Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Jarqui

(10,131 posts)
6. I'm only seeing Update: 12/19, 9:46PM EST
Tue Dec 22, 2015, 10:40 PM
Dec 2015

Is there one more recent than that? That's kind of old news.

That update doesn't establish Weaver lied at all.

The Sanders campaign said, including Josh (the fired data manager on MSNBC I beleive), at the outset on the first day, that the October breaches involved other software vendor(s) - not NGP VAN. I think the Sanders campaign described them or one of them as vendors of modeling software during the first press conference.

Another fact: the breach was well under two hours. Something like 41-47 mins which confirms to me that Politifact couldn't read the logs they link. Therefore, Politifact are not really qualified to link the logs and make a call like they're trying to do. They messed up on some pretty basic stuff there.

In my opinion, Those logs from what I've analyzed back up what Josh was saying. They almost defy it to be any other way without stretching things to unusual expectations to accommodate a theory.

Another thing, Politifact failed to consider the essence of what Sanders was saying -"We didn't go out and take it"- the Sanders campaign didn't break in/cause this security lapse. Nor did they download or seize data (aside from one summary report that the software vendor wasn't freaking out over). I think what they said is mostly true.

I've worked in a variety of databases that use "lists". For publishers, they have something roughly similar to a voter record - a subscriber with name, address, phone number, etc and they generate their lists using unique data fields (like a campaign) to analyze, sell the list to a company who wants to mail a flyer, print mailing labels, etc. Collection agencies have something similar to a voter record - a debtor with name, address, phone number, etc and they generate lists for processing the data to various collectors (kind of like campaign callers), predictive dialers, auto/robodialers etc (like a campaign) There are many applications where people use databases to generate a list of records (just the item identifiers).

When you generate lists, you then nearly always have to do something with that list to get the value out of it. Otherwise, it's just a long string of meaningless unique items IDs (probably voter numbers sequentially assigned as they get added to the database). You might get a count saying X number of records are in that list. But that's it. And the fields they did the actual selections on were so broad and incomplete because they didn't do all the possible selections to get a full array of results. So the lists counts even have limited use. I just don't see much value in it. It would be sufficient to prove the breadth of a security breach like Josh claimed but it lacks anything really sinister - since they didn't download any of these lists or use them to process reports, etc. They just proved they could access Clinton data by generating them which they had to do because they already had access to their own data.

The auditor will ultimately settle this. Politifact most certainly cannot.

Latest Discussions»Retired Forums»2016 Postmortem»Sanders spins the facts w...»Reply #6