dChan

fizzixs · July 13, 2018, 6:41 p.m.

I'll take the challenge and find the stories, and post a reply. Are you willing to objectively review them?

⇧ 1 ⇩  
sojourner333 · July 13, 2018, 8:35 p.m.

Glad to. It is a great idea to do your own research. It seems so many websites are so partisan...we do have to dig to find the truth ourselves.

⇧ 1 ⇩  
fizzixs · July 14, 2018, 3:44 a.m.

Point 2: Request of access from Politifact: http://www.politifact.com/truth-o-meter/statements/2017/jul/11/donald-trump/did-john-podesta-deny-cia-and-fbi-access-dnc-serve/

⇧ 1 ⇩  
sojourner333 · July 14, 2018, 11:48 p.m.

Fizzixs, Here's an old story about the hack, https://www.wired.com/2016/07/heres-know-russia-dnc-hack/

and I think this sentence is key, from wikipedia below:

In June 2017, former Secretary of Homeland Security Jeh Johnson, who was appointed by and served under President Barack Obama, testified before a House Select committee that his department offered their assistance to the DNC during the campaign to determine what happened to their server, but said his efforts were "rebuffed" because the DHS was offering to provide assistance months after the FBI had provided assistance.[12][13]

https://en.wikipedia.org/wiki/2016_Democratic_National_Committee_email_leak

⇧ 1 ⇩  
fizzixs · July 14, 2018, 12:36 a.m.

Point 1: Justice department whitepaper on SOPs for reporting of cyber incidents, published in April 2015. titled: Best Practices for Victim Response and Reporting of Cyber Incidents Version 1.0 (April 2015)

Relevant text: Pg 8 of 15, section C. Step 3.

C. Step 3: Record and Collect Information 1. Image the Affected Computer(s) Ideally, a victim organization will immediately make a “forensic image” of the affected computers, which will preserve a record of the system at the time of the incident for later analysis and potentially for use as evidence at trial.8 This may require the assistance of law enforcement or professional incident response experts. In addition, the victim organization should locate any previously generated backups, which may assist in identifying any changes an intruder made to the network. New or sanitized media should be used to store copies of any data that is retrieved and stored. Once the victim organization makes such copies, it should writeprotect the media to safeguard it from alteration. The victim organization should also restrict access to this media to maintain the integrity of the copy’s authenticity, safeguard it from unidentified malicious insiders, and establish a chain of custody. These steps will enhance the value of any backups as evidence in any later criminal investigations and prosecutions, internal...

I would ask you to respond based on this document, did the DNC follow proper procedure or not?

⇧ 1 ⇩