RUSSIA/РОССИЯ THREAD—ASSANGE CHRGD W/ SPYING—DJT IMPEACHED TWICE-US TREASURY SANCTS KILIMNIK AS RUSSIAN AGNT

Dr. Acula

Hail Hydra
Supporter
Joined
Jul 26, 2012
Messages
25,778
Reputation
8,591
Daps
136,818
Wasn't it Buzzfeed that brought the obviously not fake dossier to the forefront? :patrice:
Yep and honestly I wish they didn't post that. It was doing that that forced the FBI and Steele to end their agreement to continue investigating on their behalf. Also folks related to the document ended up dead left and right. They literally may be responsible for people ending up dead.

They weren't the only ones with the dossier. Several other outlets had it and they decided not to publish it. They all shytted on buzzfeed, rightfully , for publishing it.
 

☑︎#VoteDemocrat

The Original
WOAT
Supporter
Joined
Dec 9, 2012
Messages
307,365
Reputation
-34,322
Daps
617,889
Reppin
The Deep State
LOUISE MENSCH WAS RIGHT THE WHOLE fukkING TIME!!! WEINER GOT CATFISHED!!! THATS WHY YEVGENIY NIKULIN GOT ARRESTED FOR HACKING FORMSPRING!!!


THEY WROTE THIS BACK IN NOVEMBER. THEY. FU¢KIN. KNEW!!!!



Commentary: Does the FBI think Russia hacked Weiner’s computer?


r

New York mayoral candidate Anthony Weiner and his wife Huma Abedin attend a news conference in New York, July 23, 2013. Weiner said on Tuesday he will stay in the race despite admitting he sent newly revealed sexually explicit online chats and photos even after he resigned...REUTERS/Eric Thayer

By Peter Van Buren

There are many reasons why Federal Bureau of Investigation Director James Comey could be interested in the Hillary Clinton-Huma Abedin emails on Anthony Weiner's home computer. The majority of those reasons for Comey's involvement have been laid out across the media spectrum.

But there may be another reason. Since we are spending so much of this election cycle on the Russians, let's think like Russian intelligence officers. What if this is not partisan? What if Comey is looking for spies?

Professional intelligence officers do not risk international incidents to play the equivalent of pranks on nation states, say by embarrassing the Democratic National Committee with leaked documents months before an election. That's Wikileaks-level stuff. No, when you want to rig an election, you rig an election. Have a look at the way the CIA historically manipulated elections – assassinations, massive demonstrations, paid off protesters and journalists, serious stuff directly affecting leaders and votes.

Now have a look at the National Security Agency documents from whistleblower Edward Snowden, and the incredible efforts the NSA goes to gather information. It is not to play political tricks. The world of real intelligence gathering is all about "the take": information. Russian President Vladimir Putin (or Barack Obama, or...) doesn't likely have on his desk a proposal to risk cyberwar to expose a CNN contributor for handing over debate questions. He wants hard information he can use to make significant decisions. What is Obama thinking, what are his plans, what are his negotiating points ahead of the next summit... information at a global, strategic level.

That's worth risking retaliation, maybe even a confrontation, for. How do you get to that kind of stuff?

How intelligence gathering works is in the end very simple: who has access to the information you want, what are their vulnerabilities, and how do you exploit those vulnerabilities to get the information. In other words, what does the target want (attention, sex, money, an appeal to patriotism or vanity, or in Weiner’s case, most likely simply a new person to sext with) and how can you give it to them?

As secretary of state, Clinton had access to extraordinarily sensitive material, both classified and unclassified. Abedin is arguably the most powerful person in Clinton's circle, and had access to much or all of that information. What Abedin knew would have been of great interest to Moscow.

How to get the info? Abedin's husband has admitted that he is a compulsive sexter. He prowls online message boards, and seemingly does little to hide his identity while doing it. He is the kind of dream package of vulnerabilities an intelligence officer waits a whole career to have fall into their lap.

Baiting the trap appears to be easy. As recently as August Weiner was in a flirty chat with someone he thought was a woman named Nikki, but was actually Nikki's male, Republican friend using the account to troll him. (Weiner later claimed he knew he was being set up.)

For the Russians, contacting Weiner would have been as easy as posting a few fake sexy photos and waiting for him to take a bite. Placing malware on his computer to see what was there was as easy as trading a few more photos with him. He clicks, he loads the malware, National Security Agency 101 level stuff. An intelligence officer then has access to Weiner's computer, as well as his home wireless network, and who knows what else. An internet-enabled nanny cam? A smartphone camera? Abedin's own devices attached to that same network? It seems an easy, cheap, predictable kind of fishing expedition.

ALSO IN COMMENTARY
To be fair, I doubt any intelligence officer could have believed their own eyes when they realized Weiner's computer was laden with what could be official United States government documents. Somebody in Moscow may have gotten a helluva promotion this year.

Now remember, this didn’t come from "several anonymous government officials.” It's all made up, just like a spy novel. Because no real Russian intelligence officer could ever have put these pieces together like this.



Full disclosure: Following the publication — during Clinton’s time as secretary of state — of my book critical of the State Department’s role in the Iraq War, the department unsuccessfully carried out termination proceedings against me. Instead, I retired voluntarily.

ABOUT THE AUTHOR
Peter Van Buren, a 24 year State Department veteran, is the author of "We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People.” His next book is “Hooper’s War: A Novel of WWII Japan.”
@WeMeantWell





@DonKnock @Hood Critic @LHilla @ReignAsKing @True Blue Moon @poRATCHETteacha @Sammy Steez @SJUGrad13 @88m3 @lotuseater80 @Cali_livin @Cobratron @Menelik II @RJY33 @greenygreen @jerniebert @Wepa Man @PlayerNinety_Nine @AZBeauty @Hogan in the Wolfpac @iceberg_is_on_fire @Airfeezy @wire28 @Atlrocafella @Ss4gogeta0 @smitty22 @Ms. Elaine @Reality @fact @Hood Critic @ExodusNirvana @re'up @Call Me James @Blessed Is the Man @BaggerofTea @GnauzBookOfRhymes @THE MACHINE @OneManGang
 

☑︎#VoteDemocrat

The Original
WOAT
Supporter
Joined
Dec 9, 2012
Messages
307,365
Reputation
-34,322
Daps
617,889
Reppin
The Deep State
Data Patterns Suggest Trump Tower/Spectrum Health Ran a “Stealth Data Machine” With Russia

Data Patterns Suggest Trump Tower/Spectrum Health Ran a “Stealth Data Machine” With Russia


We pull back the curtain on Jared Kushner’s “Stealth Data Machine.”

stealth-data-machine1.png


Jared Kushner is currently taking a victory lap, crowin’ about his “Stealth Data Machine” that put Donald Trump over the top in the 2016 race. Let’s pry off the lid and peer into the inner-workings of this “Data Machine.”

The Signal in the Noise

Building on the work of @LouiseMensch and data analysis by @Conspirator0 on Twitter, Tea Pain has stumbled onto a possible “signal in the noise” that opens a window into the data-swappin’ shenanigans going on between Trump Tower, Spectrum Health and Russia’s Alfa Bank during the election.

Spectrum Health, owned by Michigan’s powerful Devos family, attempted to explain the IP activity as “Voice over IP traffic”, whereas Alfa Bank offered an even more exotic explanation that “hackers attempted to make it look like we contacted Trump Tower.”

The data traffic, when analyzed, tells a very different story, a story of automated, orchestrated data sharing among multiple sites for a strategic end.

Tea Pain originally dismissed this story as a possible red-herring. With the Russia craze at a fever pitch, this activity could be explained by what Tea’s daddy used to say, “When you got a new hammer, everything looks like a nail.” But when Tea Pain saw the data patterns analyzed by Conspiritor0, he knew he’d spotted something mighty familiar: Database Replication. Put a pin in that, more on that later.

ping-duration.jpg


At first, data analysts were puzzled by what appeared to be random activity with no apparent pattern. Perhaps it was email activity? Maybe money transfers? But there were literally thousands of these IP “pings.”

Once the activity was charted, a pattern emerged. For example, a connection is made from Alfa Bank to Trump Tower, which may last anywhere from 1 minute to 15 minutes or more, followed by a longer “sleep” period. When averaged over months, these events charted an average time between connections to be 3660 seconds, or 1 hour and 1 minute. Whatever was running, it would hook up, transfer data for a few minutes, then go to sleep for an hour.

This was the clue that led Tea Pain to formulate a much clearer working model to explain what we were all seeing: SQL Server Database Replication between multiple sites.

database-replication.png


What Is Database Replication?

Database Replication is a rather simple concept. When you have a database with millions of records representing hundreds of gigabytes of data, and you would like to keep a copy of that database housed in 2 or more locations, it makes no sense to continually copy the entire database from point A to point B every time a change is made, so you “replicate” it.

This allows only the changes made to be sent from one database to another. This is accomplished by a process that runs on timely intervals, usually an hour, that wakes up and checks the changes made since the last hour and broadcasts those changes to the other database. The other database, in turn, check for its changes and broadcasts them in the other direction. Voila! Both database are identical!

So what does the data traffic patterns suggest? Check out the chart below. Behold, Kushner’s “Stealth Data Machine.”

russia-data-traffic.png


The white box illustrates the scope of data we can now observe. The bulk of the replication took place between Trump Tower and Alfa Bank, while smaller amounts of data were transferred between Trump Tower and Spectrum Health. If, for example, Trump Tower talked to Alfa Bank for 10 minutes, the next Spectrum-Trump Tower connection might last only one minute, indicating data replicated from Trump Tower to the Devos health care empire was being filtered, perhaps by “WHERE StateCode=’MI'” for example. But when changes were made at Spectrum, things looked very different.

ip-packetts.png


Conspiritor0 noted that when Spectrum connected to Trump Tower, Trump Tower’s next connect time was significantly longer, indicating Spectrum had modified a large chunk of records that had to be synced to Trump Tower, then pushed on to Alfa Bank. This detail was important in identifying that replication was in use. In this scenario, Trump Tower was functioning as a center-point, a data-distribution center if you will.

We don’t know what was in these data packets; that info is beyond our purview at this time, but ask yourself a simple question and you find your answer: “What does Trump Tower, the Devos Family and the Russians all have in common? A desire for Donald Trump to be President of the United States.

Tea Pain’s working theory is that Russia created a voter targeting database with information gleaned from hacked DNC data rolls and other data rolls “acquired” from other states to feed this growing contact database. That database originated at Russian Intelligence which was in turn replicated to Russia’s Alfa Bank. This is where the “data laundering” takes place, Alfa Bank is the pivot point where the FSB’s data fingerprints are wiped clean. Ironically Russia launders its data at the same place it launders its money.

In New York Trump Tower could merge data into this system using various legal sources as well. Spectrum Health could also add value to the data by matching names and addresses in their extensive healthcare databases to harvest email addresses and phone numbers to flesh out this list. All these changes would be promptly replicated back to Russia in a matter of hours.

Once back in the hands of Russian Intelligence, this massaged data could be programmatically matched up with social media handles to create a micro-targeted “hit list” for the thousand Russian trolls employed by Putin.

The Payoff

How is this a breakthrough? Now that we have identified the likely means of how this data was transferred, data analysts now have more precise points to search for to arrive at a complete reveal of the massive data collusion between Team Trump and America’s foremost adversary.

The “beauty” of this system is its simplicity. Here’s some bullet-points to sum up.

  1. No special software needed. SQL Server is used in most every major enterprise. Replication is a built-in tool. No mysterious hidden processes, viruses, malware, etc.
  2. Virtually undetectable. No one would blink an eye at data replication, a standard business practice.
  3. Could all be set up remotely with only VPN credentials and remote desktop access, information that is often shared via routine third-party data audits. No one inside Trump Tower or Spectrum’s IT department need be involved. One Russian Intelligence data operative could set this up in less than an hour at each location. No low-level “conspirators” needed.
  4. Value could be added to the data anywhere in the chain and it would promote back to Russian Intelligence within 2-3 hours.
  5. All data-transmission would be out in the open, mixed in with the daily flow of business.
  6. Even if found, the data would look benign, just names, addresses, phone numbers, email addresses, social media handles, etc. No financial information. It would look just like a contact lead database purchased from any data-mining merchant.
  7. Trump/Spectrum operatives and employees in the United States could interact with this list and have no clue the origins of the data were nefarious. This plain-sight approach was the key to its success.





@DonKnock @Hood Critic @LHilla @ReignAsKing @True Blue Moon @poRATCHETteacha @Sammy Steez @SJUGrad13 @88m3 @lotuseater80 @Cali_livin @Cobratron @Menelik II @RJY33 @greenygreen @jerniebert @Wepa Man @PlayerNinety_Nine @AZBeauty @Hogan in the Wolfpac @iceberg_is_on_fire @Airfeezy @wire28 @Atlrocafella @Ss4gogeta0 @smitty22 @Ms. Elaine @Reality @fact @Hood Critic @ExodusNirvana @re'up @Call Me James @Blessed Is the Man @BaggerofTea @GnauzBookOfRhymes @THE MACHINE @OneManGang
 

Black Panther

Long Live The King
Supporter
Joined
Nov 20, 2016
Messages
13,833
Reputation
10,293
Daps
71,827
Reppin
Wakanda
Data Patterns Suggest Trump Tower/Spectrum Health Ran a “Stealth Data Machine” With Russia

Data Patterns Suggest Trump Tower/Spectrum Health Ran a “Stealth Data Machine” With Russia


We pull back the curtain on Jared Kushner’s “Stealth Data Machine.”

stealth-data-machine1.png


Jared Kushner is currently taking a victory lap, crowin’ about his “Stealth Data Machine” that put Donald Trump over the top in the 2016 race. Let’s pry off the lid and peer into the inner-workings of this “Data Machine.”

The Signal in the Noise

Building on the work of @LouiseMensch and data analysis by @Conspirator0 on Twitter, Tea Pain has stumbled onto a possible “signal in the noise” that opens a window into the data-swappin’ shenanigans going on between Trump Tower, Spectrum Health and Russia’s Alfa Bank during the election.

Spectrum Health, owned by Michigan’s powerful Devos family, attempted to explain the IP activity as “Voice over IP traffic”, whereas Alfa Bank offered an even more exotic explanation that “hackers attempted to make it look like we contacted Trump Tower.”

The data traffic, when analyzed, tells a very different story, a story of automated, orchestrated data sharing among multiple sites for a strategic end.

Tea Pain originally dismissed this story as a possible red-herring. With the Russia craze at a fever pitch, this activity could be explained by what Tea’s daddy used to say, “When you got a new hammer, everything looks like a nail.” But when Tea Pain saw the data patterns analyzed by Conspiritor0, he knew he’d spotted something mighty familiar: Database Replication. Put a pin in that, more on that later.

ping-duration.jpg


At first, data analysts were puzzled by what appeared to be random activity with no apparent pattern. Perhaps it was email activity? Maybe money transfers? But there were literally thousands of these IP “pings.”

Once the activity was charted, a pattern emerged. For example, a connection is made from Alfa Bank to Trump Tower, which may last anywhere from 1 minute to 15 minutes or more, followed by a longer “sleep” period. When averaged over months, these events charted an average time between connections to be 3660 seconds, or 1 hour and 1 minute. Whatever was running, it would hook up, transfer data for a few minutes, then go to sleep for an hour.

This was the clue that led Tea Pain to formulate a much clearer working model to explain what we were all seeing: SQL Server Database Replication between multiple sites.

database-replication.png


What Is Database Replication?

Database Replication is a rather simple concept. When you have a database with millions of records representing hundreds of gigabytes of data, and you would like to keep a copy of that database housed in 2 or more locations, it makes no sense to continually copy the entire database from point A to point B every time a change is made, so you “replicate” it.

This allows only the changes made to be sent from one database to another. This is accomplished by a process that runs on timely intervals, usually an hour, that wakes up and checks the changes made since the last hour and broadcasts those changes to the other database. The other database, in turn, check for its changes and broadcasts them in the other direction. Voila! Both database are identical!

So what does the data traffic patterns suggest? Check out the chart below. Behold, Kushner’s “Stealth Data Machine.”

russia-data-traffic.png


The white box illustrates the scope of data we can now observe. The bulk of the replication took place between Trump Tower and Alfa Bank, while smaller amounts of data were transferred between Trump Tower and Spectrum Health. If, for example, Trump Tower talked to Alfa Bank for 10 minutes, the next Spectrum-Trump Tower connection might last only one minute, indicating data replicated from Trump Tower to the Devos health care empire was being filtered, perhaps by “WHERE StateCode=’MI'” for example. But when changes were made at Spectrum, things looked very different.

ip-packetts.png


Conspiritor0 noted that when Spectrum connected to Trump Tower, Trump Tower’s next connect time was significantly longer, indicating Spectrum had modified a large chunk of records that had to be synced to Trump Tower, then pushed on to Alfa Bank. This detail was important in identifying that replication was in use. In this scenario, Trump Tower was functioning as a center-point, a data-distribution center if you will.

We don’t know what was in these data packets; that info is beyond our purview at this time, but ask yourself a simple question and you find your answer: “What does Trump Tower, the Devos Family and the Russians all have in common? A desire for Donald Trump to be President of the United States.

Tea Pain’s working theory is that Russia created a voter targeting database with information gleaned from hacked DNC data rolls and other data rolls “acquired” from other states to feed this growing contact database. That database originated at Russian Intelligence which was in turn replicated to Russia’s Alfa Bank. This is where the “data laundering” takes place, Alfa Bank is the pivot point where the FSB’s data fingerprints are wiped clean. Ironically Russia launders its data at the same place it launders its money.

In New York Trump Tower could merge data into this system using various legal sources as well. Spectrum Health could also add value to the data by matching names and addresses in their extensive healthcare databases to harvest email addresses and phone numbers to flesh out this list. All these changes would be promptly replicated back to Russia in a matter of hours.

Once back in the hands of Russian Intelligence, this massaged data could be programmatically matched up with social media handles to create a micro-targeted “hit list” for the thousand Russian trolls employed by Putin.

The Payoff

How is this a breakthrough? Now that we have identified the likely means of how this data was transferred, data analysts now have more precise points to search for to arrive at a complete reveal of the massive data collusion between Team Trump and America’s foremost adversary.

The “beauty” of this system is its simplicity. Here’s some bullet-points to sum up.

  1. No special software needed. SQL Server is used in most every major enterprise. Replication is a built-in tool. No mysterious hidden processes, viruses, malware, etc.
  2. Virtually undetectable. No one would blink an eye at data replication, a standard business practice.
  3. Could all be set up remotely with only VPN credentials and remote desktop access, information that is often shared via routine third-party data audits. No one inside Trump Tower or Spectrum’s IT department need be involved. One Russian Intelligence data operative could set this up in less than an hour at each location. No low-level “conspirators” needed.
  4. Value could be added to the data anywhere in the chain and it would promote back to Russian Intelligence within 2-3 hours.
  5. All data-transmission would be out in the open, mixed in with the daily flow of business.
  6. Even if found, the data would look benign, just names, addresses, phone numbers, email addresses, social media handles, etc. No financial information. It would look just like a contact lead database purchased from any data-mining merchant.
  7. Trump/Spectrum operatives and employees in the United States could interact with this list and have no clue the origins of the data were nefarious. This plain-sight approach was the key to its success.





@DonKnock @Hood Critic @LHilla @ReignAsKing @True Blue Moon @poRATCHETteacha @Sammy Steez @SJUGrad13 @88m3 @lotuseater80 @Cali_livin @Cobratron @Menelik II @RJY33 @greenygreen @jerniebert @Wepa Man @PlayerNinety_Nine @AZBeauty @Hogan in the Wolfpac @iceberg_is_on_fire @Airfeezy @wire28 @Atlrocafella @Ss4gogeta0 @smitty22 @Ms. Elaine @Reality @fact @Hood Critic @ExodusNirvana @re'up @Call Me James @Blessed Is the Man @BaggerofTea @GnauzBookOfRhymes @THE MACHINE @OneManGang

I'll have to ask our SQL admin about this :ohhh:
 
Top