2016 Postmortem
Related: About this forumSource: Clinton email server logs show no breach
By JOSH GERSTEIN 03/03/16 10:11 PM EST
Logs for Hillary Clinton's email server turned over to the FBI by a former aide to Clinton show no evidence of suspicious foreign traffic indicating hacking from abroad, a person familiar with the investigation said.
The records were provided to the FBI by former Clinton information technology staffer Bryan Pagliano, according to the source, who spoke on condition of anonymity. Pagliano worked at the State Department but was also involved in setting up the server at Clinton's Chappaqua, N.Y. home.
The New York Times first reported Thursday that the logs show no indication of foreign hacking.
The FBI has been investigating since last summer whether sensitive information in Clinton's account was compromised by foreign intelligence services, hackers or others. An FBI spokeswoman did not immediately respond to a request for comment
Read more: http://www.politico.com/story/2016/03/source-clinton-email-server-logs-show-no-breach-220232#ixzz41u3tn7UJ
jeff47
(26,549 posts)"Installing Malware"
"Compromising Databases"
"Uploading all data to China"
Dem2
(8,166 posts)I saw your post there.
Copy/Paste.
jeff47
(26,549 posts)One of the key steps in developing your malware is to avoid having it show up in logs. Because there's a giant pile of tools that grep logs looking for odd things.
So you write your software such that it does not show up in the logs.
Dem2
(8,166 posts)If the FBI doesn't see it, and we can assume they have good tools, then it's over as far as this part of the investigation goes.
jeff47
(26,549 posts)But they don't see it via log files.
They see it by looking at every single file on that server's disks, and every byte in the firmware.
Like the "marked retroactively!!" defense, this story is a leak relying on lack of knowledge among the readers.
Dem2
(8,166 posts)You're now classifying 80% of what is considered "news" these days, in my opinion obviously.
I scream at the TV a lot.
One, a breach can happened without it showing up in the logs. And two, the e-mails were all sent plaintext over the Internet, in which random 3rd party servers had top secret classified information passing through them.
ucrdem
(15,512 posts)I'm starting to understand why she kept her server in her garage
MaggieD
(7,393 posts)I think that was the real reason she used a private server. The State Department server has been hacked several times. I know she can't say that because she can't discuss the problems with government security. But I think that was one of the reasons she did what she did.
Paulie
(8,462 posts)And then store them off the box before they rotate. Otherwise they are gone.
Any other IOC? What about firewall logs?
The Midway Rebel
(2,191 posts)oasis
(49,323 posts)America anxiously awaits.
TheBlackAdder
(28,165 posts).
System logs can be edited like any other file, using developer tools, leaving no footprints.
.
I hope so.
I am all for investigations to learn the truth-whatever it may be.