I’ll wait for an HONEST assessment after January 20th. I see absolutely zero proof in this current report.
I read the “report.” It could have been cut and pasted from my Norton Antivirus newsletter or the stuff disseminated by my IT Department at work.
The ones who put this fake report together might want to start
looking for other jobs.
This is the type of swamp that needs to be drained.
The sooner, the better.
Fake News, Fake FBI Report. Meh.
I read a bunch of it. Looks like a typical “white paper” released by a security contractors to impress upper management types. It appears to say a lot but doesn’t really say that much. In particular it does not offer proof that Russia was behind the hacking - at least I did not see it - but then I did not read every bit of it.
It’s all about the Podesta hacks. What a jokenn
This putrid, hateful, immature little boy\man is just NOT leadership material and should be laughed off the international stage.
http://uspostman.com/2016/12/17/election-results-of-two-more-states-was-hacked-by-obamas-dhs/
http://www.breitbart.com/big-government/2016/12/12/cia-russian-hacking-story-sham/
http://www.politico.com/story/2016/11/white-house-hackers-election-recount-231849
When we design system , stuff listed on that pdf are so basic that are default security to be present in every code.I am doing that for atleast 20 yrs. Now a days, we do layers of protection.
I have reported couple of flaws to a major bank and Healthcare provider.
This document is complete garbage.
Russians, Romanians are best hackers. I have seen them in action during Hacking marathons. They are good.
AND for the finale of the worst President in US history, what does he do? Oh, he only restarts the cold war. Thank you Democraps for putting this disaster of all disasters into office not once but twice.
Its all hes got.
Passing off a pair of twos like a straight flush.
If they would just pay attention they would know the reason.
We didn't like her and obomas 8 years was a failure! Simple to understand!!!
I read the whole thing.
(Enter “JAR-16-20296” into any search engine)
The most specific “proof” they have is APT-28 and APT-29.
I’d like to see a couple of e-mails (with meta-data).
Otherwise, it was a “Computer Security 101” class in any community college.
Disappointing “proof”.
Russians have been hacking for years and not a peep. This is just a bunch of sore losers who can’t face the fact that they lost an election.
“.......Using the harvested credentials, APT28 was able to gain access and steal content, likely leading to the exfiltration of information from multiple senior party members. The U.S. Government assesses that information was leaked to the press and publicly disclosed........”
So the “proof” is “likely leading” and “U.S. Government assesses that the information was leaked to the press.”
OK Gov. whiz-kids, WHO LEAKED WHAT TO WHOM AND WHERE IS YOUR PROOF, CAN YOU SHOW SPECIFIC NSA METADATA, DO YOU HAVE EMAILS DISCUSSING THE HACKING ASSIGNMENTS OR RESULTS?
THERE IS NO PROOF THERE IS JUST “LIKELY LEADING” AND “ASSESSES THAT.” Someone should be terribly embarrassed by all this.
(Poster on ZH):
Davy Crockett Dec 29, 2016 4:46 PM
This is a 13 page document
Page 13 is how to contact the DHS and FBI, should you ever want to
Pages 6 - 12 is just a general vomitting of standard how to secure you server advice that has no relation to anything specific.
Page 5 - a 19 line PHP script (God help us) that you can run to see if your server has been infected by a specific root kit.
Page 4 - a list of hacker groups from Russia, supposedly. PinchedDuke, Tsar Team, and Energetic Bear to name a few. Must be Russian
Pages 2-3 - a meaningless graphic that says that Advanced Persistent Threat 28 and 29 are Russians because we said so
Page 1 - Boilerplate Introduction
I have to say, there is no meat here. The only pages that even pretend to be meat are pages 2, 3, and 4. Those pages are actually completely devoid of actual facts. The other 10 pages dont even pretend to have any actual evidence or facts.
If I had handed a "report" like that in to my 5th grade teacher she would have made me do it over and given me a 2nd report to do to get a grade on the assignment.
i did learn one thing from the “report”. Just like braindead Podesta was tricked by phishing email, the DNC was also compromised by a phishing email. In the case of the latter it led to alleged “Russian hacker” activity, but more likely resulted in the theft of some user’s emails. A successful phishing event is not evidence of anything other than simple stupidity on the part of the victim. It doesn’t not point to a sophisticated actor with sophisticated tools, quote the opposite.
Obama’s attempting to put Trump in a box...
And yet almost every single leftist out there swallows this hook, line and sinker, without question or thought. This is largely because they have been programmed to want to.
Trump needs a site where he methodically and logically deconstructs whatever the prevailing leftist mantra of the moment it. He can tweet the page as needed.