I'm not contradicting myself. It's an incomplete investigation and everyone knows it. The DNC is stalling and stonewalling. "But, those things are separate from the server." No! Really. Do tell. You confiscate all the infrastructure at the same time for examination. The server and any data in a cloud setup or a server farm should be investigated. Comparisons will have to be made for time stamps, when maliciousness supposedly took place and to do that, you need all components. "The FBI has confirmed that they have been provided sufficient data." - The person stating that is giving a political answer. Furthermore: " Do you dispute the determination that Russia was behind the hack? " So who was it, since you seem to know so much? The FSB? The GRU? The SVR? Some other organization? You sure it wasn't China using Russian infrastructure. Just spitballing Jeff, but since you know so much, who exactly was it? Are you sure it wasn't an eastern european crime syndicate? What are you basing your attribution on? |
Anonymous strikes again! |
Not quite. If their email server was a VM of they orivided snapshot images of the disks - which a lot of storage providers have as a feature,you can run an investigation on the snapshots of the disks. It's a common feature to snapshot disk LUNs, virtual machines or datastores. If those snapshots exist they can be provided. ZFS is a filesystem with one such feature. |
Yeah, not a great one though. |
Agreed, and besides, the backup provider - Datto - most likely can provide or has provided snapshots of the OS and disk. |
The private security group Crowdstrike said it was all Russia breaching the DNC server. FBI took them at their word. Obama hired a Crowdstrike officer as a part of his staff last summer (Commission on Enhancing National Cybersecurity). Why would the FBI need to see it after Crowdstrike vouched for the Russkies breach? Google Capital invested $100 million into Crowdstrike. Co-Founder and CTO of CrowdStrike Dmitri Alperovitch is a member of the Atlantic Council, which is funded by George Soros' Open Societies Foundation.
Don't see the problem. |
And as he pointed out, you don't have any better idea than he does. And apparently, less. Why do you keep digging your hole deeper? Just go play with your broken toys somewhere else so we don't have to scroll over you. |
To add crowdstrike had to walk about their conclusions a while back. Their work is shoddy. |
Interesting. Where are the Trilateral Commission and Illuminati references? They have to be part of this too. Oh yes, and Roswell. |
Could you clarify? It's not clear to me how you're contradicting the passage you quoted. |
This is what you get when you get a spokesman talking about forensic images. And I'll guarantee the spokesman is not technical. He's just blathering out what sounds good. And then the Jeffs of the world suddenly are quite happy only a private company is involved, but any other time, only the feds can do it. Very Convenient. |
Now it's making sense why Obama put Russia's involvement on the back burner. Lots of skeletons on the Dem side. |
I worked in a secure and. In secure environment and when classified or even unclassified data meant for certain people to see was inadvertently disclosed it was common for us to shit off service to sanitize. You're correct, investigating the infrastructure to include any back-end storage and cloud based storage and backups is crucial. I specifically remember one place I worked that was compromised by China, they got in through phishing schemes. We worked with a reputable forensic team from a good firm and we narrowed it down to the exact building and GPS coordinates from where the attack came from. You can do that. As noted by the PP, there can be more investigation |
No -- seriously -- PP quoted something and then attempted to respond to it and had typos which completely garbled whatever he was trying to say. Of course don't let that stop you from your own assumptions. |
What's to clarify? If they have the server that's great. If there is point in time snapshots of LUNs and file systems they can and should be investigated as well. Just having "the server" isn't having all the info. |