Seems to me like itâs not too hard to figure out if a random phone call is coming from the FBI or not. Like maybe asking which office the Agent works from and telling them youâll call back through the Agency. I mean, weâre talking about a person who is paid to provide IT security services.
If they thought âFancy Bearâ was bad, just wait til they see âHuggy Bearâ
I canât take this anymore. One click on an email brought us President Donald Trump?
Can we #SpiritCook Podesta?
Everyone forgets about Podesta, the first one to start the shiny thing deflection. The phishing scam is a small part of Podesta as a collaborator. Wiki leaks docs show his cell phone user name to be jpodesta and his password to be (yup) password. And he also lost his phone once in a cab in NYC.
I donât use the word âcollaboratorâ in the same sense as Fred Koch but the Podesta family has been in the political lobbying business for decades and has also had financial dealings in Russia. Even Podestaâs daughter was involved in a Russian company stock manipulation scam!
The beat goes on.
Iâll bet it was the one that says:
â35 Russian Oligarchs Who Support Donald J. Trump. (You Wonât Believe #5!)â
I almost fell for that one, myselfâŚ
âThis is Sargent Stadanko with the Federal Bureau of Investigations, is your refrigerator running?â
Iâve spent years either in IT or IT-adjacent. You would be stunned at the number of top level executives whose email password is - wait for it - âpasswordâ. Please donât ask me how I happened upon this informationâŚ
I suggest you take the red pill and read the whole article, Darcy.
Well, donât they have to change it every three months or so? Password1 password2 etc.? Much harder to crack.
Wohw!
Asshole! The Chinese hacked the Obama and McCain campaigns in the 2008 election so he knew this could happen. The incompetence would be astounding but for the fact that he and all his buddies are Washington insiders who never stepped foot in a Walmart and have no clue. I wish I had voted for Bernie. Sorry ,all!
Alternately, if Iâm a special agent for the FBI and someone patches me through to the help desk I leave a message for HMFIC to call me back as soon as possible.
Hillary Clintonâs campaign chairman, John Podesta, reportedly clicked on a phishing email that led to the theft of tens of thousands of emails after an aide mistakenly wrote to him that it was a âlegitimateâârather than âillegitimateââmessage.
So two little letters (i and l) possibly got Trump elected. I feel ill.
Well, letâs not forget that the RNC was hacked, too. I wonder who else?
Especially since there were several phone calls from the FBI. In fact, I am not sure why the person who wrote this article included the FBI on the list of those who made âcostly mistakesâ on this. You get several calls from the FBI saying your server has been compromised, and you ignore them? As you say, just ask the guy for his number, confirm it and get back to him. In fact your response after the 2nd call (if not the first) should be, âholy shit, let me check this out right away and see what temporary remedial measures I can make, please give me your number so I can call you backâ.
Republicans will have a field day with this one.
Because people whoâve stepped foot in Walmart are not vulnerable to a phishing exploit?
The article mentions the admins were busy dealing with the Sanders campaign accessing the Clinton campaign data. Funny we never saw Wikileaks publish emails from the Sanders campaign since they were on the same system. I guess the firewall separating the two was pretty good after all.
So it is the DNCâs and Podestaâs fault? Not the Russiansâ?
The âdebateâ between the FBI and the CIA is another non-issue. They both agree on the essential issue: The Russians made a strong, government-backed effort to interfere with the US electoral process. That is an act of war. Cyberwar, maybe, but war. Suggesting that there is a major debate between the two agencies is like saying that it was important, 75 years ago, to determine whether the Japanese attacked Pearl Harbor because they wanted to capture the Hawaiian Islands and invade the West Coast, or only to damage the US so that Japan could conquer East Asia.
Certain people were exempted from such odious rules.
I once did consulting for an organization where the rules surrounding network passwords - so not just email but full network access - were:
- The password had to be 8 characters long - no more, no less
- Only lower case letters allowed
- No special characters - only alpha numeric
A veritable enigma to crackâŚ