All I can say is, "Wow!"
#1 | POSTED BY JEFFJ
When it comes to tech stuff, I am at a loss. I don't understand how much of it works.
VIPS isn't some RW hack outfit though, as evidenced by other red flags they threw up during the Bush years that proved prescient.
#4 | POSTED BY JEFFJ
I was going to say as much after reading your first post but you said it for me in post 4.
While the VIPS assessment was discussion worthy when they first released it, it was also quickly dismissed by most in the security industry and has been completely discredited in the time that has passed since then.
The immediate criticism of their assessment was that they ignored many other likely possibilities, primarily that they make a huge assumption that the files were only copied once. We now know that what really happened was that there were numerous file transfers between DNC systems and "middle servers" to obfuscate the activity before eventually being transferred again to russian controlled servers. How do we know this happened? Because the Mueller report provides details on how the hackers planted malware on the computers of multiple dnc staffers. We know the malware is russian in origin and we even know exactly where and when it was created thanks to Swiss intelligence. We also know thanks to the Mueller report that the leaked data did not all come from the same source. It was stored in a multitude of various systems, some hosted in the cloud where DNC staffers wouldn't have physical access.
"Why did the DNC outsource examination of their server to a 3rd party and deny the FBI any access? Further, why did the FBI meekly go along with this?"
I'm having a real difficult time making sense of this.
#7 | POSTED BY JEFFJ
VIPS stated that "direct access to the actual computers is the first requirement" in any valid forensic analysis.
Fact is the FBI requested access to the server and were denied. Why were they denied access?
#11 | POSTED BY JEFFJ
VIPS would be correct if the hack had taken place in 2006 but it took place in 2016 and for most organizations VIPS would be wrong. The DNC computers in many cases are not physical computers. Like most organizations of considerable size these days, their email system is hosted across dozens of virtual servers, many of them cloud based.
Cloudstrike created forensic copies of the virtuals disks and provided them to the FBI. The FBI didn't need to be granted access to the DNC's network because they were given an exact duplicate of the systems. Crowdstrike has stated this publicly and it was confirmed in congressional testimony by James Comey. Furthermore, the FBI wouldn't have gained anything had they been given direct access to the DNC systems as soon as the evidence had been preserved then DNC, just as any other organization would do, would begin the process of rebuilding those systems and recovering their data so they can get back to work.