FREEDOM OR ANARCHY,Campaign of Conscience.

Joseph F Barber | Create Your Badge
This blog does not promote, support, condone, encourage, advocate, nor in any way endorse any racist (or "racialist") ideologies, nor any armed and/or violent revolutionary, seditionist and/or terrorist activities. Any racial separatist or militant groups listed here are solely for reference and Opinions of multiple authors including Freedom or Anarchy Campaign of conscience.

Come On Folks: Get Behind Veterans Project & The Family Assistance Campaign

Remember, Veterans Project & The Family Assistance Campaign is independent because it is wholly funded by YOU
Veterans Project & The Family Assistance Campaign is one of the webs only truly independent sources of news and opinion.
Without YOUR help it can not continue to exist.
Please help - Act now! Click the link below

Please provide whatever you can- $1, $5, $10, $20, $50, $100- To Use your debit/credit card or check pay here on facebook pay to Founder Joseph F Barber :
We provide Veteran, IN NEED WE PROVIDE FOOD ,CLOTHING,HOUSEING AND TRANSPORTATION TO AND FROM SCHOOL OR WORK,AS WELL AS LEGAL AND MEDICAL ASSISTANCE, IT IS OUR SINCERE HOPES THAT THE LOVE AND COMPASSION SHOWN THROUGH THE HEARTS AND COMPASSION OF THOSE WHO ASSIST IN THIS INDEVORE TO HELP YOUNG MEN AND WOMEN STAND FREE AND INDEPENDENT FROM THE THINGS THAT BROUGHT THEM TO OUR LIVES IS DONE SO THEY CAN LEAD PRODUCTIVE LIVES WITH FAITH AND FAMILY VALUES THEY SEE IN OUR OWN HOMES AS We SHARE OUR LIVES WITH THESE AND MANY YOUNG MEN & WOMEN.WE believe that to meet the challenges of our times, human beings will have to develop a greater sense of universal responsibility. Each of us must learn to work not just for one self, one's own family or one's nation, but for the benefit of all humankind. Universal responsibility is the key to human survival. It is the best foundation for world peace

or if you prefer to send a check or money order,to 47874 Dalea pl,oceanside Ca,92057 USA.
Low income readers: DON'T send money, just encourage others to subscribe.
https://www.facebook.com/lawfulrebelion/

Thanks for your support

https://the-family-assistants-campaign.blogspot.com/

for personell contact with me the founder please call 24/7 @ 442-264-9578

To all who have assisted in the past. Thank you. Your help is greatly appreciated. Peace and Joy.Founder Joseph F Barber

To be GOVERNED

Not For Profit - For Global Justice and The Fight to End Violence & Hunger world wide - Since 1999
"Liberty cannot be preserved without a general knowledge among the people" - John Adams - Second President - 1797 - 1801

This is the callout,This is the call to the Patriots,To stand up for all the ones who’ve been thrown away,This is the call to the all citizens ,Stand up!
Stand up and protect those who can not protect themselves our veterans ,the homeless & the forgotten take back our world today


To protect our independence, We take no government funds
Become A Supporting member of humanity to help end hunger and violence in our country,You have a right to live. You have a right to be. You have these rights regardless of money, health, social status, or class. You have these rights, man, woman, or child. These rights can never be taken away from you, they can only be infringed. When someone violates your rights, remember, it is not your fault.,


DISCOVER THE WORLD

Facebook Badge

FREEDOM OR ANARCHY,Campaign of Conscience

↑ Grab this Headline Animator

The Free Thought Project,The Daily Sheeple & FREEDOM OR ANARCHY Campaign of Conscience are dedicated to holding those who claim authority over our lives accountable. “Each of us has a unique part to play in the healing of the world.”
“Every record has been destroyed or falsified, every book rewritten, every picture has been repainted, every statue and street building has been renamed, every date has been altered. And the process is continuing day by day and minute by minute. History has stopped. Nothing exists except an endless present in which the Party is always right.” - George Orwell, 1984

"Until the philosophy which holds one race superior and another inferior is finally and permanently discredited and abandoned, everywhere is war and until there are no longer first-class and second-class citizens of any nation, until the color of a man's skin is of no more significance than the color of his eyes. And until the basic human rights are equally guaranteed to all without regard to race, there is war. And until that day, the dream of lasting peace, world citizenship, rule of international morality, will remain but a fleeting illusion to be pursued, but never attained... now everywhere is war." - - Haile Selassie I of Ethiopia - Popularized by Bob Marley in the song War

STEALING FROM THE CITIZENRY

The right to tell the Government to kiss my Ass Important Message for All Law Enforcers Freedom; what it is, and what it is not. Unadulterated freedom is an unattainable goal; that is what the founders of America knew and understood, which was their impetus behind the documents that established our great nation. They also knew that one of the primary driving forces in human nature is the unconscious desire to be truly free. This meant to them that mankind if totally left completely unrestricted would pursue all things in life without any awareness or acknowledgement of the consequences of his/her own actions leaving only the individual conscience if they had one as a control on behavior. This would not bode well in the development of a great society. Yet the founders of America chose to allow men/women as much liberty as could be, with minimum impact on the freedom or liberties of others

Saturday, October 29, 2016

Does The U.S. Government Really Know Who Hacked Democrats’ Emails?

Does The U.S. Government Really Know Who Hacked Democrats’ Emails?


The hacking and public release of Democratic campaign and committee emails made the news and a presidential debate, with more leaks expected to come.

This week, WikiLeaks published more emails from Hillary Clinton’s campaign chairman, John Podesta. Nearly 20 batches of campaign emails were released over the last month, in addition to Democratic National Committee emails released earlier this year.
In the final presidential debate on Oct. 19, Clinton said documents released by WikiLeaks were part of Russian espionage on the U.S. She called on Republican candidate Donald Trump to acknowledge the Russia connection and condemn such actions.
“She has no idea whether it’s Russia, China, or anybody else. She has no idea,” said Trump.

“I am not quoting myself. I am quoting 17, 17 intelligence agencies. Do you doubt 17 military and civilian agencies?” Clinton asked.

“Our country has no idea,” Trump responded.
Clinton was citing the Oct. 7 statement from the U.S. intelligence community saying it was “confident that the Russian government directed the recent compromises of emails from U.S. persons and institutions.”

Analysts say, however, that the ability to determine who cyber attackers are, where they’re located and sometimes who ordered their operations is rarely definitive and comes in degrees of confidence.

Beyond the government’s headline assertion that Russia is to blame, “it’s important to parse the public statement pretty closely,” said Susan Hennessey, a national security fellow at the Brookings Institution. “They’re being really careful in their word choice.”
The Department of Homeland Security and Office of the Director of National Intelligence on Election Security said in a statement earlier this month that “only Russia’s senior-most officials could have authorized these activities.”

But that statement does not mean that the U.S. has “direct evidence of senior official-level involvement,” Hennessey said.

Without more definitive statements, it’s difficult for some technical experts to take the government’s word on faith, she and others have said.

“There’s no evidence that this was done by the state itself, only evidence it was done by non-state actors that might be Russian-speaking,” said Jeffrey Carr, CEO of the cyber security consultancy firm Taia Global, referring to the evidence available to the public.
That evidence, which was released by private threat assessment companies rather than official channels, indicates hackers used Cyrillic keyboards and operated during Moscow working hours.
But indicators of identity like timestamps, language preferences and IP addresses “can be manipulated or faked rather easily,” said Juan Andres Guerrero-Saade, a senior security researcher at Kaspersky Lab.

Trump has a point when he says we can’t know for sure, said Cris Thomas, an information security professional known online as Space Rogue.

“I don’t know what [evidence] they have that couldn’t have been faked,” Thomas said.

Sophisticated attackers have learned how to tamper with the technical indicators to mask their identity, or at least send analysts in the wrong direction.

Dmitri Alperovitch, co-founder of CrowdStrike, hired by the Democratic National Committee to assess its breach, wrote ablog post attributing the hack to two separate Russian-intelligence affiliated groups, Fancy Bear and Cozy Bear.

Alperovitch classed both as sophisticated actors, writing on CrowdStrike’s blog that their “tradecraft is superb, operational security second to none.”

Fancy Bear is “very, very good at deception campaigns,” said Brian Bartholomew, who co-authored a report about the deception tactics that complicate attribution.

But, he added, the group has recently seemed “a little more lax” about getting caught.

Carr asked, if these hacks are a ploy by Russian President Vladimir Putin to install what Clinton has called “a puppet” at the helm of a Western democracy, why leave such obvious technical indicators in their wake?

“That’s not even sloppy,” Carr said. “That’s just ignorant.”
“Perhaps [Russia] wanted it traced back to them to show that they’re flexing their geopolitical muscle,” Schwartz said.
Deception, however, “is exceptionally difficult to pull off at the level that is going to withstand the amount of scrutiny the government will put on it,” said Jason Healey, senior fellow at the Atlantic Council’s Cyber Statecraft Initiative.

Another complicating factor is that the first intrusions into the DNC go back more than a year, well before Trump, purported to be Putin’s favorite candidate, was perceived as having a reasonable chance of winning the Republican Party’s nomination.

To think these hacks were in service of a farsighted, cunning plan designed by the Kremlin is “imputing a level of insight and ability to understand and predict the U.S. electoral system that certainly no one in the United States has demonstrated,” Hennessey said.
A more likely explanation, she said, is that the hackers were conducting low-threshold espionage but ending up finding information that could be opportunistically released.

The U.S. government has swaths of intelligence and the ability to operate beyond laws that constrain private sector threat assessment companies, said Guerrero-Saade.

“As the public, we should really understand that there’s a lot more at play behind the scenes,” Bartholomew said.
Judging by the practice established by its three previous attribution claims, the government is unlikely to release substantiating evidence, in order to guard U.S. sources and methods.
The world of cyber crime “feels like the Wild West, but it’s not to say that nothing can be known,” Guerrero-Saade said.


Does The U.S. Government Really Know Who Hacked Democrats’ Emails?


The hacking and public release of Democratic campaign and committee emails made the news and a presidential debate, with more leaks expected to come.

This week, WikiLeaks published more emails from Hillary Clinton’s campaign chairman, John Podesta. Nearly 20 batches of campaign emails were released over the last month, in addition to Democratic National Committee emails released earlier this year.
In the final presidential debate on Oct. 19, Clinton said documents released by WikiLeaks were part of Russian espionage on the U.S. She called on Republican candidate Donald Trump to acknowledge the Russia connection and condemn such actions.
“She has no idea whether it’s Russia, China, or anybody else. She has no idea,” said Trump.

“I am not quoting myself. I am quoting 17, 17 intelligence agencies. Do you doubt 17 military and civilian agencies?” Clinton asked.

“Our country has no idea,” Trump responded.
Clinton was citing the Oct. 7 statement from the U.S. intelligence community saying it was “confident that the Russian government directed the recent compromises of emails from U.S. persons and institutions.”

Analysts say, however, that the ability to determine who cyber attackers are, where they’re located and sometimes who ordered their operations is rarely definitive and comes in degrees of confidence.

Beyond the government’s headline assertion that Russia is to blame, “it’s important to parse the public statement pretty closely,” said Susan Hennessey, a national security fellow at the Brookings Institution. “They’re being really careful in their word choice.”
The Department of Homeland Security and Office of the Director of National Intelligence on Election Security said in a statement earlier this month that “only Russia’s senior-most officials could have authorized these activities.”

But that statement does not mean that the U.S. has “direct evidence of senior official-level involvement,” Hennessey said.

Without more definitive statements, it’s difficult for some technical experts to take the government’s word on faith, she and others have said.

“There’s no evidence that this was done by the state itself, only evidence it was done by non-state actors that might be Russian-speaking,” said Jeffrey Carr, CEO of the cyber security consultancy firm Taia Global, referring to the evidence available to the public.
That evidence, which was released by private threat assessment companies rather than official channels, indicates hackers used Cyrillic keyboards and operated during Moscow working hours.
But indicators of identity like timestamps, language preferences and IP addresses “can be manipulated or faked rather easily,” said Juan Andres Guerrero-Saade, a senior security researcher at Kaspersky Lab.

Trump has a point when he says we can’t know for sure, said Cris Thomas, an information security professional known online as Space Rogue.

“I don’t know what [evidence] they have that couldn’t have been faked,” Thomas said.

Sophisticated attackers have learned how to tamper with the technical indicators to mask their identity, or at least send analysts in the wrong direction.

Dmitri Alperovitch, co-founder of CrowdStrike, hired by the Democratic National Committee to assess its breach, wrote ablog post attributing the hack to two separate Russian-intelligence affiliated groups, Fancy Bear and Cozy Bear.

Alperovitch classed both as sophisticated actors, writing on CrowdStrike’s blog that their “tradecraft is superb, operational security second to none.”

Fancy Bear is “very, very good at deception campaigns,” said Brian Bartholomew, who co-authored a report about the deception tactics that complicate attribution.

But, he added, the group has recently seemed “a little more lax” about getting caught.

Carr asked, if these hacks are a ploy by Russian President Vladimir Putin to install what Clinton has called “a puppet” at the helm of a Western democracy, why leave such obvious technical indicators in their wake?

“That’s not even sloppy,” Carr said. “That’s just ignorant.”
“Perhaps [Russia] wanted it traced back to them to show that they’re flexing their geopolitical muscle,” Schwartz said.
Deception, however, “is exceptionally difficult to pull off at the level that is going to withstand the amount of scrutiny the government will put on it,” said Jason Healey, senior fellow at the Atlantic Council’s Cyber Statecraft Initiative.

Another complicating factor is that the first intrusions into the DNC go back more than a year, well before Trump, purported to be Putin’s favorite candidate, was perceived as having a reasonable chance of winning the Republican Party’s nomination.

To think these hacks were in service of a farsighted, cunning plan designed by the Kremlin is “imputing a level of insight and ability to understand and predict the U.S. electoral system that certainly no one in the United States has demonstrated,” Hennessey said.
A more likely explanation, she said, is that the hackers were conducting low-threshold espionage but ending up finding information that could be opportunistically released.

The U.S. government has swaths of intelligence and the ability to operate beyond laws that constrain private sector threat assessment companies, said Guerrero-Saade.

“As the public, we should really understand that there’s a lot more at play behind the scenes,” Bartholomew said.
Judging by the practice established by its three previous attribution claims, the government is unlikely to release substantiating evidence, in order to guard U.S. sources and methods.
The world of cyber crime “feels like the Wild West, but it’s not to say that nothing can be known,” Guerrero-Saade said.




No comments :