Political Forums  

Go Back   Defending The Truth Political Forum > Political Forum > Conspiracy Theories

Conspiracy Theories Political Conspiracy Theory Forum - Discuss your theories about major political events


Thanks Tree75Thanks
Reply
 
LinkBack Thread Tools Display Modes
Old December 17th, 2016, 12:14 PM   #21
Senior Member
 
imaginethat's Avatar
 
Join Date: Oct 2010
Location: Western Slope, Colorado
Posts: 53,220
Quote:
Originally Posted by Jimgorn View Post
I just love to pick at left-wing logic.....Here we have the left trying to find hypocrisy on the right by claiming the right is now in love with Putin, but when Reagan was POTUS they were enemy numer uno..... <false>.. nobody on the right is now suddenly trusting Russia/Putin because it's contrary to the Obama/Clinton agenda....

Hot Flash.!! Even us on the right have zero trust or love for Putin or the Russkis....It's just that we are not so cavalier of accusing a dangerous enemy with Trumped up allegations.... Obama, just running out and accusing the Russians of hacking an election, is just plain stupid....It is probably one of his dumbest moves.... What does the Big O think is going to happen if it turns out that the hack was done by some other bunch of misfits, or was an internal whistle blower ?? Nobody is certain of that.yet....
Please take the time to read this so we don't have to go down this rabbit hole anymore.
The evidence

The FBI warned the DNC of a potential ongoing breach of their network in November of 2015. But the first hard evidence of an attack detected by a non-government agency was a spear-phishing campaign being tracked by Dell SecureWorks. That campaign began to target the DNC, the Clinton campaign, and others in the middle of March 2016, and it ran through mid-April.

This campaign was linked to a "threat group" (designated variously as APT28, Sofacy, Strontium, Pawn Storm, and Fancy Bear) that had previously been tied to spear-phishing attacks on military, government, and non-governmental organizations.

"[SecureWorks] researchers assess with moderate confidence that the group is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government," the report from SecureWorks concluded.

The DNC's information technology team first alerted party officials that there was a potential security problem in late March, but the DNC didn't bring in outside help until May. This is when CrowdStrike's incident response team was brought in. CrowdStrike identified two separate ongoing breaches, as detailed in a June 15, 2016 blog post by CrowdStrike CTO Dmitri Alperovitch. The findings were based both on malware samples found and a monitoring of the breach while it was in progress.

One of those attacks, based on the malware and command and control traffic, was attributed to Fancy Bear. The malware deployed by Fancy Bear was a combination of an agent disguised as a Windows driver file (named twain_64.dll) in combination with a network tunneling tool that allowed remote control connections.

The other breach, which may have been the breach hinted at by the FBI, was a long-running intrusion by a group previously identified as APT29, also known as The Dukes or Cozy Bear. Cozy Bear ran SeaDaddy (also known as SeaDuke, a backdoor developed in Python and compiled as a Windows executable) as well as a one-line Windows PowerShell command that exploited Microsoft's Windows Management Instrumentation (WMI) system. The exploit allowed attackers to persist in WMI's database and execute based on a schedule. Researchers at Fidelis who were given access to malware samples from the hack confirmed that attribution.

In addition to targeting the DNC and the Clinton campaign's Google Apps accounts, the spear-phishing messages connected to the campaign discovered by SecureWorks also went after a number of personal Gmail accounts. It was later discovered that the campaign had compromised the Gmail accounts of Clinton campaign chair John Podesta, former Secretary of State Colin Powell, and a number of other individuals connected to the Clinton campaign and the White House. Many of those e-mails ended up on DC Leaks. The Wikileaks posting of the Podesta e-mails include an e-mail containing the link used to deliver the malware.

After Crowdstrike and the DNC revealed the hacks and attributed them to Russian intelligence-connected groups, some of the files taken from the DNC were posted on a website by someone using the name Guccifer 2.0. While the individual claimed to be Romanian, documents in the initial dump from the DNC by Guccifer 2.0 were found to have been edited using a Russian-language version of Word and by someone using a computer named for Felix Dzerzhinsky, founder of the Soviet secret police. (The documents are linked in this article by Ars' Dan Goodin.)

In addition to publishing on his or her own WordPress site, Guccifer used the DC Leaks site to provide an early look at new documents to The Smoking Gun using administrative access. The Smoking Gun contacted one of the victims of the breach and confirmed he had been targeted using the same spear-phishing attack used against Podesta.

The DC Leaks site also contains a small number of e-mails from state Republican party operatives. Thus far, no national GOP e-mails have been released. (The New York Times reports that intelligence officials claim the Republican National Committee was also penetrated by attackers, but its e-mails were never published.)

Attribution and motive

There are several factors used to attribute these hacks to someone working on behalf of Russian intelligence. In the case of Fancy Bear, attribution is based on details from a number of assessments by security researchers. These include:

Focus of purpose. The methods and malware families used in these campaigns are specifically built for espionage.

The targets. A list of previous targets of Fancy Bear malware include:

• Individuals in Russia and the former Soviet states who may be of intelligence interest
• Current and former members of NATO states' government and military
• Western defense contractors and suppliers
• Journalists and authors


Fancy Bear malware was also used in the spear-phishing attack on the International Olympic Committee to gain access to the World Anti Doping Agency's systems. This allowed the group to discredit athletes after many Russian athletes were banned from this year's Summer Games.

Long-term investment. The code in malware and tools is regularly and professionally updated and maintained—while maintaining a platform approach. The investment suggests an operation funded to provide long-term data espionage and information warfare capabilities.

Language and location. Artifacts in the code indicate it was written by Russian speakers in the same time zone as Moscow and St. Petersburg, according to a FireEye report


These don't necessarily point to Fancy Bear being directly operated by Russian intelligence. Other information operations out of Russia (including the "troll factory" operated out of St. Petersburg to spread disinformation and intimidate people) have had tenuous connections to the government.


Scott DePasquale and Michael Daly of the Atlantic Council suggested in an October Politico article that the DNC hack and other information operations surrounding the US presidential campaign may have been the work of "cyber mercenaries"—in essence, outsourcing outfits working as contractors for Russian intelligence. There is also an extremely remote possibility that all of this has been some sort of "false flag" operation by someone else with extremely deep pockets and a political agenda.

WikiLeaks' Julian Assange has insisted that the Russian government is not the source of the Podesta and DNC e-mails. That may well be true, and it can still be true even if the Russian government had a hand in directing or funding the operation. But that is all speculation—the only way that the full scope of Russia's involvement in the hacking campaign and other aspects of the information campaign against Clinton (and for Trump) will be known is if the Obama administration publishes conclusive evidence in a form that can be independently analyzed.
More here: Did the Russians ?hack? the election? A look at the established facts | Ars Technica

Please visit the website. The quotes above are filled with live links.

There's no smoking gun that Putin ordered the hacking, but two points are worth noting. One, if it walks like a duck and quacks like a duck. Two, NOTHING happens in Russia without Putin's approval.

No thing.

And in light of the numerous Russian connections, it's preposterous and suspicious for Trump to summarily dismiss any possible Russian connections, well unless his buddy Putin told him it's preposterous, and asked him to relay that information to US citizens.

What's even more preposterous is in light of the above known facts that American conservatives and Republicans would knee jerk come to Putin's defense AND repeat Kremlin propaganda. How delighted Putin must be. Mission accomplished.
Thanks from tristanrobin
imaginethat is offline  
Old December 17th, 2016, 01:32 PM   #22
Senior Member
 
Join Date: Sep 2015
Location: Lehigh Valley Pa.,USA
Posts: 6,181
Quote:
Originally Posted by imaginethat View Post
Please take the time to read this so we don't have to go down this rabbit hole anymore.
The evidence

The FBI warned the DNC of a potential ongoing breach of their network in November of 2015. But the first hard evidence of an attack detected by a non-government agency was a spear-phishing campaign being tracked by Dell SecureWorks. That campaign began to target the DNC, the Clinton campaign, and others in the middle of March 2016, and it ran through mid-April.

This campaign was linked to a "threat group" (designated variously as APT28, Sofacy, Strontium, Pawn Storm, and Fancy Bear) that had previously been tied to spear-phishing attacks on military, government, and non-governmental organizations.

"[SecureWorks] researchers assess with moderate confidence that the group is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government," the report from SecureWorks concluded.

The DNC's information technology team first alerted party officials that there was a potential security problem in late March, but the DNC didn't bring in outside help until May. This is when CrowdStrike's incident response team was brought in. CrowdStrike identified two separate ongoing breaches, as detailed in a June 15, 2016 blog post by CrowdStrike CTO Dmitri Alperovitch. The findings were based both on malware samples found and a monitoring of the breach while it was in progress.

One of those attacks, based on the malware and command and control traffic, was attributed to Fancy Bear. The malware deployed by Fancy Bear was a combination of an agent disguised as a Windows driver file (named twain_64.dll) in combination with a network tunneling tool that allowed remote control connections.

The other breach, which may have been the breach hinted at by the FBI, was a long-running intrusion by a group previously identified as APT29, also known as The Dukes or Cozy Bear. Cozy Bear ran SeaDaddy (also known as SeaDuke, a backdoor developed in Python and compiled as a Windows executable) as well as a one-line Windows PowerShell command that exploited Microsoft's Windows Management Instrumentation (WMI) system. The exploit allowed attackers to persist in WMI's database and execute based on a schedule. Researchers at Fidelis who were given access to malware samples from the hack confirmed that attribution.

In addition to targeting the DNC and the Clinton campaign's Google Apps accounts, the spear-phishing messages connected to the campaign discovered by SecureWorks also went after a number of personal Gmail accounts. It was later discovered that the campaign had compromised the Gmail accounts of Clinton campaign chair John Podesta, former Secretary of State Colin Powell, and a number of other individuals connected to the Clinton campaign and the White House. Many of those e-mails ended up on DC Leaks. The Wikileaks posting of the Podesta e-mails include an e-mail containing the link used to deliver the malware.

After Crowdstrike and the DNC revealed the hacks and attributed them to Russian intelligence-connected groups, some of the files taken from the DNC were posted on a website by someone using the name Guccifer 2.0. While the individual claimed to be Romanian, documents in the initial dump from the DNC by Guccifer 2.0 were found to have been edited using a Russian-language version of Word and by someone using a computer named for Felix Dzerzhinsky, founder of the Soviet secret police. (The documents are linked in this article by Ars' Dan Goodin.)

In addition to publishing on his or her own WordPress site, Guccifer used the DC Leaks site to provide an early look at new documents to The Smoking Gun using administrative access. The Smoking Gun contacted one of the victims of the breach and confirmed he had been targeted using the same spear-phishing attack used against Podesta.

The DC Leaks site also contains a small number of e-mails from state Republican party operatives. Thus far, no national GOP e-mails have been released. (The New York Times reports that intelligence officials claim the Republican National Committee was also penetrated by attackers, but its e-mails were never published.)

Attribution and motive

There are several factors used to attribute these hacks to someone working on behalf of Russian intelligence. In the case of Fancy Bear, attribution is based on details from a number of assessments by security researchers. These include:

Focus of purpose. The methods and malware families used in these campaigns are specifically built for espionage.

The targets. A list of previous targets of Fancy Bear malware include:

• Individuals in Russia and the former Soviet states who may be of intelligence interest
• Current and former members of NATO states' government and military
• Western defense contractors and suppliers
• Journalists and authors


Fancy Bear malware was also used in the spear-phishing attack on the International Olympic Committee to gain access to the World Anti Doping Agency's systems. This allowed the group to discredit athletes after many Russian athletes were banned from this year's Summer Games.

Long-term investment. The code in malware and tools is regularly and professionally updated and maintained—while maintaining a platform approach. The investment suggests an operation funded to provide long-term data espionage and information warfare capabilities.

Language and location. Artifacts in the code indicate it was written by Russian speakers in the same time zone as Moscow and St. Petersburg, according to a FireEye report


These don't necessarily point to Fancy Bear being directly operated by Russian intelligence. Other information operations out of Russia (including the "troll factory" operated out of St. Petersburg to spread disinformation and intimidate people) have had tenuous connections to the government.


Scott DePasquale and Michael Daly of the Atlantic Council suggested in an October Politico article that the DNC hack and other information operations surrounding the US presidential campaign may have been the work of "cyber mercenaries"—in essence, outsourcing outfits working as contractors for Russian intelligence. There is also an extremely remote possibility that all of this has been some sort of "false flag" operation by someone else with extremely deep pockets and a political agenda.

WikiLeaks' Julian Assange has insisted that the Russian government is not the source of the Podesta and DNC e-mails. That may well be true, and it can still be true even if the Russian government had a hand in directing or funding the operation. But that is all speculation—the only way that the full scope of Russia's involvement in the hacking campaign and other aspects of the information campaign against Clinton (and for Trump) will be known is if the Obama administration publishes conclusive evidence in a form that can be independently analyzed.
More here: Did the Russians ?hack? the election? A look at the established facts | Ars Technica

Please visit the website. The quotes above are filled with live links.

There's no smoking gun that Putin ordered the hacking, but two points are worth noting. One, if it walks like a duck and quacks like a duck. Two, NOTHING happens in Russia without Putin's approval.

No thing.

And in light of the numerous Russian connections, it's preposterous and suspicious for Trump to summarily dismiss any possible Russian connections, well unless his buddy Putin told him it's preposterous, and asked him to relay that information to US citizens.

What's even more preposterous is in light of the above known facts that American conservatives and Republicans would knee jerk come to Putin's defense AND repeat Kremlin propaganda. How delighted Putin must be. Mission accomplished.

skeptical
[skep-ti-kuh l]

adjective
1.
inclined to skepticism; having an attitude of doubt:
a skeptical young woman who will question whatever you say.
2.
doubtful about a particular thing:
My teacher thinks I can get a scholarship, but I'm skeptical.
3.
showing doubt:
a skeptical smile.
4.
denying or questioning the tenets of a religion:
a skeptical approach to the nature of miracles.
5.

This is the part that is so hard for you to understand.....Nobody is saying the Russkis did not hack the DNC....and it is verylikely they did hack the DNC and Hillary's unsecured server.....But why is Obama making noise about it now??...If indeed the Russians hacked, then wouldn't it be smart to keep his yap shut and pay them back in kind quietly?? What Obama is doing is either tipping his hand or just cavalierly pissing off the Russians. Who will definitely retaliate.... Like ....Opps!!! There goes the Northeast power grid!!....How the F did that happen!!!

Now, on here,we are often reminded how brilliant Obama is..... So does he and the left have another agenda??....Undermine Trump??.... Leave a giant turd for Trump to clean up.....This is why us skeptics are skeptical....
Jimgorn is offline  
Old December 17th, 2016, 01:34 PM   #23
Banned
 
coke's Avatar
 
Join Date: Feb 2014
Location: nunya
Posts: 12,580
Quote:
Originally Posted by Jimgorn View Post
skeptical
[skep-ti-kuh l]

adjective
1.
inclined to skepticism; having an attitude of doubt:
a skeptical young woman who will question whatever you say.
2.
doubtful about a particular thing:
My teacher thinks I can get a scholarship, but I'm skeptical.
3.
showing doubt:
a skeptical smile.
4.
denying or questioning the tenets of a religion:
a skeptical approach to the nature of miracles.
5.

This is the part that is so hard for you to understand.....Nobody is saying the Russkis did not hack the DNC....and it is verylikely they did hack the DNC and Hillary's unsecured server.....But why is Obama making noise about it now??...If indeed the Russians hacked, then wouldn't it be smart to keep his yap shut and pay them back in kind quietly?? What Obama is doing is either tipping his hand or just cavalierly pissing off the Russians. Who will definitely retaliate.... Like ....Opps!!! There goes the Northeast power grid!!....How the F did that happen!!!

Now, on here,we are often reminded how brilliant Obama is..... So does he and the left have another agenda??....Undermine Trump??.... Leave a giant turd for Trump to clean up.....This is why us skeptics are skeptical....
Maybe or maybe not. I want to see the evidence before I start screaming Russia hacked the DNC, revealing the DNC throwing an election. Which means that Russia rigged the election because they revealed the DNC was rigging the election.
Thanks from Sabcat

Last edited by coke; December 17th, 2016 at 01:45 PM.
coke is offline  
Old December 17th, 2016, 01:36 PM   #24
RNG
Senior Member
 
RNG's Avatar
 
Join Date: Apr 2013
Location: LA LA Land North
Posts: 24,248
Quote:
Originally Posted by Jimgorn View Post
skeptical
[skep-ti-kuh l]

adjective
1.
inclined to skepticism; having an attitude of doubt:
a skeptical young woman who will question whatever you say.
2.
doubtful about a particular thing:
My teacher thinks I can get a scholarship, but I'm skeptical.
3.
showing doubt:
a skeptical smile.
4.
denying or questioning the tenets of a religion:
a skeptical approach to the nature of miracles.
5.

This is the part that is so hard for you to understand.....Nobody is saying the Russkis did not hack the DNC....and it is verylikely they did hack the DNC and Hillary's unsecured server.....But why is Obama making noise about it now??...If indeed the Russians hacked, then wouldn't it be smart to keep his yap shut and pay them back in kind quietly?? What Obama is doing is either tipping his hand or just cavalierly pissing off the Russians. Who will definitely retaliate.... Like ....Opps!!! There goes the Northeast power grid!!....How the F did that happen!!!

Now, on here,we are often reminded how brilliant Obama is..... So does he and the left have another agenda??....Undermine Trump??.... Leave a giant turd for Trump to clean up.....This is why us skeptics are skeptical....
OTOH, the news stories now say that Obama told Putin to shove it in September. But unlike fucking Comey, he had the class to not interfere with a federal election.
Thanks from Clara007
RNG is offline  
Old December 17th, 2016, 01:46 PM   #25
Senior Member
 
Polari's Avatar
 
Join Date: Mar 2013
Location: Britton, SD
Posts: 1,678
Quote:
Originally Posted by imaginethat View Post
That's the problem with quoting articles without any comment by the poster. What do you think about this threat from Putin?

Anyway, Obama isn't going to shut up.
Obama says election cyberattack came from the 'highest levels' of the Russian government and vows retaliation

President Obama publicly accused Russian President Vladimir Putin of involvement in cyberattacks aimed at the U.S. election and leveled a threat on Friday — that the U.S. would retaliate, perhaps in ways no one but the Russians would see.

Obama said that he had “great confidence" in the assessment by U.S. intelligence agencies that the Russians had carried out computer hacks aimed at the Democratic National Committee and senior aides to presidential nominee Hillary Clinton, and that the operation had been approved at “the highest levels” in Moscow.

"Not much happens in Russia without Vladimir Putin," he added, saying that the Russians needed to understand that “we can do stuff to you.”

U.S. counter-strikes would come “in a thoughtful, methodical way” and would be felt by the Russians, Obama said. “Some of it, we will do in a way that they know, but not everybody will.”
More: Obama says election cyberattack came from the &apos;highest levels&apos; of the Russian government and vows retaliation - LA Times
So why does he say he has "great confidence" in intelligence assessments instead of saying we have irrefutable proof?
Polari is offline  
Old December 17th, 2016, 01:47 PM   #26
Banned
 
coke's Avatar
 
Join Date: Feb 2014
Location: nunya
Posts: 12,580
Quote:
Originally Posted by imaginethat View Post
Please take the time to read this so we don't have to go down this rabbit hole anymore.
The evidence

The FBI warned the DNC of a potential ongoing breach of their network in November of 2015. But the first hard evidence of an attack detected by a non-government agency was a spear-phishing campaign being tracked by Dell SecureWorks. That campaign began to target the DNC, the Clinton campaign, and others in the middle of March 2016, and it ran through mid-April.

This campaign was linked to a "threat group" (designated variously as APT28, Sofacy, Strontium, Pawn Storm, and Fancy Bear) that had previously been tied to spear-phishing attacks on military, government, and non-governmental organizations.

"[SecureWorks] researchers assess with moderate confidence that the group is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government," the report from SecureWorks concluded.

The DNC's information technology team first alerted party officials that there was a potential security problem in late March, but the DNC didn't bring in outside help until May. This is when CrowdStrike's incident response team was brought in. CrowdStrike identified two separate ongoing breaches, as detailed in a June 15, 2016 blog post by CrowdStrike CTO Dmitri Alperovitch. The findings were based both on malware samples found and a monitoring of the breach while it was in progress.

One of those attacks, based on the malware and command and control traffic, was attributed to Fancy Bear. The malware deployed by Fancy Bear was a combination of an agent disguised as a Windows driver file (named twain_64.dll) in combination with a network tunneling tool that allowed remote control connections.

The other breach, which may have been the breach hinted at by the FBI, was a long-running intrusion by a group previously identified as APT29, also known as The Dukes or Cozy Bear. Cozy Bear ran SeaDaddy (also known as SeaDuke, a backdoor developed in Python and compiled as a Windows executable) as well as a one-line Windows PowerShell command that exploited Microsoft's Windows Management Instrumentation (WMI) system. The exploit allowed attackers to persist in WMI's database and execute based on a schedule. Researchers at Fidelis who were given access to malware samples from the hack confirmed that attribution.

In addition to targeting the DNC and the Clinton campaign's Google Apps accounts, the spear-phishing messages connected to the campaign discovered by SecureWorks also went after a number of personal Gmail accounts. It was later discovered that the campaign had compromised the Gmail accounts of Clinton campaign chair John Podesta, former Secretary of State Colin Powell, and a number of other individuals connected to the Clinton campaign and the White House. Many of those e-mails ended up on DC Leaks. The Wikileaks posting of the Podesta e-mails include an e-mail containing the link used to deliver the malware.

After Crowdstrike and the DNC revealed the hacks and attributed them to Russian intelligence-connected groups, some of the files taken from the DNC were posted on a website by someone using the name Guccifer 2.0. While the individual claimed to be Romanian, documents in the initial dump from the DNC by Guccifer 2.0 were found to have been edited using a Russian-language version of Word and by someone using a computer named for Felix Dzerzhinsky, founder of the Soviet secret police. (The documents are linked in this article by Ars' Dan Goodin.)

In addition to publishing on his or her own WordPress site, Guccifer used the DC Leaks site to provide an early look at new documents to The Smoking Gun using administrative access. The Smoking Gun contacted one of the victims of the breach and confirmed he had been targeted using the same spear-phishing attack used against Podesta.

The DC Leaks site also contains a small number of e-mails from state Republican party operatives. Thus far, no national GOP e-mails have been released. (The New York Times reports that intelligence officials claim the Republican National Committee was also penetrated by attackers, but its e-mails were never published.)

Attribution and motive

There are several factors used to attribute these hacks to someone working on behalf of Russian intelligence. In the case of Fancy Bear, attribution is based on details from a number of assessments by security researchers. These include:

Focus of purpose. The methods and malware families used in these campaigns are specifically built for espionage.

The targets. A list of previous targets of Fancy Bear malware include:

• Individuals in Russia and the former Soviet states who may be of intelligence interest
• Current and former members of NATO states' government and military
• Western defense contractors and suppliers
• Journalists and authors


Fancy Bear malware was also used in the spear-phishing attack on the International Olympic Committee to gain access to the World Anti Doping Agency's systems. This allowed the group to discredit athletes after many Russian athletes were banned from this year's Summer Games.

Long-term investment. The code in malware and tools is regularly and professionally updated and maintained—while maintaining a platform approach. The investment suggests an operation funded to provide long-term data espionage and information warfare capabilities.

Language and location. Artifacts in the code indicate it was written by Russian speakers in the same time zone as Moscow and St. Petersburg, according to a FireEye report


These don't necessarily point to Fancy Bear being directly operated by Russian intelligence. Other information operations out of Russia (including the "troll factory" operated out of St. Petersburg to spread disinformation and intimidate people) have had tenuous connections to the government.


Scott DePasquale and Michael Daly of the Atlantic Council suggested in an October Politico article that the DNC hack and other information operations surrounding the US presidential campaign may have been the work of "cyber mercenaries"—in essence, outsourcing outfits working as contractors for Russian intelligence. There is also an extremely remote possibility that all of this has been some sort of "false flag" operation by someone else with extremely deep pockets and a political agenda.

WikiLeaks' Julian Assange has insisted that the Russian government is not the source of the Podesta and DNC e-mails. That may well be true, and it can still be true even if the Russian government had a hand in directing or funding the operation. But that is all speculation—the only way that the full scope of Russia's involvement in the hacking campaign and other aspects of the information campaign against Clinton (and for Trump) will be known is if the Obama administration publishes conclusive evidence in a form that can be independently analyzed.
More here: Did the Russians ?hack? the election? A look at the established facts | Ars Technica

Please visit the website. The quotes above are filled with live links.

There's no smoking gun that Putin ordered the hacking, but two points are worth noting. One, if it walks like a duck and quacks like a duck. Two, NOTHING happens in Russia without Putin's approval.

No thing.

And in light of the numerous Russian connections, it's preposterous and suspicious for Trump to summarily dismiss any possible Russian connections, well unless his buddy Putin told him it's preposterous, and asked him to relay that information to US citizens.

What's even more preposterous is in light of the above known facts that American conservatives and Republicans would knee jerk come to Putin's defense AND repeat Kremlin propaganda. How delighted Putin must be. Mission accomplished.
That still does not prove it was Russian government sanctioned. The computer name...lmao.
https://www.cnet.com/how-to/how-to-c...in-windows-10/

But, ok, they identified the tools used to conduct the hack. Props given. Everything else is circumstantial at best.
Thanks from Sabcat
coke is offline  
Old December 17th, 2016, 01:47 PM   #27
Senior Member
 
Join Date: Sep 2015
Location: Lehigh Valley Pa.,USA
Posts: 6,181
Quote:
Originally Posted by RNG View Post
OTOH, the news stories now say that Obama told Putin to shove it in September. But unlike fucking Comey, he had the class to not interfere with a federal election.
Still don't get it do you??....Why call attention to it in the first place??....If the Russians were hacking, you don't go making a front page story out of threatening a pay back....You keep your yap shut and let them have it when they least expect it.....

And I am still confused as to what, exactly, the Russians did to affect the election??... Did they force Hillary and the DNC to screw Sanders??....Or call half the voting country "Deplorables"....or fill Trump rallies with Russkis???
Thanks from Sabcat
Jimgorn is offline  
Old December 17th, 2016, 01:52 PM   #28
Banned
 
coke's Avatar
 
Join Date: Feb 2014
Location: nunya
Posts: 12,580
Quote:
Originally Posted by RNG View Post
OTOH, the news stories now say that Obama told Putin to shove it in September. But unlike fucking Comey, he had the class to not interfere with a federal election.
huh?
Obama on the campaign trail - Photo 9 - Pictures - CBS News

Never has there been a lame duck President campaign like Obama before. Never. That was done on the tax dollars of the US. So, I disagree. I think he used the weight of his office to influence an election.
coke is offline  
Old December 17th, 2016, 03:03 PM   #29
Senior Member
 
imaginethat's Avatar
 
Join Date: Oct 2010
Location: Western Slope, Colorado
Posts: 53,220
Quote:
Originally Posted by Polari View Post
So why does he say he has "great confidence" in intelligence assessments instead of saying we have irrefutable proof?
Possibly because we don't have irrefutable proof.

The measure for courtroom evidence isn't "irrefutably true." It's "beyond a reasonable doubt."

Please go to the page I linked upthread and take on some of the evidence presented.
imaginethat is offline  
Old December 17th, 2016, 03:08 PM   #30
Senior Member
 
imaginethat's Avatar
 
Join Date: Oct 2010
Location: Western Slope, Colorado
Posts: 53,220
Quote:
Originally Posted by coke View Post
That still does not prove it was Russian government sanctioned. The computer name...lmao.
https://www.cnet.com/how-to/how-to-c...in-windows-10/

But, ok, they identified the tools used to conduct the hack. Props given. Everything else is circumstantial at best.
You'd be singing a different tune, all of you would, if the tables were turned, if after months of "the system is rigged" Trump had lost, and the very same information was available.

I go back to "if it walks like a duck....." I think the test for irrefutable proof for you guys is a video with audio of the hacker, time synched with a DNC computer actually being hacked. Yep. Oh, and with an endorsement from Putin:
I'm Putin, and I approve of this evidence.
Thanks from tristanrobin
imaginethat is offline  
Reply

  Defending The Truth Political Forum > Political Forum > Conspiracy Theories

Tags
claims, gauntlet, hacking, lays, obama, proof, putin, shut, up’, ‘show



Thread Tools
Display Modes


Similar Threads
Thread Thread Starter Forum Replies Last Post
 Why Are the Media Taking the CIA’s Hacking Claims at Face Value? excalibur Current Events 29 December 17th, 2016 07:27 PM
FACT SHEET: President Obama Lays Out Vision for 21st Century Transportation Infrastru The White House The White House 0 February 26th, 2014 09:00 AM
President Obama Lays Wreath at Arlington National Cemetery The White House The White House 1 November 12th, 2012 03:28 AM
GOP leader: Pelosi should show proof or apologize CNN Current Events 3 May 18th, 2009 03:32 AM
Obama Blasts GOP & Lays Out "Bail Out" Plan... tadpole256 Money and Finance 34 February 15th, 2009 01:35 PM


Facebook Twitter RSS Feed



Copyright © 2005-2013 Defending The Truth. All rights reserved.