• This is a political forum that is non-biased/non-partisan and treats every person's position on topics equally. This debate forum is not aligned to any political party. In today's politics, many ideas are split between and even within all the political parties. Often we find ourselves agreeing on one platform but some topics break our mold. We are here to discuss them in a civil political debate. If this is your first visit to our political forums, be sure to check out the RULES. Registering for debate politics is necessary before posting. Register today to participate - it's free!

Jailed Russian says he hacked DNC on Kremlin’s orders and can prove it

Wtf does Trump have to do with this?
A guy in a Russia jail says he hacked on Putin's orders and can prove it.
As an American don't you want to know what else was done and why to our election?
Where the **** are people that don't want to fight about R's and D's and just know what happened.

Can you guys forget Trump and politics for a minute and think about the country and all our no paper computer only ballots.

The 30% core Trump Base doesn't care about Russian meddling. Their boy got elected is all that matters. Trumpers always place Party over country.
 
I also have said over and over again that no collusion took place

English is not your first language it seems. I've already stated your position on this, no need to repeat it. I am simply highlighting that you are now saying that even if it did, it is irrelevant because votes weren't changed. The only problem is that votes being changed are not relevant to any charges being filed because we have laws on foreign interference in our elections.

, no laws violated,

I assure you that petitioning a foreign government to hack american institutions is against the law.

and this is nothing more than a witch hunt to distract from the results being generated. that is reality. What illegal activity took place and be specific?

I was wondering when you would get to the witch hunt claim, like the broken record your positions are. Am I supposed to take you seriously when you are screaming 'witch hunt' within 3 posts of a discussion with me? I bet you think you're a good debater too.
 
English is not your first language it seems. I've already stated your position on this, no need to repeat it. I am simply highlighting that you are now saying that even if it did, it is irrelevant because votes weren't changed. The only problem is that votes being changed are not relevant to any charges being filed because we have laws on foreign interference in our elections.



I assure you that petitioning a foreign government to hack american institutions is against the law.



I was wondering when you would get to the witch hunt claim, like the broken record your positions are. Am I supposed to take you seriously when you are screaming 'witch hunt' within 3 posts of a discussion with me? I bet you think you're a good debater too.

Against what law? You don't want something known to the world, don't put it on your computer

I keep wondering here we are one year later and you still are beating this dead horse, why? What results has Trump generated that bother you the most? You think the American electorate gives a damn now about the so called Russian hacking?
 
So all the FBI has to do is examine the server and...

oh...wait...

the server...

:doh
 
Against what law?

For starters (and I can't believe I have to actually answer this this question):

https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

The Computer Fraud and Abuse Act (CFAA)[1] was enacted by Congress in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. The law prohibits accessing a computer without authorization, or in excess of authorization.

You can read even more here!

https://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446
https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf
http://www.ncsl.org/research/teleco...ter-hacking-and-unauthorized-access-laws.aspx

When you ask such blatantly stupid questions, I can't help but think you aren't a serious poster. Maybe go back to arguing how well the economy is doing now that a RINO is in power? Because asking 'what law is broken' when a computer is used to gain unauthorized access to another computer shows that technology is not your forte.
 
Yes, Hillary was a bad and crooked candidate, but collusion with the enemy is treason.



Who colluded with the enemy and what proof to you have for such a serious charge?
 
So all the FBI has to do is examine the server and...

oh...wait...

the server...

:doh

A replica of the server was created before destruction of the original, this is well known information.
 
A replica of the server was created before destruction of the original, this is well known information.

Which means if this was true, it would have been confirmed already
 
Which means if this was true, it would have been confirmed already

Says who? There are a million ways to hide a .dat file. Half of these ways are available to script kiddies. What do you think a hacker with Kremlin tools can do?
 
A replica of the server was created before destruction of the original, this is well known information.
Riiiiiiiiiight. ;)

Created no doubt by the Ukrainian software firm the DNC had examine the server logs. The chain of evidence is VERY convincing and trustworthy.

Perhaps the Russians did attempt to hack the DNC, though since we KNOW John Podesta provided the server access, the greater question might be who DIDNT have access to the DNC servers?
 
Yes, Hillary was a bad and crooked candidate, but collusion with the enemy is treason.
Isnt that precisely what Hillary and the DNC did when they fabricated the Trump Dossier? So...you want them all arrested...right? Because...if not that would make you...what was that word you used earlier...oh yeah...a hypocrite.
 
For starters (and I can't believe I have to actually answer this this question):

https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act



You can read even more here!

https://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446
https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf
http://www.ncsl.org/research/teleco...ter-hacking-and-unauthorized-access-laws.aspx

When you ask such blatantly stupid questions, I can't help but think you aren't a serious poster. Maybe go back to arguing how well the economy is doing now that a RINO is in power? Because asking 'what law is broken' when a computer is used to gain unauthorized access to another computer shows that technology is not your forte.

All dealing with government computers not private sector computers but again you miss the point, what information did the Russians release that was false? Serious posters give a damn about the economy and national security not what some Russians did that changed no votes but sure as hell embarrassed the Democrats
 
Riiiiiiiiiight. ;)

Created no doubt by the Ukrainian software firm the DNC had examine the server logs. The chain of evidence is VERY convincing and trustworthy.

This replica was created a year ago, at the request of CrowdStrike, an American company (founded by Georgia Tech graduates and former FBI cyber crimes specialists).

It specializes in sniffing out cyber criminals including the ones who recently attacked Sony and helped the Chinese government spy on the US. They've been funded by Google, as well as several other high profile American companies. Not sure what Ukrainian company it is you're talking about.

The funniest part is that all of this information is freely available online. You seem to be way out of your depth in this topic.
 
This replica was created a year ago, at the request of CrowdStrike, an American company (founded by Georgia Tech graduates and former FBI cyber crimes specialists).

It specializes in sniffing out cyber criminals including the ones who recently attacked Sony and helped the Chinese government spy on the US. They've been funded by Google, as well as several other high profile American companies. Not sure what Ukrainian company it is you're talking about.

The funniest part is that all of this information is freely available online. You seem to be way out of your depth in this topic.
:lamo

"U.S. cybersecurity firm CrowdStrike has revised and retracted statements it used to buttress claims of Russian hacking during last year's American presidential election campaign. The shift followed a VOA report that the company misrepresented data published by an influential British think tank.

In December, CrowdStrike said it found evidence that Russians hacked into a Ukrainian artillery app, contributing to heavy losses of howitzers in Ukraine's war with pro-Russian separatists.

VOA reported Tuesday that the International Institute for Strategic Studies (IISS), which publishes an annual reference estimating the strength of world armed forces, disavowed the CrowdStrike report and said it had never been contacted by the company."
 
All dealing with government computers not private sector computers

LMAO, you're such an irrelevancy in this discussion:

https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act#Civil_Cases

Civil Cases[edit]
Theofel v. Farey Jones, 2003 U.S. App. Lexis 17963, decided August 28, 2003 (U.S. Court of Appeals for the Ninth Circuit), holding that the use of a civil subpoena which is "patently unlawful," "in bad faith," or "at least gross negligence" to gain access to stored email is a breach of both the CFAA and the Stored Communications Act.[26]


International Airport Centers, L.L.C. v. Citrin, 2006, 18 U.S.C. § 1030(a)(5)(A)(i), in which Jacob Citrin deleted files from his company computer before he quit, in order to conceal alleged bad behavior while he was an employee.[27]
LVRC Holdings v. Brekka, 2009 1030(a)(2), 1030(a)(4), in which LVRC sued Brekka for allegedly taking information about clients and using it to start his own competing business.[28][29]


Craigslist v. 3Taps, 2012. 3Taps was accused by Craigslist of breaching CFAA by circumventing an IP block in order to access Craigslist's website and scrape its classified ads without consent. In August 2013, US federal judge found 3Taps's actions violated CFAA and that it faces civil damages for “unauthorized access”. Judge Breyer wrote in his decision that "the average person does not use “anonymous proxies” to bypass an IP block set up to enforce a banning communicated via personally-addressed cease-and-desist letter".[30][31] He also noted "Congress apparently knew how to restrict the reach of the CFAA to only certain kinds of information, and it appreciated the public v. nonpublic distinction — but [the relevant section] contains no such restrictions or modifiers."[32]

Lee v. PMSI, Inc., 2011. PMSI, Inc. sued former employee Lee for violating the CFAA by browsing Facebook and checking personal email in violation of the company's acceptable use policy. The court found that breaching an employer's acceptable use policy was not "unauthorized access" under the act and, therefore, did not violate the CFAA.

Sony Computer Entertainment America v. George Hotz and Hotz v. SCEA, 2011. SCEA sued "Geohot" and others for jailbreaking the PlayStation 3 system. The lawsuit alleged, among other things, that Hotz violated 18 U.S.C. § 1030(a)(2)(c) ([by] taking info from any protected computer). Hotz denied liability and contested the Court's exercise of personal jurisdiction over him.[33] The parties settled out of court. The settlement caused Geohot to be unable to legally hack the PlayStation 3 system furthermore.

Pulte Homes, Inc. v. Laborers' International Union 2011. Pulte Homes brought a CFAA suit against the Laborers' International Union of North America (LIUNA). After Pulte fired an employee represented by the union, LIUNA urged members to call and send email to the company, expressing their opinions. As a result of the increased traffic, the company's email system crashed.[34][35]

Please stop talking, before your "opinions" end up looking more ****ing ignorant than they already do. The CFAA covers private sector computers, this is not up for discussion at this point. That I actually have to explain it to somebody who started out the thread talking about English being my second language is ridiculous.
 
The Russian FSB/GRU (Cozy Bear/Fancy Bear) both have distinct attack methods and coding quirks.

Cozy Bear prefers the SeaDaddy implant developed in Python and compiled with py2exe and another Powershell backdoor with persistence accomplished via the Windows Management Instrumentation (WMI) system.

Fancy Bear uses a different tradecraft, deploying X-Agent malware with capabilities to do remote command execution, file transmission and keylogging. It is executed via rundll32 commands.

These are like personalized calling cards and coding fingerprints. Distinct and exclusive.
 
Riiiiiiiiiight. ;)

Created no doubt by the Ukrainian software firm the DNC had examine the server logs.

:lamo

"U.S. cybersecurity firm CrowdStrike has revised and retracted statements it used to buttress claims of Russian hacking during last year's American presidential election campaign. The shift followed a VOA report that the company misrepresented data published by an influential British think tank.

4a4.gif


I've never seen you destroy your own claims in such a short time. You tried to discredit their claim by pointing out they were Ukrainian. I explained they were American. Then you went ahead and laughed, by pointing out they were American.

Congratulations, you've played yourself.
 
For starters (and I can't believe I have to actually answer this this question):

https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act



You can read even more here!

https://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446
https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf
http://www.ncsl.org/research/teleco...ter-hacking-and-unauthorized-access-laws.aspx

When you ask such blatantly stupid questions, I can't help but think you aren't a serious poster. Maybe go back to arguing how well the economy is doing now that a RINO is in power? Because asking 'what law is broken' when a computer is used to gain unauthorized access to another computer shows that technology is not your forte.

Look, i really get it, you are pissed off because damaging information was on the DNC computer, accurate by the way, and you believe that information cost Hillary the election. it didn't but you believe that and had it happened to Trump it wouldn't have bothered you at all. The issue however is you need to get over it, no data was changed, no votes changed, the DNC embarrassed and Hillary lost. Better luck next time maybe will less of a corrupt candidate and certainly not a radical leftist which represents today's Democratic Party.

There are basically two issues of concern to the American electorate, the economy and national security. Trump has addressed both and is generating results positively to the American people and will be rewarded in 2018 because of his policies not because of his rhetoric.

We had two choices in 2016, Trump or Hillary. I chose wisely and am getting the results I voted for. Why don't you tell me what Trump results bother you the most?
 
LMAO, you're such an irrelevancy in this discussion:

https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act#Civil_Cases



Please stop talking, before your "opinions" end up looking more ****ing ignorant than they already do. The CFAA covers private sector computers, this is not up for discussion at this point. That I actually have to explain it to somebody who started out the thread talking about English being my second language is ridiculous.

As I have stated over and over again, get over your hatred for Trump, the election is over, Obama's performance and results gave us Trump regardless of all the baseless claims you and the rest of the radicals want to blame. Rather sad that here we are 11 months into the Trump Presidency and you are still after an issue that didn't cost Hillary the election but her actions, her record, and her campaign did that all on their own

Since this is a major issue for you what is the outcome you would like to see?
 
4a4.gif


I've never seen you destroy your own claims in such a short time. You tried to discredit their claim by pointing out they were Ukrainian. I explained they were American. Then you went ahead and laughed, by pointing out they were American.

Congratulations, you've played yourself.
:lamo

Who is Victor Pinchuk?
 
Look, i really get it, you are pissed off because damaging information was on the DNC computer, accurate by the way, and you believe that information cost Hillary the election.

I am not pissed off at anything. I am correcting your absurdly stupid assertions one by one. You've claimed no crime has occurred when you gained unauthorized use to a computer. Whatever it is that they found, has no relevance to the fact that what they found was obtained through illegal means.

That you're still here after being destroyed for the following claims:

- There is no law violated when you gain unauthorized access to a computer
- Votes being changed has to be relevant to unauthorized access to a computer
- CFAA covers public sector computers but not private sector computers

Good grief, learn to give up and stop typing such easily refuted garbage. Maybe try going back to celebrating 11 out of 102 months of stock market growth?
 
Back
Top Bottom