Posted on 01/05/2017 8:24:43 AM PST by Rockitz
Today at 9:30 am, senior U.S. intelligence officials face questions at a Senate hearing that will be dominated by the intelligence community's assessment that Russia meddled in the presidential election to help Donald Trump win. Participating will be James R. Clapper, Jr., Director Of National Intelligence. Marcel J. Lettre II, Under Secretary Of Defense For Intelligence and Admiral Michael S. Rogers, USN, Commander, United States Cyber Command.
The Armed Services Committee's cyber threats hearing on Thursday comes a day before the president-elect is to be briefed by the CIA and FBI directors along with the director of national intelligence on the investigation into Russia's alleged hacking efforts. Trump has been deeply critical of their findings, even appearing to back controversial WikiLeaks founder Julian Assange's contention that Russia did not provide him with hacked Democratic emails.
The committee's session is the first in a series aimed at investigating purported Russian cyber-attacks against U.S. interests and developing defenses sturdy enough to blunt future intrusions. "We will obviously be talking about the hacking, but the main thing is the whole issue of cybersecurity," the committee's Republican chairman, Sen. John McCain of Arizona, said ahead of the hearing. "Right now we have no policy, no strategy to counter cyberattacks."
More importantly, however, the hearing comes hours after Reuters reported overnight that U.S. intelligence agencies obtained what they considered to be conclusive evidence after the November election that Russia provided hacked material from the Democratic National Committee to WikiLeaks. However, in the latest change of the narrative, this time the allegation is that Russia provided the hacked data through a third party, three U.S. officials said on Wednesday.
(Excerpt) Read more at zerohedge.com ...
Gave a password to a business associate of mine once. He looked at it and said, what the heck is that ? I replied random numbers and letters. Apparently he wanted a word he could remember.
This has been known and public for 6 months...
International Data Group CSO Info
Salted Hash- Top security news
By Steve Ragan | Senior Staff Writer
|Follow
About |
Fundamental security insight to help you minimize risk and protect your organization
News
DNC hacker slams CrowdStrike, publishes opposition memo on Donald Trump
235 page opposition memo is among the recently released cache of files
CSO | Jun 15, 2016 2:07 PM PT
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday.
A hacker claiming responsibility for the DNC hack that made headlines earlier this week has slammed the security company responsible for the incident response, and leaked several documents compromised during the incident including a 235-page opposition memo on Donald Trump.
On Tuesday, the Washington Post reported that hackers believed to be Russian compromised the Democratic National Committee network and walked off with opposition research on Republican presidential candidate Donald Trump.
CrowdStrike, the security firm that was brought in to do incident response, suggested espionage as the likely motive. In fact, later that day, CrowdStrike published reports on two different “APT” groups in Russia, giving them the names Cozy Bear and Fancy Bear.
Overall, the Washington Post story actually read more like a promotion for CrowdStrike’s incident response offerings than actual security news.
But the fact is, someone targeted the DNC directly and that is news worth watching. At the same time, many experts felt it was a stretch to hype the incident as some sort of massive international conspiracy.
The hacker claiming responsibility for the DNC attack (using the alias Guccifer 2.0) mocked CrowdStrike’s assessment that he was a sophisticated hacker group, noting that he was pleased the company “appreciated my skills so highly. But in fact, it was easy, very easy.”
“Guccifer may have been the first one who penetrated Hillary Clintons and other Democrats mail servers. But he certainly wasnt the last. No wonder any other hacker could easily get access to the DNCs servers. Shame on CrowdStrike: Do you think Ive been in the DNCs networks for almost a year and saved only 2 documents? Do you really believe it?”
As proof, he published the full opposition report on Donald Trump, which describes the GOP presidential candidate having “no core.”
The 235-page memo is essentially a timeline and collection of comments and speeches given by Trump, as well as an overview of his political stance and mindset.
A 2-page memo to the DNC was included in the cache of posted files, which outlines the suggested positioning and public message strategy around the national election and the match-up between Donald Trump and Hillary Clinton.
In response to DNC comments that no financial information was accessed during the attack, several donor lists were also published on Wednesday by the hacker, showing millions in financial contributions from Hollywood elites, businesses, trade groups, and unions.
The hacker ended their disclosure with a notice that a bulk of the compromised documents, including memos marked confidential and secret allegedly taken from Hillary Clinton’s personal email server were delivered to WikiLeaks.
“The main part of the papers, thousands of files and mails, I gave to WikiLeaks. They will publish them soon. I guess CrowdStrike customers should think twice about companys competence,” they wrote.
Salted Hash reached out to CrowdStrike for comment, but the company wasn’t able to respond before this article was published. It will be updated with additional details as they become available.
Update:
CrowdStrike didn’t respond to questions directly, but issued the statement below.
“CrowdStrike stands fully by its analysis and findings identifying two separate Russian intelligence-affiliated adversaries present in the DNC network in May 2016. On June 15, 2016 a blog post to a WordPress site authored by an individual using the moniker Guccifer 2.0 claiming credit for breaching the Democratic National Committee. This blog post presents documents alleged to have originated from the DNC.
“Whether or not this posting is part of a Russian Intelligence disinformation campaign, we are exploring the documents’ authenticity and origin. Regardless, these claims do nothing to lessen our findings relating to the Russian government’s involvement, portions of which we have documented for the public and the greater security community.”
Please note that none of this amount to anything COMPARED to Hillary and her minions passing TS/SAP into across unprotected, public, networks with full knowledge of the White House...
Maybe PayPerView can schedule a Tag Team match between McCain/Graham and Sharpton/Jackson?
He lies!!! :)
I’m dump my data later. Or at least I’ll dump something later :)
Not if your goal is to get a few phrases that you can weave into sentences that make the Dems look good and Trump look bad. That is exactly what I heard on network radio news at 1 p.m.
Having the dishonest media on your side helps a lot. I heard on Chris Plante (DC talk show host) this morning that today's WaPo did not have anything about the Chicago kidnap/torture event even though it was reported last night by 7 p.m.
At least we know Julian is still a live breathing human. Maybe you are just some AI bot program. Lol. Don’t laugh too hard. We have had a few here, I suspect. Easy to throw a monkey wrench into their programming.
Calling me an AI bot program is an insult to AI bot programs :)
Just trying to figure out what the intentions of your AI programming would be, is near impossible. You seem to be an honest Freeper. Warts and all.
I’m an honest FReeper. Can’t say that 100 percent in life but I try!
Joined two years ago when I still thought FOX was conservative, gays would be content with civil unions, maybe there should be a minimum wage, and some other idiotic ideas.
Thanks to FR, they’re gone.
Also learned there was a Russia/China war, Vietnam isn’t a new country, lol, an asteroid could be minutes away from destroying earth and still not be detected, and hundred of other facts. Didn’t know there were other presidents from NY.
The list doesn’t end on FR. It’s like how school should be.
The only issue, of course, being the fact that the Russians didn’t “hack” Podesta’s password. In fact, no one did. Someone (Sean Rich?) with direct access to the DNC email server just downloaded the emails and provided them to Wikileaks. If you have administrator privileges, you don’t need his password...
That can be accomplished by using a version of a pet name (or “pet” name) with some letters substituted with special characters (”i” with “!”, “o” with “0”, “a” with “@”, “e” with “3”, etc.).
The great thing about my wife is that she comes up with completely random but memorable names for our children. Like “Melvin”, when neither of my sons is named Melvin (don’t worry, I’ve never used “Melvin” nor any version of it for a password, it’s a completely made-up example).
Everything so far is “in my opinion”. No presentation of any facts in the form of physical evidence, which there should be plenty of in the form of logs and screen captures.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Ok ladies and gentlemen, here’s the evidence we promised, right h... oops... that doesn’t say what we want it to say! STOP IT! PULL IT DOWN! SHUT IT DOWN!!
https://wikileaks.org/podesta-emails/emailid/22335
The so called report was prepared by the Clinton campaign and the DNC. They are the ones who originally released the “Russian hack” lies and disinformation.
The so called “report” contains no additional information. The FBI did not even investigate the hacked servers.
The story keeps changing as lies always do.
I just look around and let my eyes come to rest on some object and use that as the basis.
Shep Smith is on it now. What a weasel - I had to change the channel. He is beyond worthless. He needs to join Me-again Kelly on NBC.
Apparently, they have ZERO knowledge on how to hack too. That is why they outsourced the inspection of Podesta's computer.
As long as you use some of that substitution scheme, you’ll probably be OK.
Otherwise, if you just use the object name, you’re subject to a “dictionary attack”. Most hacking software uses some version of that as starting point once the favorites don’t get in, like “password”, the user’s ID, 12345, or iloveyou.
http://searchsecurity.techtarget.com/definition/dictionary-attack
They met to get their stories lined up to match information known to the public. Beyond that, nothing factual. Just unsupported claims.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.