I need an answer to this question..

Which of the many Intel Agencies that are making claims about Russian hacking have EVER been granted access to the DNC servers in question?

I ASK THAT because the FBI NEVER got access to the DNC servers. Instead the DNC hire CrowdStrike. Which is almost EXCLUSIVELY funded by Google. The same Google who was on the WHouse guest login far more than any other commercial organization. And all of the analysis I've seen is largely based on THEIR opinions.

Did anyone ask the lying bastard DNI -- if they EVER got direct access to the DNC servers for forensics? If so WHEN? And was all the forensic data preserved?
So far we have CIA, FBI and NSA confirming Russian involvement

We have Trump, Breitbart and Hannity denying it

Doesn't much matter WHO is confirming what does it? Not if the confirmers never used the THOUSANDS of Counter Cyber experts that YOU pay for. And if the evidence NEVER was put under Top Secret clearance protocol.

Why do you think ANYONE has a leg to stand on in politics and government if NONE of their agencies were involved in investigating and securing the servers?
Like a police force, they came in after the crime and looked for evidence

The footprints led right back to the Russians

The footprints were never analyzed. Only CrowdStrike has been mentioned as a source of "evidence". Why do we NEED 7 different Counter Hacking groups if all we need to do is call up a "Google affiliate" company?

Fire all their asses.

Wrong a British firm came to the same conclusion... and so did Germany's intelligence agency.
 
Which of the many Intel Agencies that are making claims about Russian hacking have EVER been granted access to the DNC servers in question?

I ASK THAT because the FBI NEVER got access to the DNC servers. Instead the DNC hire CrowdStrike. Which is almost EXCLUSIVELY funded by Google. The same Google who was on the WHouse guest login far more than any other commercial organization. And all of the analysis I've seen is largely based on THEIR opinions.

Did anyone ask the lying bastard DNI -- if they EVER got direct access to the DNC servers for forensics? If so WHEN? And was all the forensic data preserved?
So far we have CIA, FBI and NSA confirming Russian involvement

We have Trump, Breitbart and Hannity denying it

Doesn't much matter WHO is confirming what does it? Not if the confirmers never used the THOUSANDS of Counter Cyber experts that YOU pay for. And if the evidence NEVER was put under Top Secret clearance protocol.

Why do you think ANYONE has a leg to stand on in politics and government if NONE of their agencies were involved in investigating and securing the servers?
Like a police force, they came in after the crime and looked for evidence

The footprints led right back to the Russians


Where's the proof for that?
I do not have clearance to see the evidence

However, Congressional representatives from both parties have had access and they find it credible

Why are you defending Russia?


GMAB I am not defending Russia, and you know it. And I certainly do not take the word of representatives of both parties. They are politicians.
 
Why DA FUCK we need ALL of this below if NONE of the "intel agencies" having opinions have actually EXAMINED the scene of crime? Why are we posturing for war with Russia over something that was never IMPORTANT enough to issue a warrant to SEIZE and classify the evidence and put into the hands of all these USELESS agencies and people below??

White House creates new cybersecurity agency


The Obama administration is launching the Cyber Threat Intelligence Integration Center as a central place to coordinate cyber threat intelligence from the FBI, the National Security Agency, the Department of Homeland Security and other federal agencies. The center will operate under the guidance of the director of national intelligence.

Currently, no single government agency is responsible for coordinating cyber threat assessments, sharing information rapidly among existing agencies, and providing timely intelligence to policy makers, said Lisa Monaco, assistant to the president for homeland security and counterterrorism,


Oversight of the Federal Bureau of Investigation — FBI


We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas—things of incredible value to all of us. They may seek to strike our critical infrastructure and our economy. The threat is so dire that cyber security has topped the Director of National Intelligence list of global threats for the second consecutive year.

Given the scope of the cyber threat, agencies across the federal government are making cyber security a top priority. Within the FBI, we are targeting high-level intrusions—the biggest and most dangerous botnets, state-sponsored hackers, and global cyber syndicates. We want to predict and prevent attacks, rather than reacting after the fact.

FBI agents, analysts, and computer scientists are using technical capabilities and traditional investigative techniques—such as sources and wires, surveillance, and forensics—to fight cyber crime. We are working side-by-side with our federal, state, and local partners on Cyber Task Forces in each of our 56 field offices and through the National Cyber Investigative Joint Task Force (NCIJTF). Through our 24-hour cyber command center, CyWatch, we combine the resources of the FBI and NCIJTF, allowing us to provide connectivity to federal cyber centers, government agencies, FBI field offices and legal attachés, and the private sector in the event of a cyber intrusion.

We also work with the private sector through partnerships such as the Domestic Security Alliance Council, InfraGard, and the National Cyber Forensics and Training Alliance. And we are training our state and local counterparts to triage local cyber matters, so that we can focus on national security issues.


FACT SHEET: Administration Cybersecurity Efforts 2015

At the Summit, the President issued an Executive Order to encourage the development of Information Sharing and Analysis Organizations (ISAOs) to serve as the hubs for sharing critical cybersecurity information and promoting collaboration for analyzing this information both within and across industry sectors. The Department of Homeland Security (DHS) solicited public comments and is holding public workshops to inform the development of standards by a Standards Organization, which will be selected in the fall. At the same time, the private sector has been busy organizing its communities and forming ISAOs.
DHS is developing a system for the automated sharing of cyber threat indicators with the private sector and government. The design of this system incorporates privacy and civil liberties protections. DHS is already using the system to send out indicators, and this fall it will begin to receive information. Interested companies can work with the National Cybersecurity and Communications Integration Center (NCCIC) to prepare their networks for the automated sharing of cyber threat indicators.
Through the Cyber Information Sharing and Collaboration Program (CISCP), DHS has built a trusted environment for sharing cyber threat information with the private sector through formalized Cooperative Research and Development Agreements. As of July 2015, there are 125 of these agreements in place and DHS has already shared over 28,000 indicators with these partners since the program’s inception. An additional 156 Agreements are currently in negotiation which will further expand DHS’ communications reach.
The National Cyber Investigative Joint Task Force (NCIJTF), along with other federal cyber centers and sector specific agencies, are leveraging FBI's Cyber Guardian system to improve the process of managing cyber threat reports and notifying companies that have been the target of malicious cyber activity. Through this effort, directed by E.O. 13636, the cyber centers have logged over 10,000 cyber threat reports to date and facilitated over 2,000 notifications so far this year.

OMB is leading a Federal cyber workforce effort to define the current gaps of cybersecurity talent throughout the government and outline current Special Hiring Authorities that can be used to bring in additional cybersecurity professionals; develop guidance related to these authorities; and promulgate tools and best practices to improve cybersecurity hiring.
On May 29, 2015, the President signed the HERO Act into law. This Act provides veterans access to DHS’ online cybersecurity workforce training program and an opportunity to continue serving the nation in the Immigration and Customs Enforcement Homeland Security Investigation's fight against cybercrime. DHS has also expanded access to this training program for employees of state, local, tribal, and territorial governments.
Developed new policies and capabilities to identify, defend against, and counter malicious cyber actors

Increased situational awareness within the government – In February, the President directed the formation of the Cyber Threat Intelligence Integration Center (CTIIC). The CTIIC will serve as the national cyber threat intelligence center to “connect the dots” within government regarding malicious foreign cyber threats to the nation so that relevant departments and agencies are aware of these threats in as close to real time as possible.
Strengthened our national defense - In April, the Secretary of Defense released the new Department of Defense Cyber Strategy to guide the development of the U.S. military’s cyber forces and strengthen the United States’ cyber deterrence posture. The Strategy, which is now being implemented, focuses on building the capabilities necessary to defend the nation from cyber-attacks of significant consequence, defend DoD networks, data, and systems; and provide cyber support to military operations and plans.
Developed a new tool for responding to cyber threats – In April, the President issued Executive Order 13694, which authorizes the Secretary of the Treasury, in consultation with the Attorney General and the Secretary of State, to impose financial sanctions on individuals and entities whose malicious cyber-enabled activities have contributed to a significant threat to the national security, foreign policy, or economic health or financial stability of the United States. In establishing this new policy, the Administration is creating a means of imposing economic costs against not just those that conduct cyber attacks, but those responsible for supporting, enabling, or ordering such attacks.
Enforced the law - Over the last year, the Department of Justice and authorities around the world have collaborated on precedent-setting operations to take down criminal marketplaces on the dark web, to free hundreds of thousands of computers from criminals’ control in the takedown of the Gameover Zeus botnet, and to bring a dozen high-level cybercriminals to the United States to face justice here. The Department is sharing best practices from its experience battling cybercrime with the private sector, available at cybercrime.gov.
Propose new cybercrime enforcement legislation – In January, the President sent to Congress a new cybersecurity legislative proposal that included modernization of law enforcement tools to fight cybercrime. The Administration’s proposal contains provisions that would increase the consequences for breaking the law and committing crimes online, including by reaffirming important components of 2011 proposals to update the Racketeering Influenced and Corrupt Organizations Act (RICO) so that it applies to cybercrimes.
 
Which of the many Intel Agencies that are making claims about Russian hacking have EVER been granted access to the DNC servers in question?

I ASK THAT because the FBI NEVER got access to the DNC servers. Instead the DNC hire CrowdStrike. Which is almost EXCLUSIVELY funded by Google. The same Google who was on the WHouse guest login far more than any other commercial organization. And all of the analysis I've seen is largely based on THEIR opinions.

Did anyone ask the lying bastard DNI -- if they EVER got direct access to the DNC servers for forensics? If so WHEN? And was all the forensic data preserved?
So far we have CIA, FBI and NSA confirming Russian involvement

We have Trump, Breitbart and Hannity denying it

Doesn't much matter WHO is confirming what does it? Not if the confirmers never used the THOUSANDS of Counter Cyber experts that YOU pay for. And if the evidence NEVER was put under Top Secret clearance protocol.

Why do you think ANYONE has a leg to stand on in politics and government if NONE of their agencies were involved in investigating and securing the servers?
Like a police force, they came in after the crime and looked for evidence

The footprints led right back to the Russians

The footprints were never analyzed. Only CrowdStrike has been mentioned as a source of "evidence". Why do we NEED 7 different Counter Hacking groups if all we need to do is call up a "Google affiliate" company?

Fire all their asses.

Wrong a British firm came to the same conclusion... and so did Germany's intelligence agency.

When and HOW did they actually examine the servers in question??
 
Why DA FUCK we need ALL of this below if NONE of the "intel agencies" having opinions have actually EXAMINED the scene of crime? Why are we posturing for war with Russia over something that was never IMPORTANT enough to issue a warrant to SEIZE and classify the evidence and put into the hands of all these USELESS agencies and people below??

White House creates new cybersecurity agency


The Obama administration is launching the Cyber Threat Intelligence Integration Center as a central place to coordinate cyber threat intelligence from the FBI, the National Security Agency, the Department of Homeland Security and other federal agencies. The center will operate under the guidance of the director of national intelligence.

Currently, no single government agency is responsible for coordinating cyber threat assessments, sharing information rapidly among existing agencies, and providing timely intelligence to policy makers, said Lisa Monaco, assistant to the president for homeland security and counterterrorism,


Oversight of the Federal Bureau of Investigation — FBI


We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas—things of incredible value to all of us. They may seek to strike our critical infrastructure and our economy. The threat is so dire that cyber security has topped the Director of National Intelligence list of global threats for the second consecutive year.

Given the scope of the cyber threat, agencies across the federal government are making cyber security a top priority. Within the FBI, we are targeting high-level intrusions—the biggest and most dangerous botnets, state-sponsored hackers, and global cyber syndicates. We want to predict and prevent attacks, rather than reacting after the fact.

FBI agents, analysts, and computer scientists are using technical capabilities and traditional investigative techniques—such as sources and wires, surveillance, and forensics—to fight cyber crime. We are working side-by-side with our federal, state, and local partners on Cyber Task Forces in each of our 56 field offices and through the National Cyber Investigative Joint Task Force (NCIJTF). Through our 24-hour cyber command center, CyWatch, we combine the resources of the FBI and NCIJTF, allowing us to provide connectivity to federal cyber centers, government agencies, FBI field offices and legal attachés, and the private sector in the event of a cyber intrusion.

We also work with the private sector through partnerships such as the Domestic Security Alliance Council, InfraGard, and the National Cyber Forensics and Training Alliance. And we are training our state and local counterparts to triage local cyber matters, so that we can focus on national security issues.


FACT SHEET: Administration Cybersecurity Efforts 2015

At the Summit, the President issued an Executive Order to encourage the development of Information Sharing and Analysis Organizations (ISAOs) to serve as the hubs for sharing critical cybersecurity information and promoting collaboration for analyzing this information both within and across industry sectors. The Department of Homeland Security (DHS) solicited public comments and is holding public workshops to inform the development of standards by a Standards Organization, which will be selected in the fall. At the same time, the private sector has been busy organizing its communities and forming ISAOs.
DHS is developing a system for the automated sharing of cyber threat indicators with the private sector and government. The design of this system incorporates privacy and civil liberties protections. DHS is already using the system to send out indicators, and this fall it will begin to receive information. Interested companies can work with the National Cybersecurity and Communications Integration Center (NCCIC) to prepare their networks for the automated sharing of cyber threat indicators.
Through the Cyber Information Sharing and Collaboration Program (CISCP), DHS has built a trusted environment for sharing cyber threat information with the private sector through formalized Cooperative Research and Development Agreements. As of July 2015, there are 125 of these agreements in place and DHS has already shared over 28,000 indicators with these partners since the program’s inception. An additional 156 Agreements are currently in negotiation which will further expand DHS’ communications reach.
The National Cyber Investigative Joint Task Force (NCIJTF), along with other federal cyber centers and sector specific agencies, are leveraging FBI's Cyber Guardian system to improve the process of managing cyber threat reports and notifying companies that have been the target of malicious cyber activity. Through this effort, directed by E.O. 13636, the cyber centers have logged over 10,000 cyber threat reports to date and facilitated over 2,000 notifications so far this year.

OMB is leading a Federal cyber workforce effort to define the current gaps of cybersecurity talent throughout the government and outline current Special Hiring Authorities that can be used to bring in additional cybersecurity professionals; develop guidance related to these authorities; and promulgate tools and best practices to improve cybersecurity hiring.
On May 29, 2015, the President signed the HERO Act into law. This Act provides veterans access to DHS’ online cybersecurity workforce training program and an opportunity to continue serving the nation in the Immigration and Customs Enforcement Homeland Security Investigation's fight against cybercrime. DHS has also expanded access to this training program for employees of state, local, tribal, and territorial governments.
Developed new policies and capabilities to identify, defend against, and counter malicious cyber actors

Increased situational awareness within the government – In February, the President directed the formation of the Cyber Threat Intelligence Integration Center (CTIIC). The CTIIC will serve as the national cyber threat intelligence center to “connect the dots” within government regarding malicious foreign cyber threats to the nation so that relevant departments and agencies are aware of these threats in as close to real time as possible.
Strengthened our national defense - In April, the Secretary of Defense released the new Department of Defense Cyber Strategy to guide the development of the U.S. military’s cyber forces and strengthen the United States’ cyber deterrence posture. The Strategy, which is now being implemented, focuses on building the capabilities necessary to defend the nation from cyber-attacks of significant consequence, defend DoD networks, data, and systems; and provide cyber support to military operations and plans.
Developed a new tool for responding to cyber threats – In April, the President issued Executive Order 13694, which authorizes the Secretary of the Treasury, in consultation with the Attorney General and the Secretary of State, to impose financial sanctions on individuals and entities whose malicious cyber-enabled activities have contributed to a significant threat to the national security, foreign policy, or economic health or financial stability of the United States. In establishing this new policy, the Administration is creating a means of imposing economic costs against not just those that conduct cyber attacks, but those responsible for supporting, enabling, or ordering such attacks.
Enforced the law - Over the last year, the Department of Justice and authorities around the world have collaborated on precedent-setting operations to take down criminal marketplaces on the dark web, to free hundreds of thousands of computers from criminals’ control in the takedown of the Gameover Zeus botnet, and to bring a dozen high-level cybercriminals to the United States to face justice here. The Department is sharing best practices from its experience battling cybercrime with the private sector, available at cybercrime.gov.
Propose new cybercrime enforcement legislation – In January, the President sent to Congress a new cybersecurity legislative proposal that included modernization of law enforcement tools to fight cybercrime. The Administration’s proposal contains provisions that would increase the consequences for breaking the law and committing crimes online, including by reaffirming important components of 2011 proposals to update the Racketeering Influenced and Corrupt Organizations Act (RICO) so that it applies to cybercrimes.

Have you seen Trump's latest comments?


NEW YORK (AP) — President-elect Donald Trump said Saturday that "only 'stupid' people or fools" would dismiss closer ties with Russia, and he seemed unswayed after his classified briefing on an intelligence report that accused Moscow of meddling on his behalf in the election that catapulted him to power.

"Having a good relationship with Russia is a good thing, not a bad thing," Trump said in a series of tweets.

Trump: Only 'stupid' people, fools oppose better Russia ties

I really do think Trump has a crush on Putin...
 
So far we have CIA, FBI and NSA confirming Russian involvement

We have Trump, Breitbart and Hannity denying it

Doesn't much matter WHO is confirming what does it? Not if the confirmers never used the THOUSANDS of Counter Cyber experts that YOU pay for. And if the evidence NEVER was put under Top Secret clearance protocol.

Why do you think ANYONE has a leg to stand on in politics and government if NONE of their agencies were involved in investigating and securing the servers?
Like a police force, they came in after the crime and looked for evidence

The footprints led right back to the Russians

The footprints were never analyzed. Only CrowdStrike has been mentioned as a source of "evidence". Why do we NEED 7 different Counter Hacking groups if all we need to do is call up a "Google affiliate" company?

Fire all their asses.

Wrong a British firm came to the same conclusion... and so did Germany's intelligence agency.

When and HOW did they actually examine the servers in question??


Dude... you know as good and well as anyone that the government uses contractors all the time.
 
This is bullshit. You are asking this question because you believe, like Trump, that the alphabet agencies are politically motivated to implicate Russia.

You are just doing what you do. You don't really care about the truth. Please admit it...for once. It would be so damned refreshing.
Name the 17 agencies, the evidence they examined, and their methodology.

In other words - you want the TOP SECRET methods and sources made public? Hilarious!

Those agencies apparently never laid hands or eyes on the evidence. Was never MADE Top Secret. But it SHOULD have been.. Civilians NEVER should have been allowed to paw over that system before the Fed Agencies secured the scene of the crime.
 
Why DA FUCK we need ALL of this below if NONE of the "intel agencies" having opinions have actually EXAMINED the scene of crime? Why are we posturing for war with Russia over something that was never IMPORTANT enough to issue a warrant to SEIZE and classify the evidence and put into the hands of all these USELESS agencies and people below??

White House creates new cybersecurity agency


The Obama administration is launching the Cyber Threat Intelligence Integration Center as a central place to coordinate cyber threat intelligence from the FBI, the National Security Agency, the Department of Homeland Security and other federal agencies. The center will operate under the guidance of the director of national intelligence.

Currently, no single government agency is responsible for coordinating cyber threat assessments, sharing information rapidly among existing agencies, and providing timely intelligence to policy makers, said Lisa Monaco, assistant to the president for homeland security and counterterrorism,


Oversight of the Federal Bureau of Investigation — FBI


We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas—things of incredible value to all of us. They may seek to strike our critical infrastructure and our economy. The threat is so dire that cyber security has topped the Director of National Intelligence list of global threats for the second consecutive year.

Given the scope of the cyber threat, agencies across the federal government are making cyber security a top priority. Within the FBI, we are targeting high-level intrusions—the biggest and most dangerous botnets, state-sponsored hackers, and global cyber syndicates. We want to predict and prevent attacks, rather than reacting after the fact.

FBI agents, analysts, and computer scientists are using technical capabilities and traditional investigative techniques—such as sources and wires, surveillance, and forensics—to fight cyber crime. We are working side-by-side with our federal, state, and local partners on Cyber Task Forces in each of our 56 field offices and through the National Cyber Investigative Joint Task Force (NCIJTF). Through our 24-hour cyber command center, CyWatch, we combine the resources of the FBI and NCIJTF, allowing us to provide connectivity to federal cyber centers, government agencies, FBI field offices and legal attachés, and the private sector in the event of a cyber intrusion.

We also work with the private sector through partnerships such as the Domestic Security Alliance Council, InfraGard, and the National Cyber Forensics and Training Alliance. And we are training our state and local counterparts to triage local cyber matters, so that we can focus on national security issues.


FACT SHEET: Administration Cybersecurity Efforts 2015

At the Summit, the President issued an Executive Order to encourage the development of Information Sharing and Analysis Organizations (ISAOs) to serve as the hubs for sharing critical cybersecurity information and promoting collaboration for analyzing this information both within and across industry sectors. The Department of Homeland Security (DHS) solicited public comments and is holding public workshops to inform the development of standards by a Standards Organization, which will be selected in the fall. At the same time, the private sector has been busy organizing its communities and forming ISAOs.
DHS is developing a system for the automated sharing of cyber threat indicators with the private sector and government. The design of this system incorporates privacy and civil liberties protections. DHS is already using the system to send out indicators, and this fall it will begin to receive information. Interested companies can work with the National Cybersecurity and Communications Integration Center (NCCIC) to prepare their networks for the automated sharing of cyber threat indicators.
Through the Cyber Information Sharing and Collaboration Program (CISCP), DHS has built a trusted environment for sharing cyber threat information with the private sector through formalized Cooperative Research and Development Agreements. As of July 2015, there are 125 of these agreements in place and DHS has already shared over 28,000 indicators with these partners since the program’s inception. An additional 156 Agreements are currently in negotiation which will further expand DHS’ communications reach.
The National Cyber Investigative Joint Task Force (NCIJTF), along with other federal cyber centers and sector specific agencies, are leveraging FBI's Cyber Guardian system to improve the process of managing cyber threat reports and notifying companies that have been the target of malicious cyber activity. Through this effort, directed by E.O. 13636, the cyber centers have logged over 10,000 cyber threat reports to date and facilitated over 2,000 notifications so far this year.

OMB is leading a Federal cyber workforce effort to define the current gaps of cybersecurity talent throughout the government and outline current Special Hiring Authorities that can be used to bring in additional cybersecurity professionals; develop guidance related to these authorities; and promulgate tools and best practices to improve cybersecurity hiring.
On May 29, 2015, the President signed the HERO Act into law. This Act provides veterans access to DHS’ online cybersecurity workforce training program and an opportunity to continue serving the nation in the Immigration and Customs Enforcement Homeland Security Investigation's fight against cybercrime. DHS has also expanded access to this training program for employees of state, local, tribal, and territorial governments.
Developed new policies and capabilities to identify, defend against, and counter malicious cyber actors

Increased situational awareness within the government – In February, the President directed the formation of the Cyber Threat Intelligence Integration Center (CTIIC). The CTIIC will serve as the national cyber threat intelligence center to “connect the dots” within government regarding malicious foreign cyber threats to the nation so that relevant departments and agencies are aware of these threats in as close to real time as possible.
Strengthened our national defense - In April, the Secretary of Defense released the new Department of Defense Cyber Strategy to guide the development of the U.S. military’s cyber forces and strengthen the United States’ cyber deterrence posture. The Strategy, which is now being implemented, focuses on building the capabilities necessary to defend the nation from cyber-attacks of significant consequence, defend DoD networks, data, and systems; and provide cyber support to military operations and plans.
Developed a new tool for responding to cyber threats – In April, the President issued Executive Order 13694, which authorizes the Secretary of the Treasury, in consultation with the Attorney General and the Secretary of State, to impose financial sanctions on individuals and entities whose malicious cyber-enabled activities have contributed to a significant threat to the national security, foreign policy, or economic health or financial stability of the United States. In establishing this new policy, the Administration is creating a means of imposing economic costs against not just those that conduct cyber attacks, but those responsible for supporting, enabling, or ordering such attacks.
Enforced the law - Over the last year, the Department of Justice and authorities around the world have collaborated on precedent-setting operations to take down criminal marketplaces on the dark web, to free hundreds of thousands of computers from criminals’ control in the takedown of the Gameover Zeus botnet, and to bring a dozen high-level cybercriminals to the United States to face justice here. The Department is sharing best practices from its experience battling cybercrime with the private sector, available at cybercrime.gov.
Propose new cybercrime enforcement legislation – In January, the President sent to Congress a new cybersecurity legislative proposal that included modernization of law enforcement tools to fight cybercrime. The Administration’s proposal contains provisions that would increase the consequences for breaking the law and committing crimes online, including by reaffirming important components of 2011 proposals to update the Racketeering Influenced and Corrupt Organizations Act (RICO) so that it applies to cybercrimes.

Have you seen Trump's latest comments?


NEW YORK (AP) — President-elect Donald Trump said Saturday that "only 'stupid' people or fools" would dismiss closer ties with Russia, and he seemed unswayed after his classified briefing on an intelligence report that accused Moscow of meddling on his behalf in the election that catapulted him to power.

"Having a good relationship with Russia is a good thing, not a bad thing," Trump said in a series of tweets.

Trump: Only 'stupid' people, fools oppose better Russia ties

I really do think Trump has a crush on Putin...

Don't give a rump about Trump. .HE is not the topic here.
 
I'd like to see the 'evidence' myself. Honestly, I do NOT believe it exists. If it did, and there was nothing to question about it, then WHY hasn't our government put it out for all to see? Easy to answer - there's no positive proof the DNC was hacked by the Russians. It's nothing more than the government trying to 'control' the masses and trying to keep people against the Russians.
Unfortunately, cyber security is highly classified

However, both Republican and Democratic Congressmen have been briefed and agree with the conclusions

They never asked the right questions. Since NOBODY can confirm that the evidence was ever made available to ANY of these labs or agencies.
 
Nope. I've no interest. I've stated my opinion on this matter.

And....

Eat a dick.
So, you don't have jack shit for proof, but are going to call the "results" conclusive because it matches your political bias.

When "fuckwit peckerhead" is a monument to understatement. :lmao:
 
Which of the many Intel Agencies that are making claims about Russian hacking have EVER been granted access to the DNC servers in question?

I ASK THAT because the FBI NEVER got access to the DNC servers. Instead they hire CrowdStrike. Which is almost EXCLUSIVELY funded by Google. The same Google who was on the WHouse guest login far more than any other commercial organization. And all of the analysis I've seen is largely based on THEIR opinions.

Did anyone ask the lying bastard DNI -- if they EVER got direct access to the DNC servers for forensics? If so WHEN? And was all the forensic data preserved?

I'm happy to see that the moderators here are politically neutral.
WHOA! A MISDIRECTION POST....Must be something in the question that is very unsettling
 
This is ONLY about the truth. The giant Cheeto scares you as much as he scares me.. There is NOTHING to admit.. This is an amazing VOID in the ENTIRE national discussion. If the Prez is so willing to ICE relations with the Russians over this -- why wasn't the PRIMARY EVIDENCE PRESERVED under National Security control?
Could it be because there isn't any?
 
This is bullshit. You are asking this question because you believe, like Trump, that the alphabet agencies are politically motivated to implicate Russia.

You are just doing what you do. You don't really care about the truth. Please admit it...for once. It would be so damned refreshing.
Name the 17 agencies, the evidence they examined, and their methodology.

In other words - you want the TOP SECRET methods and sources made public? Hilarious!

Those agencies apparently never laid hands or eyes on the evidence. Was never MADE Top Secret. But it SHOULD have been.. Civilians NEVER should have been allowed to paw over that system before the Fed Agencies secured the scene of the crime.

Funny. You mean like Republican FBI Director Comey who tried to help Trump win? Many civilian companies have Top Secret clearances.
 
Which of the many Intel Agencies that are making claims about Russian hacking have EVER been granted access to the DNC servers in question?

I ASK THAT because the FBI NEVER got access to the DNC servers. Instead they hire CrowdStrike. Which is almost EXCLUSIVELY funded by Google. The same Google who was on the WHouse guest login far more than any other commercial organization. And all of the analysis I've seen is largely based on THEIR opinions.

Did anyone ask the lying bastard DNI -- if they EVER got direct access to the DNC servers for forensics? If so WHEN? And was all the forensic data preserved?

I'm happy to see that the moderators here are politically neutral.

I am political neutral. I want the lying and posturing and tribal warfare to STOP. And for important questions to be answered. Do YOU have an answer? Don't you think this one of the 1st ANSWERS that we should get from our govt and the media?
Well, then again it is sometimes a little more admirable to pick a side and defend it.

Everyone leans one way or another. A lot more risky to be a conservative in this world. How many outspoken hollywood conservatives are there?

They exist.

Anyway, the whole putin Russian Hacking shit is just political crap run by the democrats AND THE RINOs in order make Trump illegitimate. Both sides.

That is all this is.
 
This is bullshit. You are asking this question because you believe, like Trump, that the alphabet agencies are politically motivated to implicate Russia.

You are just doing what you do. You don't really care about the truth. Please admit it...for once. It would be so damned refreshing.
Name the 17 agencies, the evidence they examined, and their methodology.

In other words - you want the TOP SECRET methods and sources made public? Hilarious!

Those agencies apparently never laid hands or eyes on the evidence. Was never MADE Top Secret. But it SHOULD have been.. Civilians NEVER should have been allowed to paw over that system before the Fed Agencies secured the scene of the crime.

Funny. You mean like Republican FBI Director Comey who tried to help Trump win? Many civilian companies have Top Secret clearances.

Nobody DECLARED this incident be taken in as a "National Security" issue did they? CrowdStrike info might have been made "proprietary" to the DNC, but there no SENSIBLE demand to subpoena and secure the evidence was there?

Whole admin was snoozing on this one.. Apparently...
 
This is bullshit. You are asking this question because you believe, like Trump, that the alphabet agencies are politically motivated to implicate Russia.

You are just doing what you do. You don't really care about the truth. Please admit it...for once. It would be so damned refreshing.
Name the 17 agencies, the evidence they examined, and their methodology.

In other words - you want the TOP SECRET methods and sources made public? Hilarious!

Those agencies apparently never laid hands or eyes on the evidence. Was never MADE Top Secret. But it SHOULD have been.. Civilians NEVER should have been allowed to paw over that system before the Fed Agencies secured the scene of the crime.

Funny. You mean like Republican FBI Director Comey who tried to help Trump win? Many civilian companies have Top Secret clearances.

Nobody DECLARED this incident be taken in as a "National Security" issue did they? CrowdStrike info might have been made "proprietary" to the DNC, but there no SENSIBLE demand to subpoena and secure the evidence was there?

Whole admin was snoozing on this one.. Apparently...

Well, they obviously should have hired you to oversee the entire investigation and analysis.
 
Nobody DECLARED this incident be taken in as a "National Security" issue did they? CrowdStrike info might have been made "proprietary" to the DNC, but there no SENSIBLE demand to subpoena and secure the evidence was there?

Whole admin was snoozing on this one.. Apparently...
No snoozing. They know they're full of shit and calling on all their partisan lackeys in the bureaucracies to cover their asses.

We've seen this before.
 
Name the 17 agencies, the evidence they examined, and their methodology.

In other words - you want the TOP SECRET methods and sources made public? Hilarious!

Those agencies apparently never laid hands or eyes on the evidence. Was never MADE Top Secret. But it SHOULD have been.. Civilians NEVER should have been allowed to paw over that system before the Fed Agencies secured the scene of the crime.

Funny. You mean like Republican FBI Director Comey who tried to help Trump win? Many civilian companies have Top Secret clearances.

Nobody DECLARED this incident be taken in as a "National Security" issue did they? CrowdStrike info might have been made "proprietary" to the DNC, but there no SENSIBLE demand to subpoena and secure the evidence was there?

Whole admin was snoozing on this one.. Apparently...

Well, they obviously should have hired you to oversee the entire investigation and analysis.
There you have it. Classic dim answer.
 

Forum List

Back
Top