Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
44 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
FBI Review Contradicts 'Guccifer's' Claim of Hacking (Original Post) bigtree May 2016 OP
That came from sources connected to Brian Pagliano NWCorona May 2016 #1
veddy interesting that campaign manager is chosen to respond! grasswire May 2016 #2
Indeed. Barack_America May 2016 #5
yeah, they would have been better off to low ball this. grasswire May 2016 #10
And if they did that you'd say they were trying to bury it anigbrowl May 2016 #20
K&R mcar May 2016 #3
Me too catnhatnh May 2016 #43
Also the time frame for Brian's logs were before this supposed hack. NWCorona May 2016 #4
KNR Lucinda May 2016 #6
Your claim is based on reviewing the server's log files. jeff47 May 2016 #7
+1 BlindTiresias May 2016 #11
There is a lot more to computer forensics than "checking the log file" Tarc May 2016 #13
And they did not do that here. jeff47 May 2016 #17
Such as? bobbobbins01 May 2016 #22
Do tell, Mr. Hacker. Some of us are data security professionals (not just me), and we'd love DisgustipatedinCA May 2016 #41
Exactly, you can't prove something wasn't hacked by looking at some logs jfern May 2016 #14
What? You can do that? Bob41213 May 2016 #21
I've been pointing that out mindwalker_i May 2016 #39
Un-named source... Hacked? Maybe yes maybe no 4139 May 2016 #8
There's already a new Sanders supporter meme desperately trying to squash this; Tarc May 2016 #9
Except it is basically true BlindTiresias May 2016 #12
No it actually isn't. Not everything you see on NCIS and CSI and the rest Tarc May 2016 #15
Hahaha BlindTiresias May 2016 #16
You should not assume everyone else is only as knowledgeable on this subject jeff47 May 2016 #19
Doesn't sound like this was a very secure system.... Bob41213 May 2016 #28
You don't delete the log files. jeff47 May 2016 #29
That's what I meant. Bob41213 May 2016 #31
No, it really isn't, but you keep on reassuring yourself of that Tarc May 2016 #30
You apparently don't know who Guiccifer is and what he's done in the past... PoliticAverse May 2016 #32
First of all, you aren't an impartial observer mindwalker_i May 2016 #40
Its incredibly easy to leave no traces. bobbobbins01 May 2016 #25
Whether or not a crime was committed has NOTHING to do with whether or not HRC's server was hacked CoffeeCat May 2016 #18
However, proof of her server being compromised... Barack_America May 2016 #24
Guccifer provides basis for evidence and probable cause unc70 May 2016 #42
Absence of evidence is not evidence of absence. Fail. nt Bonobo May 2016 #23
Tha abscence of evidence does not contradict the claim berni_mccoy May 2016 #26
He didn't provide NBC with documentation to support his claims... from a jail cell. cherokeeprogressive May 2016 #27
Oh Well. nt BootinUp May 2016 #33
They don't care. Clinton Derangement Syndrome makes lying acceptable. nt BreakfastClub May 2016 #34
Well, the FBI is never wrong. Nt Logical May 2016 #35
For 3 months Hillary Clinton’s email access was unencrypted, vulnerable to spies w4rma May 2016 #36
Yep - her IT guy Pagliano said so himself! jmg257 May 2016 #37
This message was self-deleted by its author Autumn May 2016 #38
Good hackers dont leave traces, do they? bunnies May 2016 #44

NWCorona

(8,541 posts)
1. That came from sources connected to Brian Pagliano
Wed May 4, 2016, 09:46 PM
May 2016

Can anyone produce anything directly from the FBI in regards to Brian's logs?

grasswire

(50,130 posts)
2. veddy interesting that campaign manager is chosen to respond!
Wed May 4, 2016, 09:46 PM
May 2016

And he did, quickly and bigly!

That tells me the campaign is very worried about quashing this ASAP.

grasswire

(50,130 posts)
10. yeah, they would have been better off to low ball this.
Wed May 4, 2016, 09:53 PM
May 2016

Have some third rate press intern make the statement.

 

anigbrowl

(13,889 posts)
20. And if they did that you'd say they were trying to bury it
Wed May 4, 2016, 10:28 PM
May 2016

Basically no matter what they do you'll find some way to draw a negative inference from it while posturing as some sort of expert.

jeff47

(26,549 posts)
7. Your claim is based on reviewing the server's log files.
Wed May 4, 2016, 09:51 PM
May 2016

Guess what the first thing you do after hacking a system is? Modify the log files to remove evidence of your hack.

The log files do not indicate it was hacked, or that it was not hacked.

Tarc

(10,476 posts)
13. There is a lot more to computer forensics than "checking the log file"
Wed May 4, 2016, 09:54 PM
May 2016

Christ on a crutch, Hollywood hackers are not realistic depictions, y'know...

jeff47

(26,549 posts)
17. And they did not do that here.
Wed May 4, 2016, 09:58 PM
May 2016

Every story talking about this review explicitly said they only reviewed the log files.

 

DisgustipatedinCA

(12,530 posts)
41. Do tell, Mr. Hacker. Some of us are data security professionals (not just me), and we'd love
Thu May 5, 2016, 01:49 AM
May 2016

for you to share your knowledge.

mindwalker_i

(4,407 posts)
39. I've been pointing that out
Thu May 5, 2016, 12:39 AM
May 2016

It's nearly impossible to prove a negative and this is a real-world case. So the logs don't show anything, but logrotate could be the cause of that (emerge logrotate to periodically delete logs). Which logs? Just sendmail? Did the hacker get in with a different server (as in client/server)? Did they delete the log entries, or did Hillary's dude delete the log entries before turning them over?

The statement that the logs don't show a hack provides no useful information.

Tarc

(10,476 posts)
9. There's already a new Sanders supporter meme desperately trying to squash this;
Wed May 4, 2016, 09:53 PM
May 2016

"Really good hackers don't leave traces!"


jeff47

(26,549 posts)
19. You should not assume everyone else is only as knowledgeable on this subject
Wed May 4, 2016, 10:15 PM
May 2016

as you are.

There are plenty of people here who are extremely knowledgeable on this subject.

And removing traces from obvious places like the log files is indeed done by anyone above script kiddie.

Bob41213

(491 posts)
28. Doesn't sound like this was a very secure system....
Wed May 4, 2016, 10:46 PM
May 2016

I don't think they had a firewall in place beyond the Windows firewall (and even then it sounds like they left a lot open). And based on everything I read, I doubt they had any intrusion detection in place. So it's probably as easy as you say to delete log files.

jeff47

(26,549 posts)
29. You don't delete the log files.
Wed May 4, 2016, 10:48 PM
May 2016

Deleting the log files makes it obvious someone was there.

Instead, you delete the entries in the log file that show you were there. You leave the rest of the spam in place.

Bob41213

(491 posts)
31. That's what I meant.
Wed May 4, 2016, 10:49 PM
May 2016

I might have mispoke but by delete the logs, I meant delete the line or lines related to your endeavor. I guess I should have said delete the log entries.

Tarc

(10,476 posts)
30. No, it really isn't, but you keep on reassuring yourself of that
Wed May 4, 2016, 10:49 PM
May 2016

as Emailgate is Sanders' Hail Mary shot at the nomination.

When "Guccifer" goes down in history as the next "Curveball", we'll just add it to the long (long long) list of Camp Sanders missteps.


mindwalker_i

(4,407 posts)
40. First of all, you aren't an impartial observer
Thu May 5, 2016, 12:44 AM
May 2016

As a Hillary supporter (evidenced by the rightward arrow), you have an emotional attachment to a specific outcome. Like Scalia judging Cheney.

More importantly deleting log entries is absolutely trivial. Even if the statement that nothing was found in the logs is true, there are so many ways to clear out stuff from logs as to make the statement meaningless. What logs? Are they the sendmail logs or do they cover other daemons? Like Apache, SSH, Telnet, etc.

And if it's Hillary's server and she is under investigation, she has a motive to delete the entries as well.

Lack of proof, especially in a limited search, does not prove lack of activity.


On edit: the added ;rofl; is the equivalent of Hillary's cackle after someone brings up something she doesn't like.

bobbobbins01

(1,681 posts)
25. Its incredibly easy to leave no traces.
Wed May 4, 2016, 10:38 PM
May 2016

"The fundamental problem with rootkit detection is that if the operating system has been subverted, particularly by a kernel-level rootkit, it cannot be trusted to find unauthorized modifications to itself or its components."

CoffeeCat

(24,411 posts)
18. Whether or not a crime was committed has NOTHING to do with whether or not HRC's server was hacked
Wed May 4, 2016, 10:10 PM
May 2016

It doesn't matter if her private, unsecure email server was hacked. Any hacking (or lack thereof) is irrelevant to the investigation into her private server.

I get that Guccifer is in the news. However, what he did or didn't do--seems like nothing more than a salacious sidebar-story.

The FBI is investigating her use of the private email server, as it relates to the laws governing the proper handling of classified materials.

Taking classified materials into a Starbucks and leaving them unattended on a table for ten hours--would be illegal. And prosecutable. It wouldn't matter if no one sat down at that table and read the documents, or if six people sat down and read the documents. From a legal perspective, the question is--the did person mishandle classified information?







Barack_America

(28,876 posts)
24. However, proof of her server being compromised...
Wed May 4, 2016, 10:37 PM
May 2016

...could make it very difficult for the DOJ not to go along with any recommendation to indict.

Despite, once again, highlighting the consequences of Hillary's poor "judgment".

unc70

(6,118 posts)
42. Guccifer provides basis for evidence and probable cause
Thu May 5, 2016, 02:53 AM
May 2016

Guccifer is important in providing probable cause for the investigation of Blumenthal and through him of Clinton and her staff.

The rest may or may not be important.

 

berni_mccoy

(23,018 posts)
26. Tha abscence of evidence does not contradict the claim
Wed May 4, 2016, 10:41 PM
May 2016

In other words just because the FBI found nothing on an unprotected server doesn't mean it wasn't hacked.

 

cherokeeprogressive

(24,853 posts)
27. He didn't provide NBC with documentation to support his claims... from a jail cell.
Wed May 4, 2016, 10:42 PM
May 2016

And the highlighted sentence is just plain weird: "Clinton's email records did not indicate traces of hacking"

This isn't at all about email.

 

w4rma

(31,700 posts)
36. For 3 months Hillary Clinton’s email access was unencrypted, vulnerable to spies
Wed May 4, 2016, 11:12 PM
May 2016

In fact, during that three month window during which Clinton’s email server apparently lacked encryption, she had traveled abroad. According to a public log provided by the State Department’s office of the historian, Clinton had visited countries and places such as Japan, Indonesia, South Korea, China, Egypt, Israel, the Palestinian Authority, Belgium, Switzerland, Turkey and Mexico.

http://fortune.com/2015/03/11/hillary-clinton-email-unsecure/

jmg257

(11,996 posts)
37. Yep - her IT guy Pagliano said so himself!
Wed May 4, 2016, 11:40 PM
May 2016

WASHINGTON — A former aide to Hillary Clinton has turned over to the F.B.I. computer security logs from Mrs. Clinton’s private server, records that showed no evidence of foreign hacking, according to people close to a federal investigation into Mrs. Clinton’s emails.

Mrs. Clinton’s work-related emails as secretary of state, which have been made public as part of a Freedom of Information Act lawsuit, show that she received spam emails intended to try to lure her into clicking a malicious link. Those emails, known as “spear phishing” attempts, were traced to Russia, but it was not clear from the emails alone whether anyone clicked on those links or whether the security was compromised.

Mr. Pagliano told the agents that nothing in his security logs suggested that any intrusion occurred. Security logs keep track of, among other things, who accessed the network and when. They are not definitive, and forensic experts can sometimes spot sophisticated hacking that is not apparent in the logs, but computer security experts view logs as key documents when detecting hackers.

Response to bigtree (Original post)

Latest Discussions»Retired Forums»2016 Postmortem»FBI Review Contradicts 'G...