Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

cprise

(8,445 posts)
Fri Dec 18, 2015, 10:11 PM Dec 2015

No surprise: Tech sites aren't buying DNC hysteria on breech

I invite you to read and grok the overall reasoning of the commentary:
http://politics.slashdot.org/story/15/12/18/1536245/bernie-sanders-campaign-blocked-from-dnc-voter-info-after-improper-access#comments

Here is how the incident hit the top stories at networkworld.com:
http://www.networkworld.com/article/3017052/security/bernie-sanders-campaign-suspended-dnc-staffer-fired-ngp-van.html



Technologists older than, say, 35 yrs know this pattern well:

1. Person reports vulnerability to company
2. Company ignores report, sweeping it under the rug
3. Person exploits vulnerability, using proof to embarrass company into action
4. Company calls police on person, accuses them of theft

Number 4 very rarely happens anymore, for good reason: IT firms have an unfortunate record of ignoring user-reported vulnerabilities, and the market will eventually turn against companies who try to prosecute or otherwise smear people who hack to inform.

And no, the company ignoring the problem are not strictly entitled to advance notice of the breech/exploit. What counts is that the hacker has a record of reporting vulnerabilities, and did not use the data they gathered.

Like it or not, Clinton fans, that is the current established protocol in IT.

What's clear is that the DNC wasted not a minute in crying Wolf! to the Washington Post. They saw the incident as an instant throw them under the bus opportunity, and are showing (or feigning) an ignorance of the way technology works in this day and age. Both the DNC and the IT vendor are run by veterans of Clinton's mudslinging 2008 campaign; They are not inclined to heed *anything* a Sanders staffer says or does unless they can use it against the Sanders campaign.

What's not so clear but bears pointing out --- Having your own campaign's data sitting exposed is absolutely intolerable. Simply exploiting the situation to gain data from the opposing campaign STILL leaves your data exposed! IOW, what the DNC is charging would be the definition of insanity as it makes zero sense.

116 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
No surprise: Tech sites aren't buying DNC hysteria on breech (Original Post) cprise Dec 2015 OP
It's all contrived bullshit by Hill Shill DWS. morningfog Dec 2015 #1
Biingo! MissDeeds Dec 2015 #9
I spell "shill" like this: $Hill. Divernan Dec 2015 #26
lol ... thanks for the spelling lesson ;-) Hiraeth Dec 2015 #33
Love it! Plucketeer Dec 2015 #99
+10 artislife Dec 2015 #105
Yeah, she stole the data and gave it to the Sanders campaign. George II Dec 2015 #38
No data was stolen. This is bullshit. morningfog Dec 2015 #48
That is total BlueMTexpat Dec 2015 #70
Shame on Debbie wasserman rove. morningfog Dec 2015 #75
Did you see the activity logs published by Time? Check it out - they took data, LOTS of it. George II Dec 2015 #83
Complete crap CSStrowbridge Dec 2015 #116
LOGIC! THE OP IS BLINDING ME WITH SCIENCE! :D roguevalley Dec 2015 #69
I am an IT officer for a major financial firm that white labels partner-client data. This is serious! TheBlackAdder Dec 2015 #85
Bingo. nt SusanCalvin Dec 2015 #88
I wonder if you would immediately terminate the contract? MyNameGoesHere Dec 2015 #101
Any business that would not have a contingent BR plan in place, isn't trustworthy. TheBlackAdder Dec 2015 #103
Uh huh. MyNameGoesHere Dec 2015 #115
Really, is tech going to sink h? artislife Dec 2015 #107
you missunderstand me, blackadder. I am saluting you. I think I better roguevalley Dec 2015 #113
DWS is detrimental to the democratic party! She needs to be replaced! n/t RKP5637 Dec 2015 #77
All she wants is a Hillary cabinet spot. morningfog Dec 2015 #80
It still doesn't explain why staffers accessed specific data about early voting states. Metric System Dec 2015 #2
Proof. No one would believe that Bernie staffers could access it without proof. And when you get the LiberalArkie Dec 2015 #6
His use of the '_bernie' tag is an excellent point, plus cprise Dec 2015 #14
Found this on /. LiberalArkie Dec 2015 #19
And that site has a ton of Clinton supporters cprise Dec 2015 #24
The Sanders guy didn't "passively browse", he searched for early state voter data........ George II Dec 2015 #40
Will an Independant audit be able to discover conclusively whether or not the Clinton Campaign Dustlawyer Dec 2015 #45
Of course not. We all know hill actually stole data. morningfog Dec 2015 #50
I think the lawsuit will find that out notadmblnd Dec 2015 #56
He didn't even "browse through a firewall," SusanCalvin Dec 2015 #91
Exactly. It was deliberately blatant, not sneaky at all. n/t arcane1 Dec 2015 #21
BINGO!!! nt SusanCalvin Dec 2015 #89
Because that's where you would most readily find specialized cprise Dec 2015 #10
Thank you. SusanCalvin Dec 2015 #92
Duh-uh! Read Item #3 in the OP's post! Divernan Dec 2015 #29
exactly Champion Jack Dec 2015 #52
Maybe t.hey just querried for information in general, and some of it was Hillary's JDPriestly Dec 2015 #62
The specificity of the searches is damning. joshcryer Dec 2015 #3
The alternative is generating queries that don't find any Clinton-specific data cprise Dec 2015 #20
And yet they added "bernie" to all the user names so everyone would know who it was. arcane1 Dec 2015 #22
I see no evidence they did. joshcryer Dec 2015 #27
A baseless assertion. arcane1 Dec 2015 #30
Appending _something is extremely common in SQL. joshcryer Dec 2015 #31
Exactly n/t arcane1 Dec 2015 #34
So why was he fired? RandySF Dec 2015 #4
Common in IT. "Made the news" Someone has to fall on the sword. SH@T happens. LiberalArkie Dec 2015 #7
I don't think he should have been n/t DVRacer Dec 2015 #8
1. He acted without consent from management. cprise Dec 2015 #11
Bingo. nt SusanCalvin Dec 2015 #93
Excellent post. Thank you for shedding real light on this sad situation. nt 99th_Monkey Dec 2015 #5
Yeah ok. Like anyone would risk #4 for #3 JaneyVee Dec 2015 #12
Its done all the time. White hat hacking is an accepted part of IT. eom cprise Dec 2015 #16
Bingo. 99Forever Dec 2015 #13
Here is a good post from slashdot LiberalArkie Dec 2015 #15
This should be its own OP. n/t winter is coming Dec 2015 #18
Yes, it should be mindwalker_i Dec 2015 #25
"We have no information at all on whether anybody from the Clinton side was doing the same thing" arcane1 Dec 2015 #23
HRC specialties:hatchet jobs& knee-capping, ie/ Bimbo Eruption Squad. Divernan Dec 2015 #32
Bimbo Eruption Squad LOL navarth Dec 2015 #87
Google it - just not on a full stomach! Divernan Dec 2015 #106
interesting! Totally different meaning navarth Dec 2015 #109
Post removed Post removed Dec 2015 #35
They were ready like clockwork. Even here there were cries of "crimes" within minutes. arcane1 Dec 2015 #17
HUGE K & R !!! - Thank You !!! WillyT Dec 2015 #28
K&R valerief Dec 2015 #36
Looks like Bernie will be getting another donation from me TxDemChem Dec 2015 #37
Me too. Enthusiast Dec 2015 #74
K & R. Dont call me Shirley Dec 2015 #39
Kick and R BeanMusical Dec 2015 #41
KICK Segami Dec 2015 #42
This is how the Turd Way rolls folks. jalan48 Dec 2015 #43
Precisely. Enthusiast Dec 2015 #76
This message was self-deleted by its author billhicks76 Dec 2015 #44
"Most already hated her." Yeah, except the vast majority who would either pnwmom Dec 2015 #47
Keep in mind you're talking to somebody who is blaming this breach on Clinton mythology Dec 2015 #51
The Hypocrisy Is Palpable billhicks76 Dec 2015 #54
If They Did They Don't Anymore billhicks76 Dec 2015 #58
Dream on. nt pnwmom Dec 2015 #59
I Have A Dream billhicks76 Dec 2015 #61
Look Who's Backing Down billhicks76 Dec 2015 #64
I heard they backed down, SusanCalvin Dec 2015 #95
Post removed Post removed Dec 2015 #46
LOL " squirrel !!! " cprise Dec 2015 #63
"MSM do not define what is acceptable practice in technology." SusanCalvin Dec 2015 #96
They just never know when to stop, this time I think they went too far. Dustlawyer Dec 2015 #49
Yeah, I think the timing may have blown up in DWS's face... nt SusanCalvin Dec 2015 #97
k & r chervilant Dec 2015 #53
...and all the Hillsters in unison claiming "if you leave your door open..." aspirant Dec 2015 #67
then it's likely that your neighbours will wander in to see if you've had a heart attack Erich Bloodaxe BSN Dec 2015 #102
So, I'm wondering passiveporcupine Dec 2015 #55
The Bernie campaign knee-capped themselves murielm99 Dec 2015 #57
They found a hole the Clinton campaign might have been using all along. They reported it. nt Electric Monk Dec 2015 #65
Prove that Clinton did it. murielm99 Dec 2015 #66
Why do you know the Sander's campaign did? concreteblue Dec 2015 #104
Because they know that HRC does not have a lock on the nomination and Hepburn Dec 2015 #60
She isn't even close to a lock. Enthusiast Dec 2015 #78
Send Bernie another donation, and let the DNC know we have Bernie's back! ViseGrip Dec 2015 #68
Just a minor point ... BlueMTexpat Dec 2015 #71
K&R! This post should have hundreds of recommendations! Enthusiast Dec 2015 #72
As a programmer who had to debug ccinamon Dec 2015 #73
Thanks for this informative post. mnhtnbb Dec 2015 #79
If the Bernie people REALLY wanted to STEAL the data RoccoR5955 Dec 2015 #81
This is the case where Debbie, The Chairwoman, wants to make Bernie look bad, since she rladdi Dec 2015 #82
As time goes by, I am distrusting Clinton more and more each day. Where was her campaign DhhD Dec 2015 #84
LOL. I can't believe that Bernie fans can even convince themselves of this nonsense. DanTex Dec 2015 #86
K/R UglyGreed Dec 2015 #90
5. Profit! Babel_17 Dec 2015 #94
Sending this back to the TOP! l.o.o.s.e.e-2 Dec 2015 #98
Not to mention the fact that it was Clinton cronies who caused the breach to begin with. nt mhatrw Dec 2015 #100
And a kick for this, plus another interesting link from The Register GoneOffShore Dec 2015 #108
Kicked and recommended. Uncle Joe Dec 2015 #110
Makes our party's higher ups look incompetent handling sensitive data Babel_17 Dec 2015 #111
This is not how computers work... grendelsd Dec 2015 #112
Oh, they're just silicon valley weenies who dont want to "cooperate" on encryption & web censorship. Warren DeMontague Dec 2015 #114

BlueMTexpat

(15,370 posts)
70. That is total
Sat Dec 19, 2015, 07:07 AM
Dec 2015

and complete B***S*** and not worthy of any person who supports Democratic Underground.

Shame on you!

CSStrowbridge

(267 posts)
116. Complete crap
Sat Dec 19, 2015, 08:43 PM
Dec 2015

They took data. This is a provably fact.

You can argue that the security was flawed, but you can't pretend Clinton is the bad guy here.

Not unless you've completely left the realm of reality.

TheBlackAdder

(28,209 posts)
85. I am an IT officer for a major financial firm that white labels partner-client data. This is serious!
Sat Dec 19, 2015, 10:58 AM
Dec 2015

.


If you are handling accounts for internal clients, and perform services for partner-firms--

SECURITY BREACHES are NOT TOLERATED--AT ALL!


The fact that there have been multiple exposures of other client's information should warrant an immediate termination of the contract. Is is quite apparent that the vendor, and the DNC do not take the issue of data security seriously!



If you logged onto your bank account or credit card system and saw someone else's account information:

WOULD YOU KEEP THAT ACCOUNT OR CANCEL IT, KNOWING SOMEONE ELSE MIGHT BE SEEING YOUR INFORMATION?


.

 

MyNameGoesHere

(7,638 posts)
101. I wonder if you would immediately terminate the contract?
Sat Dec 19, 2015, 01:49 PM
Dec 2015

who would be taking over? I think that isn't a true representation of what would happen. It would take at least a day or two to get a replacement and longer to do a turnover, for which you would still need that terminated contractor.

Nothing like a firing after a breach to instill confidence in the shareholders. I am glad my company has a little more sense to calm down and think it through.

TheBlackAdder

(28,209 posts)
103. Any business that would not have a contingent BR plan in place, isn't trustworthy.
Sat Dec 19, 2015, 02:38 PM
Dec 2015

.


It's not like this had just popped up the other day, this was over 6-7 months in process.

There should have been contingencies in place, and plans for a migratory path staged.

===

What happens if they were housed at or near WTC-like event? What would you do for business continuity?

The fact that the DNC is sticking with this provider, when their IT architectural plans and system's designs seem woefully malconstructed, is a wonderment of possible cronyism.

===

Oh, and no, it would take a few months to transition properly. That is all an outsourcer needs to acquire a data center. Connect to the network, or get a copy of system tapes, bring up a shadow system at the outsourcer's site and study the layout.


The fact that a firewall is to blame, shows there was virtually no security, no session-state account tokens, no userid checking on the back-end side, nothing locking down the database, etc. This is a hacker's delight, not only from the outside, but from a mole.


.

 

artislife

(9,497 posts)
107. Really, is tech going to sink h?
Sat Dec 19, 2015, 03:21 PM
Dec 2015

It just may. From personal servers, to DNC data banks to social media, lets face it, h is not doing too well.


Maybe Luddites will always love her?

LiberalArkie

(15,719 posts)
6. Proof. No one would believe that Bernie staffers could access it without proof. And when you get the
Fri Dec 18, 2015, 10:24 PM
Dec 2015

proof, they say you stole it. Look at the log, the guy labeled everything as _bernie. He left the audit trail all the way through it.

cprise

(8,445 posts)
14. His use of the '_bernie' tag is an excellent point, plus
Fri Dec 18, 2015, 10:31 PM
Dec 2015

...there was no attempt otherwise to conceal.

LiberalArkie

(15,719 posts)
19. Found this on /.
Fri Dec 18, 2015, 10:36 PM
Dec 2015

by Chris Johnson (580)

NGP-VAN, the company that stores this data, which is run by an old Clinton hand who worked for them in 1992, the company paid $34,000 by Ready For Hillary, was repeatedly dropping their firewall between the two major Dem campaigns, Clinton and Sanders.

A guy who’s now fired from the Sanders team observed this. They complained once and were given assurances by the company that it was a mistake and wouldn’t happen again. Then it happened again. The guy decided to gauge how deeply the Clinton campaign was able to read into the Sanders campaign, by experimenting to see how much of the Clinton data he could get. That’s a bad call but by information security standards it’s not unthinkable: it’d be called a white hat intrusion, seeing how much of the firewall was down by probing the other side and assuming your own data was revealed exactly the same way. It does matter, but you still have to fire the guy.

One thing we can be sure of is, anything open to ‘stealing’ on the Clinton side was just as open on the Sanders side, literally. It’s the same system and the same firewall, and if the firewall keeps mysteriously going down for no good reason you have to wonder what’s up and more relevantly what’s being made available to those on the other side of the firewall, which might explain why the firewall’s going down like that.

The Sanders people did NOT throw a fit the first time this happened. But this time, the Sanders guy got caught crossing the nonexistent firewall. We have no information at all on whether anybody from the Clinton side was doing the same thing. During that time there WAS NO firewall and the guy wasn’t hacking, he was browsing, as anybody on either side could have done during those windows.

I think that’s accurate so far. The behavior of the firewall is important, whether or not it’s suspicious as a planned exploit of the Sanders data run by Clinton people who are at the DNC and at NGP-VAN.

In response to the Sanders guy browsing over and seeing data (how do they know? Because HE TOLD THEM. The Sanders team were the ones reporting this, that’s part of the story), the DNC suspended access by the Sanders campaign to THEIR OWN DATA at a crucial time. In order to get access back, at least as of this morning, the requirement is for the Sanders campaign to prove it has destroyed all data that it didn’t necessarily even download (remember, Sanders guy claims he was exploring the Clinton system because it would mirror the vulnerability of the Sanders system, and he’s not IN the Clinton system to go and browse the Sanders side to see how much is revealed, but he was IN the Sanders side and could look at the Clinton side and reasonably conclude that his own side was equally compromised)

And social media is blowing the hell up, not unreasonably, because it’s a goddamn hatchet job combined with a kneecapping to yank access by the Bernie campaign to its OWN DATA because a guy from the Bernie campaign passively browsed through a firewall he didn’t himself disable, a firewall run by a company controlled by Clinton partisans which had been going down already for reasons unknown.

cprise

(8,445 posts)
24. And that site has a ton of Clinton supporters
Fri Dec 18, 2015, 10:54 PM
Dec 2015

If they tried to repeat the DNC bullcrap to their tech peers, they know they'd get their asses handed to them. Slashdot has a robust moderation system.

If the DNC presses on with this, they will face an ever-widening credibility gap as non-techies make more and more references to the tech press.

George II

(67,782 posts)
40. The Sanders guy didn't "passively browse", he searched for early state voter data........
Fri Dec 18, 2015, 11:32 PM
Dec 2015

......and several other very useful data sets saved it.

One doesn't "passively browse" selected data, and one doesn't save "passively browsed" data.

Dustlawyer

(10,495 posts)
45. Will an Independant audit be able to discover conclusively whether or not the Clinton Campaign
Fri Dec 18, 2015, 11:41 PM
Dec 2015

got access to and downloaded, or had the DNC and/or their Vendor, send them the Sanders campaign's information? I know that forensic IT can recover deleted info, but not if it was overwritten many times. I also know that it can be time consuming and expensive to do this. I don't know much about audit trails and the like. Can someone answer this for me?

I find it transparent that neither the DNC nor the Clinton campaign criticized the Vendor. The young guy that ordered the download had to be very frustrated since they had already complained of the dropped firewall and been assured by both the DNC and the Vendor it wouldn't happen again.

I am also worried when I see Rachel Maddow run a "Special Report" first on a serious situation that has been around at least since the mayor of Flint declared a state of emergency a week or two ago. She then spent a relatively small amount of time on this story before going to Trump and the Republicans. She did not even mentioning that this was at least the second time this has happened, and that Bernie's team had brought it to their attention and was given the assurances it wouldn't happen again. This is pretty key to the story!

cprise

(8,445 posts)
10. Because that's where you would most readily find specialized
Fri Dec 18, 2015, 10:26 PM
Dec 2015

data entered by the Clinton campaign. Otherwise, the queries might come back looking like nothing was amiss.

The two campaigns essentially share the same database. Its the specific tags that each campaign puts on the voter data that is critical; Like the campaigns themselves, the data is focused on voters in the early states.

IOW: When hacking a bank to show a gaping (but ignored) hole, you don't restrict yourself to poor people.

JDPriestly

(57,936 posts)
62. Maybe t.hey just querried for information in general, and some of it was Hillary's
Sat Dec 19, 2015, 12:58 AM
Dec 2015

Could beba lot off reasons. Or could have been unintentional and for no reason.

Do we know whether Hillary saw any of Bernie's information?

cprise

(8,445 posts)
20. The alternative is generating queries that don't find any Clinton-specific data
Fri Dec 18, 2015, 10:44 PM
Dec 2015

or being so wide that they fetch the whole database.

What he did, and leaving the queries with 'bernie' tags, makes complete sense from the standpoint of documenting the problem.

 

arcane1

(38,613 posts)
22. And yet they added "bernie" to all the user names so everyone would know who it was.
Fri Dec 18, 2015, 10:50 PM
Dec 2015

No hiding, no secrecy. They did exactly what they claimed to have done: proved that the data was vulnerable and exposed.

99Forever

(14,524 posts)
13. Bingo.
Fri Dec 18, 2015, 10:30 PM
Dec 2015

Dirty campaigns use dirty tricks. Lots of 'em.

It ain't just by chance or for no good reason that the majority of American don't trust Hillary Clinton and those that do her dirty work even less.

LiberalArkie

(15,719 posts)
15. Here is a good post from slashdot
Fri Dec 18, 2015, 10:32 PM
Dec 2015

by Chris Johnson (580)

NGP-VAN, the company that stores this data, which is run by an old Clinton hand who worked for them in 1992, the company paid $34,000 by Ready For Hillary, was repeatedly dropping their firewall between the two major Dem campaigns, Clinton and Sanders.

A guy who’s now fired from the Sanders team observed this. They complained once and were given assurances by the company that it was a mistake and wouldn’t happen again. Then it happened again. The guy decided to gauge how deeply the Clinton campaign was able to read into the Sanders campaign, by experimenting to see how much of the Clinton data he could get. That’s a bad call but by information security standards it’s not unthinkable: it’d be called a white hat intrusion, seeing how much of the firewall was down by probing the other side and assuming your own data was revealed exactly the same way. It does matter, but you still have to fire the guy.

One thing we can be sure of is, anything open to ‘stealing’ on the Clinton side was just as open on the Sanders side, literally. It’s the same system and the same firewall, and if the firewall keeps mysteriously going down for no good reason you have to wonder what’s up and more relevantly what’s being made available to those on the other side of the firewall, which might explain why the firewall’s going down like that.

The Sanders people did NOT throw a fit the first time this happened. But this time, the Sanders guy got caught crossing the nonexistent firewall. We have no information at all on whether anybody from the Clinton side was doing the same thing. During that time there WAS NO firewall and the guy wasn’t hacking, he was browsing, as anybody on either side could have done during those windows.

I think that’s accurate so far. The behavior of the firewall is important, whether or not it’s suspicious as a planned exploit of the Sanders data run by Clinton people who are at the DNC and at NGP-VAN.

In response to the Sanders guy browsing over and seeing data (how do they know? Because HE TOLD THEM. The Sanders team were the ones reporting this, that’s part of the story), the DNC suspended access by the Sanders campaign to THEIR OWN DATA at a crucial time. In order to get access back, at least as of this morning, the requirement is for the Sanders campaign to prove it has destroyed all data that it didn’t necessarily even download (remember, Sanders guy claims he was exploring the Clinton system because it would mirror the vulnerability of the Sanders system, and he’s not IN the Clinton system to go and browse the Sanders side to see how much is revealed, but he was IN the Sanders side and could look at the Clinton side and reasonably conclude that his own side was equally compromised)

And social media is blowing the hell up, not unreasonably, because it’s a goddamn hatchet job combined with a kneecapping to yank access by the Bernie campaign to its OWN DATA because a guy from the Bernie campaign passively browsed through a firewall he didn’t himself disable, a firewall run by a company controlled by Clinton partisans which had been going down already for reasons unknown.

mindwalker_i

(4,407 posts)
25. Yes, it should be
Fri Dec 18, 2015, 10:54 PM
Dec 2015

Here's the main point: Clinton/DWS are complaining because a Sanders dude accessed data when Clinton/DWS compromised their own fucking system! Clinton/DWS have no standing for outrage.

 

arcane1

(38,613 posts)
23. "We have no information at all on whether anybody from the Clinton side was doing the same thing"
Fri Dec 18, 2015, 10:52 PM
Dec 2015

THAT is something I am most definitely curious about. Especially since it was basically Clinton's people dropping the firewall in the first place.

Divernan

(15,480 posts)
106. Google it - just not on a full stomach!
Sat Dec 19, 2015, 03:20 PM
Dec 2015

A term coined by Betsey Wright, Clinton's gubernatorial campaign manager in Arkansas.
https://en.wikipedia.org/wiki/Betsey_Wright

James Carville and Paul Begala worked on the squad during the Washington years. There's a lot of documentation on the web about this, just waiting to be dragged out again in the general election campaign if HRC is the nominee.

navarth

(5,927 posts)
109. interesting! Totally different meaning
Sat Dec 19, 2015, 04:22 PM
Dec 2015

...I took it as referring to a certain group of posters on DU, since it was so very descriptive.

Thanks for the info...and the laugh.

Response to LiberalArkie (Reply #15)

 

arcane1

(38,613 posts)
17. They were ready like clockwork. Even here there were cries of "crimes" within minutes.
Fri Dec 18, 2015, 10:33 PM
Dec 2015

Their actions don't make zero sense if they were making a conscious effort to discredit their biggest opponent.

TxDemChem

(1,918 posts)
37. Looks like Bernie will be getting another donation from me
Fri Dec 18, 2015, 11:21 PM
Dec 2015

This is ridiculous. The DNC has royally pissed off a lot of people.

jalan48

(13,870 posts)
43. This is how the Turd Way rolls folks.
Fri Dec 18, 2015, 11:34 PM
Dec 2015

And you can bet once in office it will roll the same way. Goldman Sachs anyone?

Response to cprise (Original post)

pnwmom

(108,980 posts)
47. "Most already hated her." Yeah, except the vast majority who would either
Fri Dec 18, 2015, 11:45 PM
Dec 2015

be satisfied or very enthusiastic to see her as the Democratic nominee.

 

mythology

(9,527 posts)
51. Keep in mind you're talking to somebody who is blaming this breach on Clinton
Fri Dec 18, 2015, 11:58 PM
Dec 2015

Expecting a fact based response is unlikely to be fruitful.

 

billhicks76

(5,082 posts)
54. The Hypocrisy Is Palpable
Sat Dec 19, 2015, 12:15 AM
Dec 2015

This was known since Oct. Of course she knew. She could turn out to be secretly working for Bush or an Alien and you would still support her. This time her campaign messed up bad. Watch.

 

billhicks76

(5,082 posts)
58. If They Did They Don't Anymore
Sat Dec 19, 2015, 12:39 AM
Dec 2015

Liberal pundits are lining up saying they will boycott her and vote third party. She's tearing apart the party. At this point it's selfish to support her. And by the way Clinton could access all Bernies voting data too. He was the one who altered to this in October. I know the Wall St War Machine wants Hillary but there are waaaaay more of us then them. Hillary will implode....again. There's so little to attack Bernie on and no racist innuendo like she did with Obama.

 

billhicks76

(5,082 posts)
64. Look Who's Backing Down
Sat Dec 19, 2015, 02:43 AM
Dec 2015

They knew a lawsuit would bring the facts to the light of day. They are that both campaigns could read each other's data. Bernie reported this in October. We all know Hillary was accessing because her family friend and CEO of the data company wouldn't fix it. They didn't need to download to view and could've done a lot by hand. Smarter maybe. But way dirtier.

SusanCalvin

(6,592 posts)
95. I heard they backed down,
Sat Dec 19, 2015, 12:28 PM
Dec 2015

but does that mean the lawsuit is off? I hope not. I want discovery. And I'd happily donate extra specifically to get that.

Response to cprise (Original post)

cprise

(8,445 posts)
63. LOL " squirrel !!! "
Sat Dec 19, 2015, 01:04 AM
Dec 2015

Fire-able and illegal are two very different things in this case.

And no... Its not illegal if you already reported the hole and you left the evidence intact and and you highlighted it and you didn't use the data to your own advantage. Sorry, that is a bucket of fail that the IT industry will never line up for (though DWS is lining YOU up for it...) and the legal precedents agree.

This accusation could have worked 20 years ago. Too bad its 2015 and MSM do not define what is acceptable practice in technology.

SusanCalvin

(6,592 posts)
96. "MSM do not define what is acceptable practice in technology."
Sat Dec 19, 2015, 12:30 PM
Dec 2015

Oh, I hope not. I'm afraid they will try. And hearing that Maddow hardly covered it really worries me.

Dustlawyer

(10,495 posts)
49. They just never know when to stop, this time I think they went too far.
Fri Dec 18, 2015, 11:47 PM
Dec 2015

I hope Berniemroadts their ass tomorrow night!

chervilant

(8,267 posts)
53. k & r
Sat Dec 19, 2015, 12:03 AM
Dec 2015

I was up in the wee hours last night, when this crap first hit the fan. The timing, the allegations, the "immediacy" of the accusations of data theft--all stunk like a dead skunk.

So, DWS, you've stepped in it BIG time. We, the vast Hoi Polloi, are not buying this Rovian ruse.

Erich Bloodaxe BSN

(14,733 posts)
102. then it's likely that your neighbours will wander in to see if you've had a heart attack
Sat Dec 19, 2015, 01:56 PM
Dec 2015

or are being robbed.

passiveporcupine

(8,175 posts)
55. So, I'm wondering
Sat Dec 19, 2015, 12:17 AM
Dec 2015

If Clinton is such a lock, as her supporters keep saying...why go to all this trouble to discredit and knee cap Sander's campaign efforts?

What are they afraid of if she's already got all the votes?

murielm99

(30,745 posts)
66. Prove that Clinton did it.
Sat Dec 19, 2015, 03:15 AM
Dec 2015

We know that Bernie's campaign did.

BTW, if you can prove Clinton's campaign used it, which they did not, and Bernie's did, how is it wrong for Clinton and not Bernie?

"They did it first!" is not an argument, except for children on the playground. And Clinton's campaign did not do it. Bernie's campaign is at fault.

concreteblue

(626 posts)
104. Why do you know the Sander's campaign did?
Sat Dec 19, 2015, 03:17 PM
Dec 2015

BECAUSE THEY REPORTED IT!
THe real tell is did the Clinton campaign use the disappearing firewall to THEIR advantage? How many times? What data did they steal?
IF the lawsuit continues we will find these things out. Which explains perfectly why DWS caved so quickly.
I personally will contribute to fund the lawsuit's continuation, and will urge the Sander's campaign via telephone and emailto do so.

Hepburn

(21,054 posts)
60. Because they know that HRC does not have a lock on the nomination and
Sat Dec 19, 2015, 12:42 AM
Dec 2015

with the big endorsements Bernie has gotten in the last few days, their fear is showing.

BlueMTexpat

(15,370 posts)
71. Just a minor point ...
Sat Dec 19, 2015, 07:13 AM
Dec 2015
Breach

1. a. An opening, tear, or rupture.
b. A gap or rift, especially in a solid structure such as a dike or fortification.
2. A violation or infraction, as of a contract, law, legal obligation, or promise.
3. A breaking up or disruption of friendly relations; an estrangement.
4. A leap of a whale from the water.
5. The breaking of waves or surf.


Breech (usually used in the term "breech birth&quot

A breech birth is the birth of a baby from a breech presentation, in which the baby exits the pelvis with the buttocks or feet first as opposed to the normal head-first presentation. In breech presentation, fetal heart sounds are heard just above the umbilicus.


Just to be clear on terms ... homonyms are a bitch.

ccinamon

(1,696 posts)
73. As a programmer who had to debug
Sat Dec 19, 2015, 07:42 AM
Dec 2015

lots of real-time issues....I learned pretty quick that whether or not your program that is at fault, you have to get as much evidence as possible proving 1) what happened, why, and what the permanent fix ; 2) it is not your program(s) ; and/or 3) what program/area is the problem.

So 24+ searches done is totally reasonable to DEBUG the problem and give as much info as possible to show the vendor how big of a hole there is.

BTW, great post, matches my experience, and links to info....bookmarked so I can refute posts by non-techies who like to distort and lie and have no clue as to how technology works.

 

RoccoR5955

(12,471 posts)
81. If the Bernie people REALLY wanted to STEAL the data
Sat Dec 19, 2015, 08:26 AM
Dec 2015

They would have found a way to purge the log files. These database web apps are not rocket surgery or brain science, many people can hack them.
The log files are intact, thus they WANTED the vulnerability to be found.

rladdi

(581 posts)
82. This is the case where Debbie, The Chairwoman, wants to make Bernie look bad, since she
Sat Dec 19, 2015, 09:04 AM
Dec 2015

support Clinton. She MUST RESIGN.

DhhD

(4,695 posts)
84. As time goes by, I am distrusting Clinton more and more each day. Where was her campaign
Sat Dec 19, 2015, 10:46 AM
Dec 2015

in getting this corrected in October?

DanTex

(20,709 posts)
86. LOL. I can't believe that Bernie fans can even convince themselves of this nonsense.
Sat Dec 19, 2015, 11:00 AM
Dec 2015

Yes, obviously his campaign was stealing sensitive data from Clinton just to prove to the DNC that it was possible. Couldn't possibly have anything to do with, umm, the actual campaign they are running.

Babel_17

(5,400 posts)
111. Makes our party's higher ups look incompetent handling sensitive data
Sat Dec 19, 2015, 06:06 PM
Dec 2015

And this is now news, when it didn't have to be.

 

grendelsd

(23 posts)
112. This is not how computers work...
Sat Dec 19, 2015, 06:52 PM
Dec 2015

(Source, I am a chief architect / vp of engineering for internet companies for the last 17 years).

I am very confused by the explanations coming for the DNC and vendor. There is not such thing as a 'firewall' that works this way. This is not how databases and security systems work.

A firewall prevents improper connections to a server / network. For example, most web sites are behind firewalls that block all incoming traffic except on port 80 and 443, which is port that web browsers hit (HTTP and HTTPS respectively).

Firewalls can also be configured to block people from behind the firewall from getting to certain sites ("The Great Firewall of China" is just one example.

Firewall in general do not filter or block content that is sent over one of the open points. Since the are probably using the secure protocol (HTTPS), that would be extraordinarily expensive.

More important, the content that was improperly served up was valid content that was sent to the wrong user. Firewalls have no concept of the person login on. Identity would be handled by the web applications.

Since the web application knows the identity of the person accessing the site, it is responsible for serving up the content. This is usually done through some sort of access control list (ACL). This is very old and well known technology which even predates the internet.

Nothing in their explanation of what went wrong makes any sense at any level. The idea that you could 'turn off' a firewall and give someone access to content is, well basically, insane. In nerd speak, 'it does not parse'.

To get the effect they had, someone would have to either have screwed up the initial configuration of the ACLs or someone purposefully reconfigured them. The former is in competence, the latter, well, why.

There are many other technical details and safeguards that would have 'come out of the box' meaning are basically free to implement.

I will be happy to answer any questions.



Latest Discussions»Retired Forums»2016 Postmortem»No surprise: Tech sites a...