>>9096918(lb)
>Ghidra
Notable
Mentioned the idea of >its use on the site yesterday while downloading transcripts & starting to dig in.
Specific to Sussman's transcript over embedded media.. hm… Beckons further investigation!
Speaking of Sussman… Just so happens that's the transcript I've read and am summarizing.
My preliminary notes, pt. 1:
https://docs.house.gov/meetings/IG/IG00/CPRT-116-IG00-D078.pdf
p. 7
-Sussmann came to Perkins Coie after 12 yrs at US DOJ, was a 7 yr prosecutor in the Computer Crime and Intellectual Property Section there
-Deals w/companies that have had data breaches or with various cybersecurity needs
-Firm has biggest practice for compliance with 3rd party providers, facilitating the legal process
-He worked as a prosecutor of some computer hacking cases, chaired the US delegation to the G-8 subgroup on high-tech crime, did various work on European Commission and other international bodies
p. 8
-His work led him to engage with political parties, including the DNC, began representing them in April 2016
-A colleague at the firm told him that an IT Vendor for the DNC had been in touch w/the FBI for some time about ‘potential threats to the DNC’, cyber threats and that the FBI had made a request for some data. Sussmann was asked to speak to the IT vendor and speak w/the FBI, and provide advice to the client as to how they should proceed. Graham Wilson was the colleague who provided info & made request to Sussmann.
pp.11-13
-FBI was wanting DNC logs to ascertain who has or had not been accessing the DNC computer network
-Logs would show authorized users’ activity and ‘could show a variety of unauthorized users’
-490 authorized users, 500 users on the network, 10 users to reverse-engineer understanding of their unauthorized access
Will post to the devoted thread when finished & with a more succinct summary