soonPhysics don't lie.
But Trump and his supporters sure do- your post is another great example.
I am a Trump supporter and I DON'T LIE
SO THAT MAKES YOU A LYING SACK OF SHIT.
You don't lie, PussyBitch??
You lied in this thread. You claimed CrowdStrike altered the disk image they provided to the FBI but you can't prove that.
Odd then that it was used in the indictments of the Russian nationals charged
There’s a final bit of evidence that the FBI got what it wanted from the DNC, and it was filed in the U.S. District Court in Washington, D.C. last Friday: 29-pages of inside details showing exactly how and when the GRU’s hackers moved through the DNC’s network on their mission to help Trump.
18 U.S. Code § 2385 - Advocating overthrow of GovernmentDumb ass that idiot thinks a coupe is not a crime lol
Feel free to name the actual criminal code. Or just keep pulling this out of Trump's ass.
Either way it will be amusing.
Wow, what a mindless parrot you are, huh? Trump says "coup," and you ask, how high?The 'death penalty'.....for what exactly?
Do you have eyes?
It's called a coup attempt!
You're telling me you can't see the filth is trying to unseat a duly elected president? And have been since before his inauguration?
Dumbfuck.... indictments that go nowhere because the defendants can't be brought to trial -- NOT because the evidence is "worthless and can't be used in court."indictments that went nowhere. When the trial date? If it had gone to court Judge would have kick any evidence crowd stikr gave to the FBI out as inadmissibleA lot of claims have been made and anything crowdstrike gave to the FBI is worthless and can never be used in a court of law.LOLYou posted this lie way to soon
I am a Trump supporter and I DON'T LIE
SO THAT MAKES YOU A LYING SACK OF SHIT.
You don't lie, PussyBitch??
You lied in this thread. You claimed CrowdStrike altered the disk image they provided to the FBI but you can't prove that.
Odd then that it was used in the indictments of the Russian nationals charged
There’s a final bit of evidence that the FBI got what it wanted from the DNC, and it was filed in the U.S. District Court in Washington, D.C. last Friday: 29-pages of inside details showing exactly how and when the GRU’s hackers moved through the DNC’s network on their mission to help Trump.
![]()
So what's the conspiracy theory? Crowdstrike covered up the Ukraineans stealing the DNc and podesta private emails and RELEASING the stolen emails to wikileaks, to the public so that it would actually help Hillary????WOW! Did this thread take off!
Ya see what the word CROWDSTRIKE does to liberals???
CROWDSTRIKE CROWDSTRIKE CROWDSTRIKE!!!
DRAIN THE SWAMP!
Come on...You can't be serious????
Enemies of America hell yesSo you wanna kill "leftists" too?I see leftist as enemies of America by the way they act.i've given up trying to explain this. a copy can be anything and certainly no guarantee it's of the original unmodified server.
The liberals on this board know that!
But they are lying filth...they can't help but argue because they don't want to see their heroes get the death penalty!
The 'death penalty'.....for what exactly?
I know you Trumpettes are big on wishing to be able to kill other Americans but what does your fevered brain tell you that is going to lead to you being able to legally kill other Americans?.
So what's the conspiracy theory? Crowdstrike covered up the Ukraineans stealing the DNc and podesta private emails and RELEASING the stolen emails to wikileaks,
And by "derail," you mean mock your ignorance over the very subject matter of your conspiracy thread?Do you see how hard they try to derail this thread?
They are scared to DEATH over the word "CROWDSTRIKE".
That's why I titled this thread "CROWDSTRIKE"
There ain't no getting away from the word CROWDSTRIKE![]()
A "floppy?" Exactly how old are you??CrowdStrike was able to provide the FBI a copy and they found that acceptable. Comey testified under oath that his agency deemed a copy was an "appropriate substitute."
They gave them a floppy with AUTOEXEC.BAT as the only file on it & comey found that acceptable?
You don't say?
they did not get the server, they got a copy of the server and Comey said it was good enough for the FBI to do their work...So what's the conspiracy theory? Crowdstrike covered up the Ukraineans stealing the DNc and podesta private emails and RELEASING the stolen emails to wikileaks, to the public so that it would actually help Hillary????WOW! Did this thread take off!
Ya see what the word CROWDSTRIKE does to liberals???
CROWDSTRIKE CROWDSTRIKE CROWDSTRIKE!!!
DRAIN THE SWAMP!
Come on...You can't be serious????
Cite your source that proves the FBI got the server.
A "floppy?" Exactly how old are you??
they did not get the server, they got a copy of the server and Comey said it was good enough for the FBI to do their work...