Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

(VANITY) Does Latest DNC File Drop Suggest They Used a VoIP System?
VANITY ^

Posted on 07/27/2016 7:00:21 PM PDT by TigerClaws

Recorded voicemails were added to the Wikileaks file collection for the DNC.

if the DNC used a VoIP (voice over IP) system, ALL of their conversations on the system are digital files and could be part of a hack. This wouldn't cover cell conversations, but would cover any phone calls taking place from the office.

HuffPo suggested a couple days ago this could be, "Bigger Than Watergate."

Indeed, it could.

If what we've seen already in emails comprises the type of communications typical of the DNC, might make for some entertaining listening.

Think of who might have called the DNC as well over the course of the one year they were hacked. Hillary, perhaps?

Does anyone with tech knowledge know if you can have digital file voicemails but not have a VoIP?


TOPICS: Crime/Corruption; Politics/Elections; Your Opinion/Questions
KEYWORDS: 2016dncconvention; dnc; dncleaks; wikileaks
Navigation: use the links below to view more comments.
first 1-2021-4041-60 next last

1 posted on 07/27/2016 7:00:21 PM PDT by TigerClaws
[ Post Reply | Private Reply | View Replies]

To: TigerClaws

Voice mails have been stored on tape drives, hard drives, flash drives, etc since forever....


2 posted on 07/27/2016 7:02:19 PM PDT by Vendome (Don't take life so seriously-you won't live through it anyway - "Enjoy Yourself" ala Louis Prima)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

From what I understand.

There would only be “One sided” VM’s that are integrated into their email system. Very common practice.


3 posted on 07/27/2016 7:03:46 PM PDT by Zeneta
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vendome

Yep. I would also imagine the DNC has a VoIP phone system.


4 posted on 07/27/2016 7:04:32 PM PDT by matt04
[ Post Reply | Private Reply | To 2 | View Replies]

To: TigerClaws
That is what I would think, but PBX systems were once known for having poor password safeguards. But getting PBX messages out from outside would lessen the voice quality.

It's likely VoIP.

5 posted on 07/27/2016 7:04:36 PM PDT by ConservativeMind ("Humane" = "Don't pen up pets or eat meat, but allow infanticide, abortion, and euthanasia.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vendome

I would tend to think it is some kind of VOIP system. And the voice mails are being stored on a server.


6 posted on 07/27/2016 7:04:47 PM PDT by ABHurst51
[ Post Reply | Private Reply | To 2 | View Replies]

To: TigerClaws

NOTHING TO WORRY ABOUT...as long as they are honest and don’t break the law.

On second thought...


7 posted on 07/27/2016 7:04:55 PM PDT by BobL (A vote for anyone but Trump is a vote that HELPS HILLARY. Think about it.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

If they are using a VoIP system, which is fairly common today in large organizations, that means the content of all phone calls would be going over their network and if the hackers had control of the network then theoretically they could have gained access to all calls (as they were being made), not just those that were saved in voice mails.


8 posted on 07/27/2016 7:06:11 PM PDT by pb929
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

I’ve sold VOIP systems for the last decade. ANYTHING that was on their voicemail system is probably possessed by Wikileaks. A hacker could conceivably have set the system to record all calls on that same voicemail system. Depending on the software and licensing it could be done.

Especially if Call Center software was installed and licensed.

No need to tap the PRI lines, just back door into the PBX server.

A cloud based system would be more difficult, but not impossible. A premise based system would be child’s play.

L


9 posted on 07/27/2016 7:07:06 PM PDT by Lurker (Violence is rarely the answer. But when it is it is the only answer.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws
Yes. They were storing all VM in the same named account of every email box.

Search BY NAME.

10 posted on 07/27/2016 7:07:16 PM PDT by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

I will be curious to see who posts what in reply to your excellent question.

In the meantime, everything is ALREADY even bigger than Watergate.....how can it get bigger?

What will it take?

I think the sides are so dug in to their trenches, that nothing could get Hillary supporters to budge....all they can see are their social causes. Period.

They will sacrifice everything in exchange for abortion, etc. etc etc.

Stunning.


11 posted on 07/27/2016 7:08:17 PM PDT by Be Careful
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws
Ha ha ha ha ha, the stupid ba$tards! Just keeps gettin' better and better!

The dems know as much about the internet as the little birds I feed every day...

12 posted on 07/27/2016 7:08:24 PM PDT by W. (Hillary is just like that ex-partner you've hated forever!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pb929

Hackers may have used VOIP archive. But you can get access to others network.

This hacking is very massive. Hackers have full control. We have not heard about bank and credit cards of DNC, donors and officials.


13 posted on 07/27/2016 7:09:43 PM PDT by jennychase
[ Post Reply | Private Reply | To 8 | View Replies]

To: pb929
"then theoretically they could have gained access to all calls (as they were being made), not just those that were saved in voice mails."

That would be very unlikely. They would need agent software on nearly every network device and someplace to store all that data until it could be downloaded.

While the VoIP server sets up the call, the voice transmission actually passes via the shortest path between the end points of the call.

14 posted on 07/27/2016 7:11:07 PM PDT by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 8 | View Replies]

To: ABHurst51

See post 9.

L


15 posted on 07/27/2016 7:11:23 PM PDT by Lurker (Violence is rarely the answer. But when it is it is the only answer.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: jennychase

WHERE ARE THESE VOICEMAILS !


16 posted on 07/27/2016 7:11:30 PM PDT by knarf (I say things that are true ... I have no proof ... but they're true ... and it ticks people off)
[ Post Reply | Private Reply | To 13 | View Replies]

To: TigerClaws

I’m expecting something big to drop tomorrow on Hillary’s coronation day. Just my guess.


17 posted on 07/27/2016 7:11:44 PM PDT by Trumpnado2016 (It's the CURRUPTION, stupid!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: knarf

https://wikileaks.org/dnc-emails/?file=mp3&count=50#searchresult


18 posted on 07/27/2016 7:13:32 PM PDT by jennychase
[ Post Reply | Private Reply | To 16 | View Replies]

To: jennychase

https://www.youtube.com/watch?v=lXk4E_LS33Q


19 posted on 07/27/2016 7:14:07 PM PDT by jennychase
[ Post Reply | Private Reply | To 18 | View Replies]

To: TigerClaws

All I understand at this time is their mouths are writing more checks than there asses can cash . But they validate that the hacks are true by little things like kicking Debbie and Donna in the dumpsters . No matter “who” hacked em. The Donkey Dummies confirmed the data is valid.

Funny stuff ....


20 posted on 07/27/2016 7:14:17 PM PDT by Squantos ( Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-60 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson