Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: The Sons of Liberty

Did the federal agents who were doing the hacking deliberately leave the signs to show that the culprit was one of Obama’s agencies?


22 posted on 12/15/2016 11:04:00 AM PST by ryderann
[ Post Reply | Private Reply | To 1 | View Replies ]


To: ryderann

#22 you have to understand the mentality of these Wyle E. Coyote type Super Geniuses.

They all are like Illary. They think everyone is a stupid as they are or worse. So no chance anyone would catch them.

You know the type. Like John Podesta that used p@ssw0rd as his email account login password.


48 posted on 12/15/2016 11:58:54 AM PST by VRWCarea51 (The Original 1998 Version)
[ Post Reply | Private Reply | To 22 | View Replies ]

To: ryderann
Did the federal agents who were doing the hacking deliberately leave the signs to show that the culprit was one of Obama’s agencies?

From what I've heard and read, no. They are just inept and stupid like the rest of the 0bama regime, including the would-be 'Dick Tater' Hussein himself.

It was traced back through the IP address, though I'm not sure what alerted them that a hack attempt had been made.

54 posted on 12/15/2016 12:17:44 PM PST by The Sons of Liberty (Trump is not even President yet, but he has already accomplished more than 8 yrs of 0bama!)
[ Post Reply | Private Reply | To 22 | View Replies ]

To: ryderann

No, in order to route information from one computer to another you need a from and to destination. The number was left as a byproduct. It is not too hard to back trace someone doing a port probe. You can download scripts or automated hacking programs from the jihad if you promise to only use them on Jews. Many teenagers desiring to be hackers but too lazy to study do so. We used to call them script kiddies.

If the hacking routine finds a vulnerability it will install a backdoor and notify the hacker wannabee...

A real hacker would have taken over a few servers and routed their control through those servers to run their port attacks from someone else’s computer to help hide their tracks.

Either way you look at it, at worst it is treason, at best stunning incompetence.

The problem I have with the choice is that if the hacker was good enough to route through DHS, they would not be running full blown port probes.

A competent operative would identify the operating system of the target and saved his cover server for a proper port unerability for that system. Full port probes are as subtle as a bull in a China shop,

This leaves me to conclude arrogant leftist Treason.

So, was this a lone wolf, or were the highest levels of DHS and their bosses involved. Everyone involved should be doing hard time in prison within a year, and DHS should be pruned severely if not cut off at the roots entirely. If heads do not roll from this, Americans can no longer trust the DHS.

In the least, if election hack terrorism operations can be run from INSIDE the DHS itself, then they are beyond worthless and their budget this year should reflect that.


61 posted on 12/15/2016 5:18:19 PM PST by American in Israel (A wise man's heart directs him to the right, but the foolish mans heart directs him toward the left.)
[ Post Reply | Private Reply | To 22 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson