The Hillary Thread II

Post Reply
User avatar
Forty Two
Posts: 14978
Joined: Tue Jun 16, 2015 2:01 pm
About me: I am the grammar snob about whom your mother warned you.
Location: The Of Color Side of the Moon
Contact:

Re: The Hillary Thread II

Post by Forty Two » Fri Dec 30, 2016 3:33 pm

pErvin wrote:
Forty Two wrote:As Emperor of Tasmania, what will you do to make amends for the treatment of indigenous Tasmanians, like the forced removal of indigenous peoples to Flinders island and subsequent genocide?
As far as I'm aware there aren't any descendants of the Tasmanian Aborigines. It was a complete genocide.
That's the best way to do a genocide. No pesky heirs to go on bleating about reparations and rights of return and whatnot.
“When I was in college, I took a terrorism class. ... The thing that was interesting in the class was every time the professor said ‘Al Qaeda’ his shoulders went up, But you know, it is that you don’t say ‘America’ with an intensity, you don’t say ‘England’ with the intensity. You don’t say ‘the army’ with the intensity,” she continued. “... But you say these names [Al Qaeda] because you want that word to carry weight. You want it to be something.” - Ilhan Omar

User avatar
Forty Two
Posts: 14978
Joined: Tue Jun 16, 2015 2:01 pm
About me: I am the grammar snob about whom your mother warned you.
Location: The Of Color Side of the Moon
Contact:

Re: The Hillary Thread II

Post by Forty Two » Fri Dec 30, 2016 3:34 pm

Śiva wrote:Did they say how they identified the hackers in the "Grizzly Steppe" report? It seems to me they've done a fine job outlining how the hacks were achieved, but not so much on how the hackers were identified. They just seem to assert their identities.
So far, there has been no publication of who the hackers were, or how they know. Just general references to methods and capability and motive, and those references are always by "unnamed sources on condition of anonymity." I.e., bullshit.
“When I was in college, I took a terrorism class. ... The thing that was interesting in the class was every time the professor said ‘Al Qaeda’ his shoulders went up, But you know, it is that you don’t say ‘America’ with an intensity, you don’t say ‘England’ with the intensity. You don’t say ‘the army’ with the intensity,” she continued. “... But you say these names [Al Qaeda] because you want that word to carry weight. You want it to be something.” - Ilhan Omar

User avatar
Brian Peacock
Tipping cows since 1946
Posts: 39835
Joined: Thu Mar 05, 2009 11:44 am
About me: Ablate me:
Location: Location: Location:
Contact:

Re: The Hillary Thread II

Post by Brian Peacock » Fri Dec 30, 2016 5:30 pm

Forty Two wrote:
Śiva wrote:Did they say how they identified the hackers in the "Grizzly Steppe" report? It seems to me they've done a fine job outlining how the hacks were achieved, but not so much on how the hackers were identified. They just seem to assert their identities.
So far, there has been no publication of who the hackers were, or how they know. Just general references to methods and capability and motive, and those references are always by "unnamed sources on condition of anonymity." I.e., bullshit.
http://occupydemocrats.com/2016/12/29/f ... ost-trump/
Rationalia relies on voluntary donations. There is no obligation of course, but if you value this place and want to see it continue please consider making a small donation towards the forum's running costs.
Details on how to do that can be found here.

.

"It isn't necessary to imagine the world ending in fire or ice.
There are two other possibilities: one is paperwork, and the other is nostalgia."

Frank Zappa

"This is how humanity ends; bickering over the irrelevant."
Clinton Huxley » 21 Jun 2012 » 14:10:36 GMT
.

User avatar
Jason
Destroyer of words
Posts: 17782
Joined: Sat Apr 16, 2011 12:46 pm
Contact:

Re: The Hillary Thread II

Post by Jason » Fri Dec 30, 2016 5:41 pm

Brian Peacock wrote:
Forty Two wrote:
Śiva wrote:Did they say how they identified the hackers in the "Grizzly Steppe" report? It seems to me they've done a fine job outlining how the hacks were achieved, but not so much on how the hackers were identified. They just seem to assert their identities.
So far, there has been no publication of who the hackers were, or how they know. Just general references to methods and capability and motive, and those references are always by "unnamed sources on condition of anonymity." I.e., bullshit.
http://occupydemocrats.com/2016/12/29/f ... ost-trump/
And? We now know the codenames of those they claim are responsible. We still don't know who they are or how they know they're responsible.

User avatar
Forty Two
Posts: 14978
Joined: Tue Jun 16, 2015 2:01 pm
About me: I am the grammar snob about whom your mother warned you.
Location: The Of Color Side of the Moon
Contact:

Re: The Hillary Thread II

Post by Forty Two » Fri Dec 30, 2016 5:44 pm

Brian Peacock wrote:
Forty Two wrote:
Śiva wrote:Did they say how they identified the hackers in the "Grizzly Steppe" report? It seems to me they've done a fine job outlining how the hacks were achieved, but not so much on how the hackers were identified. They just seem to assert their identities.
So far, there has been no publication of who the hackers were, or how they know. Just general references to methods and capability and motive, and those references are always by "unnamed sources on condition of anonymity." I.e., bullshit.
http://occupydemocrats.com/2016/12/29/f ... ost-trump/
The occupy democrats site links to its source, The Hill, and apparently the report is short on actual evidence.
security experts say that the document provides little in the way of forensic "proof" to confirm the government's attribution. Private security firms — like CrowdStrike, who investigated the DNC breach — went much further, they say.

"The DHS statement is a restatement of already known public information, a series of technical indicators that are intended for use by cybersecurity professionals in finding and remediating APT28 malware on private sector networks, and some generic advice for companies as to how to improve their network security," said Matt Tait, founder of the U.K.-based security consultancy Capital Alpha Security.
APT28 refers to one of the hacking groups affiliated with Russian intelligence believed to have infiltrated the DNC.
The U.S. report, known as a “Joint Analysis Report” or JAR, refers to the Russian hacking campaign as “Grizzly Steppe.”

It comes as part of a slate of retaliatory measures against Russia issued Thursday by the Obama administration in response to the hacks, and expands on a joint statement issued by the two agencies in October, formally attributing the attacks to Russia.

In the October statement, officials described the the hacks and subsequent publication of stolen emails on WikiLeaks as an attempt to “interfere” with the U.S. election that is “consistent with the Russian-directed efforts,” but provided no evidence to support their assessment.
"That this document doesn't engage with the question of attribution seems, to me, to be quite deliberate," Tait noted. "It's purpose is to act as a measure against Russia (by adding a U.S. stamp of approval to private sector information, and making life harder for APT28 by exposing some of their malware), not to persuade the public that the DNC hack was by Russia."
http://thehill.com/policy/national-secu ... ia-hacking

So..... we're not saying it's Russia, but it's Russia.
“When I was in college, I took a terrorism class. ... The thing that was interesting in the class was every time the professor said ‘Al Qaeda’ his shoulders went up, But you know, it is that you don’t say ‘America’ with an intensity, you don’t say ‘England’ with the intensity. You don’t say ‘the army’ with the intensity,” she continued. “... But you say these names [Al Qaeda] because you want that word to carry weight. You want it to be something.” - Ilhan Omar

User avatar
Jason
Destroyer of words
Posts: 17782
Joined: Sat Apr 16, 2011 12:46 pm
Contact:

Re: The Hillary Thread II

Post by Jason » Fri Dec 30, 2016 6:32 pm

Exactly. These reports provide 2 diagrams of how they think the hacks happened and zero evidence to support any of it - most glaringly the assertion that Russia is responsible. They don't even present evidence that these "APTs" are responsible. It's just asserted.

The report is pure fluff.

User avatar
L'Emmerdeur
Posts: 6198
Joined: Wed Apr 06, 2011 11:04 pm
About me: Yuh wust nightmaya!
Contact:

Re: The Hillary Thread II

Post by L'Emmerdeur » Fri Dec 30, 2016 7:30 pm

It appears that neither Śiva nor Forty Two ever bothered to read the reports by private cyber-security firms that contain much more detailed evidence than the government has been willing to produce to date. When I provided links to a couple of these publicly available reports (there are more than those two), Śiva didn't bother to read them, and instead asked to be spoon-fed. So it goes.

User avatar
Forty Two
Posts: 14978
Joined: Tue Jun 16, 2015 2:01 pm
About me: I am the grammar snob about whom your mother warned you.
Location: The Of Color Side of the Moon
Contact:

Re: The Hillary Thread II

Post by Forty Two » Fri Dec 30, 2016 7:41 pm

I've read it, and it's a lot of assertion, with little offer of proof. The blurb you quoted, for example, was Crowdstrike standing by its findings that "two separate Russian intelligence-affiliated adversaries present in the DNC network" - that's the best bit, I guess. Crowdstrike found russian intelligence AFFILIATED adversaries "present" in the DNC network. That's hardly damning and hardly evidence. What's the coup-de-gras? What's the best evidence that the Russians did the hacking?
“When I was in college, I took a terrorism class. ... The thing that was interesting in the class was every time the professor said ‘Al Qaeda’ his shoulders went up, But you know, it is that you don’t say ‘America’ with an intensity, you don’t say ‘England’ with the intensity. You don’t say ‘the army’ with the intensity,” she continued. “... But you say these names [Al Qaeda] because you want that word to carry weight. You want it to be something.” - Ilhan Omar

User avatar
Jason
Destroyer of words
Posts: 17782
Joined: Sat Apr 16, 2011 12:46 pm
Contact:

Re: The Hillary Thread II

Post by Jason » Fri Dec 30, 2016 7:41 pm

It's your claim that they contain the evidence. The burden lies with you to prove it. You don't know how argumentation actually works do you?

For the record, I glanced at them, found nothing, and called on you to show me where this evidence is.

User avatar
Brian Peacock
Tipping cows since 1946
Posts: 39835
Joined: Thu Mar 05, 2009 11:44 am
About me: Ablate me:
Location: Location: Location:
Contact:

Re: The Hillary Thread II

Post by Brian Peacock » Fri Dec 30, 2016 8:06 pm

Hmm. You're saying the report is inconclusive because what it shares of the evidence isn't complete, or at least doesn't meet your particular standards to your particular satisfaction in this particular case. I guess you either trust the source or you don't - either the US intelligence services are trustworthy or they aren't.
Rationalia relies on voluntary donations. There is no obligation of course, but if you value this place and want to see it continue please consider making a small donation towards the forum's running costs.
Details on how to do that can be found here.

.

"It isn't necessary to imagine the world ending in fire or ice.
There are two other possibilities: one is paperwork, and the other is nostalgia."

Frank Zappa

"This is how humanity ends; bickering over the irrelevant."
Clinton Huxley » 21 Jun 2012 » 14:10:36 GMT
.

User avatar
Hermit
Posts: 25806
Joined: Thu Feb 26, 2009 12:44 am
About me: Cantankerous grump
Location: Ignore lithpt
Contact:

Re: The Hillary Thread II

Post by Hermit » Fri Dec 30, 2016 8:10 pm

Forty Two wrote:What's the coup-de-gras?
Finally getting fatally hit by a liver if you don't duck, you goose.

OK. Ask me another one.
I am, somehow, less interested in the weight and convolutions of Einstein’s brain than in the near certainty that people of equal talent have lived and died in cotton fields and sweatshops. - Stephen J. Gould

User avatar
Jason
Destroyer of words
Posts: 17782
Joined: Sat Apr 16, 2011 12:46 pm
Contact:

Re: The Hillary Thread II

Post by Jason » Fri Dec 30, 2016 8:10 pm

Was there any evidence in it? It was a 2-page infographic and 12 pages of recommendations on how to deal with similar potential threats in the future. What it amounts to is a formal assertion, a paragraph or two long. I trust evidence, and they've provided none.

User avatar
L'Emmerdeur
Posts: 6198
Joined: Wed Apr 06, 2011 11:04 pm
About me: Yuh wust nightmaya!
Contact:

Re: The Hillary Thread II

Post by L'Emmerdeur » Fri Dec 30, 2016 8:11 pm

Śiva wrote:It's your claim that they contain the evidence. The burden lies with you to prove it. You don't know how argumentation actually works do you?

For the record, I glanced at them, found nothing, and called on you to show me where this evidence is.
Your bleating about having "glanced at" the available information then accusing me of not knowing how argumentation works is amusing. I provided the sources of information, but it's not up to me to feed you pre-digested portions. If after actually reading what's there you can make valid criticisms, that would be an example of "how argumentation works."

This goes for Forty Two as well, who criticizes the quote that I provided, but appears not to have read either of the sources.

For good measure, here's another article about what private cyber-security firms have found:

"Findings from Analysis of DNC Intrusion Malware"

It appears that certain folks aren't willing to believe the unanimous findings of government intelligence agencies, and when offered information from non-government entities, they'd rather glance at it and pronounce it inadequate. So it goes.

User avatar
Jason
Destroyer of words
Posts: 17782
Joined: Sat Apr 16, 2011 12:46 pm
Contact:

Re: The Hillary Thread II

Post by Jason » Fri Dec 30, 2016 8:14 pm

L'Emmerdeur wrote:
Śiva wrote:It's your claim that they contain the evidence. The burden lies with you to prove it. You don't know how argumentation actually works do you?

For the record, I glanced at them, found nothing, and called on you to show me where this evidence is.
Your bleating about having "glanced at" the available information then accusing me of not knowing how argumentation works is amusing. I provided the sources of information, but it's not up to me to feed you pre-digested portions. If after actually reading what's there you can make valid criticisms, that would be an example of "how argumentation works."
No it isn't you execrable little turd of a sniper. Where do you normally frequent? Ratskep? It is not sufficient to provide a link to material which you claim substantiates your point. Try that for a research project and see how far it gets you. I did you the favour of looking at it, which is more than is reasonably required of me to do for my opponent, found nothing and asked you to point to where this evidence you claim exists is. Perhaps we have different standards of evidence. By my standards I found none. You've done nothing but snipe, waffle, and try to shift the burden of proof for your claim on to me.

User avatar
Jason
Destroyer of words
Posts: 17782
Joined: Sat Apr 16, 2011 12:46 pm
Contact:

Re: The Hillary Thread II

Post by Jason » Fri Dec 30, 2016 8:39 pm

Similarities in the code in the malware to code used in other malware in other attacks by the groups alleged to be responsible for the DNC hack isn't evidence of the truth of that allegation. Malware code is often shared between groups, especially old code that has already been deployed. The malware could have originated from almost anywhere - you can buy malware code on the Darknet like almost anything else.

That's like accusing Toyota of sponsoring terrorism because all the terrorists use Toyota Hilux's - they're just good, effective, and readily available.

ETA: Actually it's like accusing Japan of sponsoring terrorism because Toyota has affiliations with Japan.
Last edited by Jason on Fri Dec 30, 2016 8:59 pm, edited 1 time in total.

Post Reply

Who is online

Users browsing this forum: Google [Bot] and 15 guests