That's the best way to do a genocide. No pesky heirs to go on bleating about reparations and rights of return and whatnot.pErvin wrote:As far as I'm aware there aren't any descendants of the Tasmanian Aborigines. It was a complete genocide.Forty Two wrote:As Emperor of Tasmania, what will you do to make amends for the treatment of indigenous Tasmanians, like the forced removal of indigenous peoples to Flinders island and subsequent genocide?
The Hillary Thread II
- Forty Two
- Posts: 14978
- Joined: Tue Jun 16, 2015 2:01 pm
- About me: I am the grammar snob about whom your mother warned you.
- Location: The Of Color Side of the Moon
- Contact:
Re: The Hillary Thread II
“When I was in college, I took a terrorism class. ... The thing that was interesting in the class was every time the professor said ‘Al Qaeda’ his shoulders went up, But you know, it is that you don’t say ‘America’ with an intensity, you don’t say ‘England’ with the intensity. You don’t say ‘the army’ with the intensity,” she continued. “... But you say these names [Al Qaeda] because you want that word to carry weight. You want it to be something.” - Ilhan Omar
- Forty Two
- Posts: 14978
- Joined: Tue Jun 16, 2015 2:01 pm
- About me: I am the grammar snob about whom your mother warned you.
- Location: The Of Color Side of the Moon
- Contact:
Re: The Hillary Thread II
So far, there has been no publication of who the hackers were, or how they know. Just general references to methods and capability and motive, and those references are always by "unnamed sources on condition of anonymity." I.e., bullshit.Śiva wrote:Did they say how they identified the hackers in the "Grizzly Steppe" report? It seems to me they've done a fine job outlining how the hacks were achieved, but not so much on how the hackers were identified. They just seem to assert their identities.
“When I was in college, I took a terrorism class. ... The thing that was interesting in the class was every time the professor said ‘Al Qaeda’ his shoulders went up, But you know, it is that you don’t say ‘America’ with an intensity, you don’t say ‘England’ with the intensity. You don’t say ‘the army’ with the intensity,” she continued. “... But you say these names [Al Qaeda] because you want that word to carry weight. You want it to be something.” - Ilhan Omar
- Brian Peacock
- Tipping cows since 1946
- Posts: 39837
- Joined: Thu Mar 05, 2009 11:44 am
- About me: Ablate me:
- Location: Location: Location:
- Contact:
Re: The Hillary Thread II
http://occupydemocrats.com/2016/12/29/f ... ost-trump/Forty Two wrote:So far, there has been no publication of who the hackers were, or how they know. Just general references to methods and capability and motive, and those references are always by "unnamed sources on condition of anonymity." I.e., bullshit.Śiva wrote:Did they say how they identified the hackers in the "Grizzly Steppe" report? It seems to me they've done a fine job outlining how the hacks were achieved, but not so much on how the hackers were identified. They just seem to assert their identities.
Rationalia relies on voluntary donations. There is no obligation of course, but if you value this place and want to see it continue please consider making a small donation towards the forum's running costs.
Details on how to do that can be found here.
.
"It isn't necessary to imagine the world ending in fire or ice.
There are two other possibilities: one is paperwork, and the other is nostalgia."
Frank Zappa
"This is how humanity ends; bickering over the irrelevant."
Clinton Huxley » 21 Jun 2012 » 14:10:36 GMT
.
Details on how to do that can be found here.
.
"It isn't necessary to imagine the world ending in fire or ice.
There are two other possibilities: one is paperwork, and the other is nostalgia."
Frank Zappa
"This is how humanity ends; bickering over the irrelevant."
Clinton Huxley » 21 Jun 2012 » 14:10:36 GMT
Re: The Hillary Thread II
And? We now know the codenames of those they claim are responsible. We still don't know who they are or how they know they're responsible.Brian Peacock wrote:http://occupydemocrats.com/2016/12/29/f ... ost-trump/Forty Two wrote:So far, there has been no publication of who the hackers were, or how they know. Just general references to methods and capability and motive, and those references are always by "unnamed sources on condition of anonymity." I.e., bullshit.Śiva wrote:Did they say how they identified the hackers in the "Grizzly Steppe" report? It seems to me they've done a fine job outlining how the hacks were achieved, but not so much on how the hackers were identified. They just seem to assert their identities.
- Forty Two
- Posts: 14978
- Joined: Tue Jun 16, 2015 2:01 pm
- About me: I am the grammar snob about whom your mother warned you.
- Location: The Of Color Side of the Moon
- Contact:
Re: The Hillary Thread II
The occupy democrats site links to its source, The Hill, and apparently the report is short on actual evidence.Brian Peacock wrote:http://occupydemocrats.com/2016/12/29/f ... ost-trump/Forty Two wrote:So far, there has been no publication of who the hackers were, or how they know. Just general references to methods and capability and motive, and those references are always by "unnamed sources on condition of anonymity." I.e., bullshit.Śiva wrote:Did they say how they identified the hackers in the "Grizzly Steppe" report? It seems to me they've done a fine job outlining how the hacks were achieved, but not so much on how the hackers were identified. They just seem to assert their identities.
security experts say that the document provides little in the way of forensic "proof" to confirm the government's attribution. Private security firms — like CrowdStrike, who investigated the DNC breach — went much further, they say.
"The DHS statement is a restatement of already known public information, a series of technical indicators that are intended for use by cybersecurity professionals in finding and remediating APT28 malware on private sector networks, and some generic advice for companies as to how to improve their network security," said Matt Tait, founder of the U.K.-based security consultancy Capital Alpha Security.
APT28 refers to one of the hacking groups affiliated with Russian intelligence believed to have infiltrated the DNC.
The U.S. report, known as a “Joint Analysis Report” or JAR, refers to the Russian hacking campaign as “Grizzly Steppe.”
It comes as part of a slate of retaliatory measures against Russia issued Thursday by the Obama administration in response to the hacks, and expands on a joint statement issued by the two agencies in October, formally attributing the attacks to Russia.
In the October statement, officials described the the hacks and subsequent publication of stolen emails on WikiLeaks as an attempt to “interfere” with the U.S. election that is “consistent with the Russian-directed efforts,” but provided no evidence to support their assessment.
http://thehill.com/policy/national-secu ... ia-hacking"That this document doesn't engage with the question of attribution seems, to me, to be quite deliberate," Tait noted. "It's purpose is to act as a measure against Russia (by adding a U.S. stamp of approval to private sector information, and making life harder for APT28 by exposing some of their malware), not to persuade the public that the DNC hack was by Russia."
So..... we're not saying it's Russia, but it's Russia.
“When I was in college, I took a terrorism class. ... The thing that was interesting in the class was every time the professor said ‘Al Qaeda’ his shoulders went up, But you know, it is that you don’t say ‘America’ with an intensity, you don’t say ‘England’ with the intensity. You don’t say ‘the army’ with the intensity,” she continued. “... But you say these names [Al Qaeda] because you want that word to carry weight. You want it to be something.” - Ilhan Omar
Re: The Hillary Thread II
Exactly. These reports provide 2 diagrams of how they think the hacks happened and zero evidence to support any of it - most glaringly the assertion that Russia is responsible. They don't even present evidence that these "APTs" are responsible. It's just asserted.
The report is pure fluff.
The report is pure fluff.
- L'Emmerdeur
- Posts: 6198
- Joined: Wed Apr 06, 2011 11:04 pm
- About me: Yuh wust nightmaya!
- Contact:
Re: The Hillary Thread II
It appears that neither Śiva nor Forty Two ever bothered to read the reports by private cyber-security firms that contain much more detailed evidence than the government has been willing to produce to date. When I provided links to a couple of these publicly available reports (there are more than those two), Śiva didn't bother to read them, and instead asked to be spoon-fed. So it goes.
- Forty Two
- Posts: 14978
- Joined: Tue Jun 16, 2015 2:01 pm
- About me: I am the grammar snob about whom your mother warned you.
- Location: The Of Color Side of the Moon
- Contact:
Re: The Hillary Thread II
I've read it, and it's a lot of assertion, with little offer of proof. The blurb you quoted, for example, was Crowdstrike standing by its findings that "two separate Russian intelligence-affiliated adversaries present in the DNC network" - that's the best bit, I guess. Crowdstrike found russian intelligence AFFILIATED adversaries "present" in the DNC network. That's hardly damning and hardly evidence. What's the coup-de-gras? What's the best evidence that the Russians did the hacking?
“When I was in college, I took a terrorism class. ... The thing that was interesting in the class was every time the professor said ‘Al Qaeda’ his shoulders went up, But you know, it is that you don’t say ‘America’ with an intensity, you don’t say ‘England’ with the intensity. You don’t say ‘the army’ with the intensity,” she continued. “... But you say these names [Al Qaeda] because you want that word to carry weight. You want it to be something.” - Ilhan Omar
Re: The Hillary Thread II
It's your claim that they contain the evidence. The burden lies with you to prove it. You don't know how argumentation actually works do you?
For the record, I glanced at them, found nothing, and called on you to show me where this evidence is.
For the record, I glanced at them, found nothing, and called on you to show me where this evidence is.
- Brian Peacock
- Tipping cows since 1946
- Posts: 39837
- Joined: Thu Mar 05, 2009 11:44 am
- About me: Ablate me:
- Location: Location: Location:
- Contact:
Re: The Hillary Thread II
Hmm. You're saying the report is inconclusive because what it shares of the evidence isn't complete, or at least doesn't meet your particular standards to your particular satisfaction in this particular case. I guess you either trust the source or you don't - either the US intelligence services are trustworthy or they aren't.
Rationalia relies on voluntary donations. There is no obligation of course, but if you value this place and want to see it continue please consider making a small donation towards the forum's running costs.
Details on how to do that can be found here.
.
"It isn't necessary to imagine the world ending in fire or ice.
There are two other possibilities: one is paperwork, and the other is nostalgia."
Frank Zappa
"This is how humanity ends; bickering over the irrelevant."
Clinton Huxley » 21 Jun 2012 » 14:10:36 GMT
.
Details on how to do that can be found here.
.
"It isn't necessary to imagine the world ending in fire or ice.
There are two other possibilities: one is paperwork, and the other is nostalgia."
Frank Zappa
"This is how humanity ends; bickering over the irrelevant."
Clinton Huxley » 21 Jun 2012 » 14:10:36 GMT
- Hermit
- Posts: 25806
- Joined: Thu Feb 26, 2009 12:44 am
- About me: Cantankerous grump
- Location: Ignore lithpt
- Contact:
Re: The Hillary Thread II
Finally getting fatally hit by a liver if you don't duck, you goose.Forty Two wrote:What's the coup-de-gras?
OK. Ask me another one.
I am, somehow, less interested in the weight and convolutions of Einstein’s brain than in the near certainty that people of equal talent have lived and died in cotton fields and sweatshops. - Stephen J. Gould
Re: The Hillary Thread II
Was there any evidence in it? It was a 2-page infographic and 12 pages of recommendations on how to deal with similar potential threats in the future. What it amounts to is a formal assertion, a paragraph or two long. I trust evidence, and they've provided none.
- L'Emmerdeur
- Posts: 6198
- Joined: Wed Apr 06, 2011 11:04 pm
- About me: Yuh wust nightmaya!
- Contact:
Re: The Hillary Thread II
Your bleating about having "glanced at" the available information then accusing me of not knowing how argumentation works is amusing. I provided the sources of information, but it's not up to me to feed you pre-digested portions. If after actually reading what's there you can make valid criticisms, that would be an example of "how argumentation works."Śiva wrote:It's your claim that they contain the evidence. The burden lies with you to prove it. You don't know how argumentation actually works do you?
For the record, I glanced at them, found nothing, and called on you to show me where this evidence is.
This goes for Forty Two as well, who criticizes the quote that I provided, but appears not to have read either of the sources.
For good measure, here's another article about what private cyber-security firms have found:
"Findings from Analysis of DNC Intrusion Malware"
It appears that certain folks aren't willing to believe the unanimous findings of government intelligence agencies, and when offered information from non-government entities, they'd rather glance at it and pronounce it inadequate. So it goes.
Re: The Hillary Thread II
No it isn't you execrable little turd of a sniper. Where do you normally frequent? Ratskep? It is not sufficient to provide a link to material which you claim substantiates your point. Try that for a research project and see how far it gets you. I did you the favour of looking at it, which is more than is reasonably required of me to do for my opponent, found nothing and asked you to point to where this evidence you claim exists is. Perhaps we have different standards of evidence. By my standards I found none. You've done nothing but snipe, waffle, and try to shift the burden of proof for your claim on to me.L'Emmerdeur wrote:Your bleating about having "glanced at" the available information then accusing me of not knowing how argumentation works is amusing. I provided the sources of information, but it's not up to me to feed you pre-digested portions. If after actually reading what's there you can make valid criticisms, that would be an example of "how argumentation works."Śiva wrote:It's your claim that they contain the evidence. The burden lies with you to prove it. You don't know how argumentation actually works do you?
For the record, I glanced at them, found nothing, and called on you to show me where this evidence is.
Re: The Hillary Thread II
Similarities in the code in the malware to code used in other malware in other attacks by the groups alleged to be responsible for the DNC hack isn't evidence of the truth of that allegation. Malware code is often shared between groups, especially old code that has already been deployed. The malware could have originated from almost anywhere - you can buy malware code on the Darknet like almost anything else.L'Emmerdeur wrote: "Findings from Analysis of DNC Intrusion Malware"
That's like accusing Toyota of sponsoring terrorism because all the terrorists use Toyota Hilux's - they're just good, effective, and readily available.
ETA: Actually it's like accusing Japan of sponsoring terrorism because Toyota has affiliations with Japan.
Last edited by Jason on Fri Dec 30, 2016 8:59 pm, edited 1 time in total.
Who is online
Users browsing this forum: No registered users and 10 guests