Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Dem2

(8,166 posts)
Fri Mar 4, 2016, 12:00 AM Mar 2016

Source: Clinton email server logs show no breach

By JOSH GERSTEIN 03/03/16 10:11 PM EST

Logs for Hillary Clinton's email server turned over to the FBI by a former aide to Clinton show no evidence of suspicious foreign traffic indicating hacking from abroad, a person familiar with the investigation said.

The records were provided to the FBI by former Clinton information technology staffer Bryan Pagliano, according to the source, who spoke on condition of anonymity. Pagliano worked at the State Department but was also involved in setting up the server at Clinton's Chappaqua, N.Y. home.


The New York Times first reported Thursday that the logs show no indication of foreign hacking.

The FBI has been investigating since last summer whether sensitive information in Clinton's account was compromised by foreign intelligence services, hackers or others. An FBI spokeswoman did not immediately respond to a request for comment


Read more: http://www.politico.com/story/2016/03/source-clinton-email-server-logs-show-no-breach-220232#ixzz41u3tn7UJ

15 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Source: Clinton email server logs show no breach (Original Post) Dem2 Mar 2016 OP
Because malware writes to syslog. jeff47 Mar 2016 #1
I just noticed someone else posted this story while I was posting it. Dem2 Mar 2016 #2
Did you expect the same story to suddenly create a different reality? jeff47 Mar 2016 #5
Guess we'll never know then Dem2 Mar 2016 #6
I'm sure the FBI actually sees it or not. jeff47 Mar 2016 #7
"this story is a leak relying on lack of knowledge among the readers." Dem2 Mar 2016 #10
Two issues jfern Mar 2016 #3
Apart from the Sanders campaign that is . . . ucrdem Mar 2016 #4
Of course not MaggieD Mar 2016 #8
... 2pooped2pop Mar 2016 #11
You have to enable logging, size the log retention Paulie Mar 2016 #9
Oh, there she goes. Dodging bullets again. The Midway Rebel Mar 2016 #12
Top DU investigators have not yet released their findings. oasis Mar 2016 #13
Hacker 101, taught back when 2600 was in print--Leave No Footprints! TheBlackAdder Mar 2016 #14
Good. bigwillq Mar 2016 #15

jeff47

(26,549 posts)
1. Because malware writes to syslog.
Fri Mar 4, 2016, 12:01 AM
Mar 2016

"Installing Malware"
"Compromising Databases"
"Uploading all data to China"

Dem2

(8,166 posts)
2. I just noticed someone else posted this story while I was posting it.
Fri Mar 4, 2016, 12:02 AM
Mar 2016

I saw your post there.

Copy/Paste.

jeff47

(26,549 posts)
5. Did you expect the same story to suddenly create a different reality?
Fri Mar 4, 2016, 12:05 AM
Mar 2016

One of the key steps in developing your malware is to avoid having it show up in logs. Because there's a giant pile of tools that grep logs looking for odd things.

So you write your software such that it does not show up in the logs.

Dem2

(8,166 posts)
6. Guess we'll never know then
Fri Mar 4, 2016, 12:09 AM
Mar 2016

If the FBI doesn't see it, and we can assume they have good tools, then it's over as far as this part of the investigation goes.

jeff47

(26,549 posts)
7. I'm sure the FBI actually sees it or not.
Fri Mar 4, 2016, 12:12 AM
Mar 2016

But they don't see it via log files.

They see it by looking at every single file on that server's disks, and every byte in the firmware.

Like the "marked retroactively!!" defense, this story is a leak relying on lack of knowledge among the readers.

Dem2

(8,166 posts)
10. "this story is a leak relying on lack of knowledge among the readers."
Fri Mar 4, 2016, 12:16 AM
Mar 2016

You're now classifying 80% of what is considered "news" these days, in my opinion obviously.

I scream at the TV a lot.

jfern

(5,204 posts)
3. Two issues
Fri Mar 4, 2016, 12:02 AM
Mar 2016

One, a breach can happened without it showing up in the logs. And two, the e-mails were all sent plaintext over the Internet, in which random 3rd party servers had top secret classified information passing through them.

ucrdem

(15,512 posts)
4. Apart from the Sanders campaign that is . . .
Fri Mar 4, 2016, 12:03 AM
Mar 2016

I'm starting to understand why she kept her server in her garage

 

MaggieD

(7,393 posts)
8. Of course not
Fri Mar 4, 2016, 12:14 AM
Mar 2016

I think that was the real reason she used a private server. The State Department server has been hacked several times. I know she can't say that because she can't discuss the problems with government security. But I think that was one of the reasons she did what she did.

Paulie

(8,462 posts)
9. You have to enable logging, size the log retention
Fri Mar 4, 2016, 12:14 AM
Mar 2016

And then store them off the box before they rotate. Otherwise they are gone.

Any other IOC? What about firewall logs?

TheBlackAdder

(28,165 posts)
14. Hacker 101, taught back when 2600 was in print--Leave No Footprints!
Fri Mar 4, 2016, 12:52 AM
Mar 2016

.


System logs can be edited like any other file, using developer tools, leaving no footprints.


.

Latest Discussions»Retired Forums»2016 Postmortem»Source: Clinton email ser...