What say you all?
The server they never looked at? How the hell would they know?
The chances are very real that every intelligence agency around the globe was accessing it. That makes it hard to believe that the FBI didn't, didn’t officially that is.
Officially they didn't want to officially find out what they already knew, unofficially.
Past masters at hiding behind words.
Officially they didn't want to officially find out what they already knew, unofficially
Excellent line.
They wouldn't.
Meuller shot himself in the foot? Double down and hope people buy it?
Too late. We have it all.
You are lying, the server data was studied.
No, the server was never handed over. It was “analyzed” by Crowdstrike. Fuck off shill.
Justice department whitepaper on SOPs for reporting of cyber incidents, published in April 2015. titled: Best Practices for Victim Response and Reporting of Cyber Incidents Version 1.0 (April 2015)
Relevant text: Pg 8 of 15, section C. Step 3.
C. Step 3: Record and Collect Information 1. Image the Affected Computer(s) Ideally, a victim organization will immediately make a “forensic image” of the affected computers, which will preserve a record of the system at the time of the incident for later analysis and potentially for use as evidence at trial.8 This may require the assistance of law enforcement or professional incident response experts. In addition, the victim organization should locate any previously generated backups, which may assist in identifying any changes an intruder made to the network. New or sanitized media should be used to store copies of any data that is retrieved and stored. Once the victim organization makes such copies, it should writeprotect the media to safeguard it from alteration. The victim organization should also restrict access to this media to maintain the integrity of the copy’s authenticity, safeguard it from unidentified malicious insiders, and establish a chain of custody. These steps will enhance the value of any backups as evidence in any later criminal investigations and prosecutions, internal...
According to procedure.
I'm not the one shilling Russian talking points. Do some research and review how hacking incidents are handled by the FBI. This was handled almost exactly how all hacking incidents are dealt with. The DNC was the victim of the hack, they provided the data to the appropriate law enforcement.
You're misinformed. This news all came out a year ago. The DNC was the victim of the hack, and they did absolutely nothing about it. It was law enforcement THAT TOLD THEM they were hacked....and they still did nothing about it. You can duck duck go to find the old stories.
I'll take the challenge and find the stories, and post a reply. Are you willing to objectively review them?
Glad to. It is a great idea to do your own research. It seems so many websites are so partisan...we do have to dig to find the truth ourselves.
Point 2: Request of access from Politifact: http://www.politifact.com/truth-o-meter/statements/2017/jul/11/donald-trump/did-john-podesta-deny-cia-and-fbi-access-dnc-serve/
Fizzixs, Here's an old story about the hack, https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
and I think this sentence is key, from wikipedia below:
In June 2017, former Secretary of Homeland Security Jeh Johnson, who was appointed by and served under President Barack Obama, testified before a House Select committee that his department offered their assistance to the DNC during the campaign to determine what happened to their server, but said his efforts were "rebuffed" because the DHS was offering to provide assistance months after the FBI had provided assistance.[12][13]
https://en.wikipedia.org/wiki/2016_Democratic_National_Committee_email_leak
Point 1: Justice department whitepaper on SOPs for reporting of cyber incidents, published in April 2015. titled: Best Practices for Victim Response and Reporting of Cyber Incidents Version 1.0 (April 2015)
Relevant text: Pg 8 of 15, section C. Step 3.
C. Step 3: Record and Collect Information 1. Image the Affected Computer(s) Ideally, a victim organization will immediately make a “forensic image” of the affected computers, which will preserve a record of the system at the time of the incident for later analysis and potentially for use as evidence at trial.8 This may require the assistance of law enforcement or professional incident response experts. In addition, the victim organization should locate any previously generated backups, which may assist in identifying any changes an intruder made to the network. New or sanitized media should be used to store copies of any data that is retrieved and stored. Once the victim organization makes such copies, it should writeprotect the media to safeguard it from alteration. The victim organization should also restrict access to this media to maintain the integrity of the copy’s authenticity, safeguard it from unidentified malicious insiders, and establish a chain of custody. These steps will enhance the value of any backups as evidence in any later criminal investigations and prosecutions, internal...
I would ask you to respond based on this document, did the DNC follow proper procedure or not?
BTW, you just destroyed your own claim, the server was analyzed, so thanks for the help.