usmbguest5318
Gold Member
I don't know where they GOT the "code" from,
What is your need to know that information? Does the USIC agree with your assessment?
1) Name ONE agency that actually got access to Podesta's phone or the DNC servers.
Tell me how you know none did.
I don't know what specifically the USIC agencies examined. What I know is what the USIC have stated in their report. I have no basis for refuting what they say and I have no basis for reading into what they said more than they did say.
- "Intelligence Community analysts integrate information from a wide range of sources, including human sources, technical collection, and open source information, and apply specialized skills and structured analytic tools to draw inferences informed by the data available, relevant past activity, and logic and reasoning to provide insight into what is happening and the prospects for the future."
- "Every kind of cyber operation—malicious or not—leaves a trail. US Intelligence Community analysts use this information, their constantly growing knowledge base of previous events and known malicious actors, and their knowledge of how these malicious actors work and the tools that they use, to attempt to trace these operations back to their source. In every case, they apply the same tradecraft standards described in the Analytic Process above."
I know that sounds like "who the fuck are you?" but that's not what I mean. I'm not trying to discredit you; I'm saying let's keep things in perspective. I'm saying the people who were tasked with looking into the matter know what they are doing and they don't have a reason to lie about what their findings indicate. This isn't Big Brother, Survivor, The Apprentice, or the Housewives. The government is serious even though Trump, various forum posters, and others may treat the political process as though it's a joke. The tone of your demands is indicative of that appropriate to scrutinizing children who are trying to get away with a prank. The matter is well beyond "punking."
There's not much that senior members of Congress from both sides agree on. This is one such thing. This matter has more agreement than did Iraq War II. The fact that you can ask for something that won't be made available to you, in this situation, is insufficient as a legitimate cause for denial or doubt about the USIC's findings.
2) How many OTHER intrusions were detected? Don't tell me the ONLY intrusion led back to the Kremlin.
Q1: I'm not going to do your "goggling" for you, and I'm certainly not for you or anyone going to plumb and distill the reports that have been published. I know some arm of the GOP was also hacked/duped. Who besides that? I have no idea.
C1: Not hard to not say seeing as I don't know.
for which the password was "PASSWORD"
I haven't seen one shred of corroborating evidence for that claim which was not made by the USIC or anyone who's actually been involved in the investigation or hack. I know Jesse Watters made that assertion on Fox as though it was common knowledge that Podesta's password was "password." I haven't seen any documentation that gives him the right to say that, and as he's not part of the government, the source information he uses to make such a claim must be somewhere be documented publicly seeing as he didn't attribute his knowledge to a verbal conversation with somebody.
I need answers to questions and I want the diversions, excuses and bickering to stop...
So let's say you get the answer(s). Then what? So what? Does it alter the conversation here? Does it do something worthwhile in your "real" life? Are you going to promote an operative or analyst to a new job? Are you going to do something to stop it from happening again? Where's the "there" there in your self-professed need to know?