1
Forum Settings
       
Reply To Thread

Expectation of privacy was nice while it lastedFollow

#227 Jul 21 2016 at 7:59 AM Rating: Good
*******
50,767 posts
gbaji wrote:
You keep saying that, but merely repeating the same statement over and over doesn't make it true.
"It's how we teach people things."
____________________________
George Carlin wrote:
I think it’s the duty of the comedian to find out where the line is drawn and cross it deliberately.
#228 Jul 21 2016 at 9:47 AM Rating: Excellent
Meat Popsicle
*****
13,666 posts
gbaji wrote:
I think we're talking about two completely different things. You're talking about a database of information we gather about terrorists, their associates and accomplices, etc, and then using that to track their activities and see if/when they're maybe planning an attack, who they might be recruiting, etc. I'm talking about something very different. I'm talking about programs that either directly collect or indirectly index vast amounts of data about everything, so that they can search though that data for patterns indicating whatever kind of activity they're looking for. Even to the point of flagging people they had no knowledge of absent the searches through that data.

BTW, this is exactly the kinds of programs that Snowden blew the whistle on, so it's not like this is far fetched. We're already doing this, maybe not on the scale I'm talking about (or maybe we are? Smiley: tinfoilhat), but we are already doing more than what you're talking about.
We're at least talking about 2 very different uses for the information.

I mean, like I said I'm not doubting this is possible, not doubting these programs exist, or that they've done this. I'm simply questioning how useful that data would be, and how often they're really doing anything with that data, is it really worthwhile to do this, etc. There's certainly an argument to be made that even if it isn't the best source of information, clicking "run" on an automated script before you leave work and then browsing the search results when finished isn't exactly hard to do. Given the NSA isn't going to be releasing statistics on where they are finding their "people of interest" anytime soon it's more a mental exercise than anything else at this point. Why let the lack of hard data derail an internet debate though? Smiley: rolleyes

As for the privacy part, I'm not sure I really have a horse in this boat. I'd say don't worry about it, it's not really that bad, but I already had my "WTF moment" and got over it. Can't say it was all pleasant.

You're on your own for the rest of the Smiley: tinfoilhat parts though. Smiley: wink

Edited, Jul 21st 2016 10:45am by someproteinguy
____________________________
That monster in the mirror, he just might be you. -Grover
#229 Jul 21 2016 at 8:47 PM Rating: Decent
Encyclopedia
******
35,568 posts
Almalieque wrote:
If you're going to argue that we will one day have the capability to create a car that will fly in the air and submerge under water, then you better have an idea of all of the intricacies of the car.


Sure. But this isn't really a matter of functionality, but capacity. We already have the tools to do this, it's just a matter of sufficient storage and retrieval capacity. I'm not sure what you're arguing here. This isn't a case of me saying "some day, maybe man will invent some kind of "computing device" that can quickly and efficiently search through large amounts of data automatically (programmatically even!), allowing for massive searches of data for patterns that human minds could never accomplish". We already have such computing devices, and such programming capability. So this is more like saying "some day, everyone will own one of these new horseless carriages". It's just a matter of scale. No new technological breakthrough is required here.

Quote:
Because this is done every single day. If your goal is to just p1ss people off and exploit those with weak security, then go for it. However, if your goal is gain ALL information from everyone all at once, that's not going to cut it.


If your goal is to gain as much information as you possibly can, then yes, this is. You're creating an unfair all-or-nothing scenario here, where if even one piece of data can't be obtained because it's too securely kept, the whole concept fails. But that's not true. Obviously, for a system like this "more is better", but "all" is not required for it to function.

Quote:
Remember when you questioned me scanning my VMWare? My host machine blocked the scan and I have standard security. How are you going to exploit people/organizations using Security Onion, HBSS, etc. with dedicated security teams?


I was speaking mostly about the potential for a future where private computers are accessed to increase the amount of information which could be searched (and add stuff that might not ever show up in more public sources). Home computers normally don't have dedicated security teams. The issue of how you collect data that is actually secured is an entirely different question.

But interestingly enough, since I do have direct experience with dealing with corporate networks that span national borders, it's actually a very active issue and something you do have to deal with (and not nearly as easy to secure as you might think). You have to consider the possibility, for example, that the backbone routers themselves are compromised/tapped/whatever. There are a number of point to point encryption methods you have to use for this. Even if you have no evidence that such hacking is occurring at that low a level, you have to assume it is anyway. Basically, the second any part of your link exits a cloud of hardware that you directly own and mange, you must assume it's tapped. Yes, even here in the US of A.

Quote:
In order for you plan to work, the private sector would have to put the government interest over their bottom line. History has shown us that will never happen.


For businesses operating under government contract, the government interest *is* their bottom line. I'm not sure what history you're reading in which a company with a government contract to provide high tech network taps (let's say part number 576-22775/B) will decline to do so because they might just be used for illegal purposes. And the company under contract to assemble some network equipment that includes part number 576-22775/B because it's in the schematic isn't going to decline to do so because they're just paid to assemble the equipment. And the company under contract to install that equipment under the street in downtown USA isn't going to decline to do so either, since they don't know that they have a tap function in addition to whatever other functions they serve. And the company that built the big ginormous data center down the road, with the big fat pipe to said downtown USA's backbone has no reason to think this is used for anything nefarious either.

All you have to do is farm out the work to multiple different companies, each contracted to do just their part, with none seeing the whole picture, and all bound by NDAs, and it's pretty easy to do something like this if you want to. Again, it's not a matter of technology, it's a matter of scale and cost. And that scale is getting bigger each year while the cost is getting smaller. To be fair, the quantity of data we're generating as a population keeps scaling up to, so it's quite possible that there will never be a time when "everything" is an achievable thing. But "enough" is quite achievable I think.
____________________________
King Nobby wrote:
More words please
#230 Jul 21 2016 at 9:15 PM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
Gbaji wrote:

Sure. But this isn't really a matter of functionality, but capacity. We already have the tools to do this, it's just a matter of sufficient storage and retrieval capacity. I'm not sure what you're arguing here. This isn't a case of me saying "some day, maybe man will invent some kind of "computing device" that can quickly and efficiently search through large amounts of data automatically (programmatically even!), allowing for massive searches of data for patterns that human minds could never accomplish". We already have such computing devices, and such programming capability. So this is more like saying "some day, everyone will own one of these new horseless carriages". It's just a matter of scale. No new technological breakthrough is required here.
You would not have responded the way you initially did if you truly understood that NMAP could scan the entire Internet in one command.

Gbaji wrote:
If your goal is to gain as much information as you possibly can, then yes, this is. You're creating an unfair all-or-nothing scenario here, where if even one piece of data can't be obtained because it's too securely kept, the whole concept fails. But that's not true. Obviously, for a system like this "more is better", but "all" is not required for it to function.
The argument is that it is infeasible to ever have "all" or anything close to it. Your solution is exactly what malicious actors do every day around the world.

Gbaji wrote:
I was speaking mostly about the potential for a future where private computers are accessed to increase the amount of information which could be searched (and add stuff that might not ever show up in more public sources). Home computers normally don't have dedicated security teams. The issue of how you collect data that is actually secured is an entirely different question.

But interestingly enough, since I do have direct experience with dealing with corporate networks that span national borders, it's actually a very active issue and something you do have to deal with (and not nearly as easy to secure as you might think). You have to consider the possibility, for example, that the backbone routers themselves are compromised/tapped/whatever. There are a number of point to point encryption methods you have to use for this. Even if you have no evidence that such hacking is occurring at that low a level, you have to assume it is anyway. Basically, the second any part of your link exits a cloud of hardware that you directly own and mange, you must assume it's tapped. Yes, even here in the US of A.
So now you're only focusing on people with poor security. Your massive data list is getting smaller and smaller.

Gbaji wrote:
1. That's just not true. You keep saying that, but merely repeating the same statement over and over doesn't make it true.

2. As long as people continue to value privacy and their 4th amendment rights with regard to information in electronic form, you are correct. My fear is that this value is eroding over time and may someday reach a point where people don't care enough to fight it. Just saying "the people wont accept it" over and over doesn't address that concern.
See post #217

Gbaji wrote:
For businesses operating under government contract, the government interest *is* their bottom line. I'm not sure what history you're reading in which a company with a government contract to provide high tech network taps (let's say part number 576-22775/B) will decline to do so because they might just be used for illegal purposes. And the company under contract to assemble some network equipment that includes part number 576-22775/B because it's in the schematic isn't going to decline to do so because they're just paid to assemble the equipment. And the company under contract to install that equipment under the street in downtown USA isn't going to decline to do so either, since they don't know that they have a tap function in addition to whatever other functions they serve. And the company that built the big ginormous data center down the road, with the big fat pipe to said downtown USA's backbone has no reason to think this is used for anything nefarious either.

All you have to do is farm out the work to multiple different companies, each contracted to do just their part, with none seeing the whole picture, and all bound by NDAs, and it's pretty easy to do something like this if you want to. Again, it's not a matter of technology, it's a matter of scale and cost. And that scale is getting bigger each year while the cost is getting smaller. To be fair, the quantity of data we're generating as a population keeps scaling up to, so it's quite possible that there will never be a time when "everything" is an achievable thing. But "enough" is quite achievable I think.
A business will not ENTER a contract that goes against their bottom line. period. History? Just look at the number of companies that fought against the Open Internet laws. You're not understanding the roles of titles when dealing with this. You can't just contract people to act on behalf of the FBI, CIA, etc. Even as a Soldier, I must be working directly under a certain title in order to do certain tasks. You're just making stuff up again.

Honestly, you should write fiction novels.
#231 Jul 21 2016 at 9:36 PM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
Gbaji wrote:
I'm not sure what history you're reading
Just to reiterate. Remember that time when Apple cracked their iphone for the FBI because they cared more about the government interest? Remember when other CEOs came out and said "Don't worry government, we'll make sure that everything is tapped for you", then all of their stocks went up because their clients felt more secure?
#232 Jul 22 2016 at 4:23 AM Rating: Good
***
1,159 posts
Seeing that the Saudis had done 9/11, the Bush government classified what it knew of their involvement and invaded Iraq and Afghanistan instead.
____________________________
Timelordwho wrote:
I'm not quite sure that scheming is an emotion.
#233 Jul 22 2016 at 7:52 AM Rating: Good
*******
50,767 posts
someproteinguy wrote:
You're on your own for the rest of the Smiley: tinfoilhat parts though.
Nah, he's got plenty of company in that.
____________________________
George Carlin wrote:
I think it’s the duty of the comedian to find out where the line is drawn and cross it deliberately.
#234 Jul 22 2016 at 8:16 AM Rating: Good
Avatar
*****
13,240 posts
Kavekkk wrote:
Seeing that the Saudis had done 9/11, the Bush government classified what it knew of their involvement and invaded Iraq and Afghanistan instead.


Woah you can't blame them for that, they were just trying to deflect public anger, and you can't do that by pushing up oil prices.
Their real mistake was boots on the ground and rebuilding the patsy state. Just pull a bomb & bounce like usual.


Edited, Jul 22nd 2016 10:16am by Timelordwho
____________________________
Just as Planned.
#235 Jul 22 2016 at 9:55 AM Rating: Excellent
Meat Popsicle
*****
13,666 posts
lolgaxe wrote:
someproteinguy wrote:
You're on your own for the rest of the Smiley: tinfoilhat parts though.
Nah, he's got plenty of company in that.
You been spying on his e-mails, haven't you? That's the only way you could possibly know that.

Smiley: tinfoilhat
____________________________
That monster in the mirror, he just might be you. -Grover
#236 Jul 22 2016 at 1:22 PM Rating: Good
*******
50,767 posts
Well, yeah. I'm not here for my personal entertainment.
____________________________
George Carlin wrote:
I think it’s the duty of the comedian to find out where the line is drawn and cross it deliberately.
#237 Jul 22 2016 at 8:06 PM Rating: Decent
Encyclopedia
******
35,568 posts
Almalieque wrote:
You would not have responded the way you initially did if you truly understood that NMAP could scan the entire Internet in one command.


Wait? What? First off, what the heck does that have to do with what I said? Secondly, I'm not even sure where to begin. Tell you what. You go run a full nmap scan on 0.0.0.0/32, then get back to me when it's done. If the forums are still running then, that is.

Quote:
The argument is that it is infeasible to ever have "all" or anything close to it.


I get that this is your argument. The problem is that your argument doesn't actually counter what I was talking about.

Quote:
Your solution is exactly what malicious actors do every day around the world.


Exactly. Which is why it's a good way to go if you want to hack into as many systems as possible. Let me also point out that you are obsessing on just one of several different methods I mentioned, somehow assuming that if the whole "use a self replicating hack" method can't hack into everything, that this means that there's no chance of anyone getting hacked. That's... bizarre.

Quote:
So now you're only focusing on people with poor security. Your massive data list is getting smaller and smaller.


Sigh. You have a very narrow attention span, don't you? There were *two* different points I was making:

Point 1. The government currently runs systems where they collect large amounts of arbitrary data and use it to perform pattern searches for various criteria, arguably to look for terrorists, but that could be used for anything (ie: abused). The phone metadata collection is one part of this. The stuff Snowden leaked about collecting data on social media is another. There are presumably others that haven't become public knowledge.

Point 2. While that first issue is problematic, it's not actually illegal. However, we need to be diligent to make sure that the government does not add "hacking into people's personal computers and pulling data off of them" to the datasets they may use for these kinds of searches. This would violate the 4th amendment and result in a reduction of our privacy.

Point 1 was about the utility to government to collect "everything" (if they could) because it would increase the amount of things they could search for, and the odds that they could find whatever they are looking for within the data. I never once suggested that it was possible to actually physically access "everything", but merely to say that the more data that can be used for such searches the better (from a "find bad guys" point of view).

Point 2 was purely about the potential violation of our privacy and the need to makes sure that our privately held data is not accessed in this manner. I never even remotely suggested that hacking into people's home computers would magically contain every single bit of data. I was talking about adding that "private" data to the "public" data they already have access to.

It's like you can't follow a conversation, but just pick out individual statements that are made, take them completely out of context, and then just kinda randomly vomit responses. It's strange.

Quote:
See post #217


No. This is incredibly annoying btw.

Quote:
A business will not ENTER a contract that goes against their bottom line. period.


And? You get that a contract generally involves the business getting paid in return for some service it provides, right? That doesn't "go against their bottom line". It's like you just completely ignored what I just wrote.


Quote:
History? Just look at the number of companies that fought against the Open Internet laws.


What... The... Hell.... does that have to do with government contracts? Nothing at all.

Quote:
You're not understanding the roles of titles when dealing with this. You can't just contract people to act on behalf of the FBI, CIA, etc. Even as a Soldier, I must be working directly under a certain title in order to do certain tasks. You're just making stuff up again.


Huh? Who do you think designed and built the rifles our soldiers use? Who do you think designed and built the ships our Navy sails? Who do you think designed and built every single tank, humvee, MRE, uniform, radio, tent, patch, and nail file that government employees (military or otherwise) use? Where do you think the software programs that our intelligence agencies use come from? Magic? You think that missiles are built by government employees? Or the guidance systems for those missiles? You think government employees develop nerve gasses, and chemicals, and bio weapons?

All of these things (yes, even the illegal ones) are done by civilian businesses contracted by our government. They are bound by incredibly tight NDAs with ridiculous legal penalties if they tell anyone what kinds of things they are working on. And yes, if/when the government wants to do something illegal, it's not hard at all to part out the pieces among a number of such contractors so that none of them see the big picture. More to the point, they do this with pretty much every secret project, whether the resulting use is legal or illegal, partly so that the act of parting the pieces out doesn't allow anyone to assume anything nefarious is going on and as a means of ensuring that if there is a security breach or someone leaks information, the whole project isn't compromised. It's a smart way to keep things secret, but also allows for any sort of illegal projects to be done as you might wish.

You're incredibly naive if you don't think this sort of thing is going on now, and has been all along.

Quote:
Honestly, you should write fiction novels.


Or, Oh I don't know. Live in an area with a lot of tech companies and a largish military presence? You can't possibly think that all those biotech companies are working on research for the good of mankind can you? Because the government really just has a great interest in pure research, right? And software development. They just want to help make better firewalls for people. I'm sure that's it!

What rock have you been living under? I'm not some crazy guy spouting conspiracy theories about the government, but I'm am a realist who accepts that our government does do a large amount of secret stuff some of which is technically illegal. Kinda has to. They key IMO isn't to rail about anything that might be being done, but to make sure that certain boundaries that we really care about are not crossed. You seem to be insistent that either nothing illegal is being done at all, or everything that could be illegal is. Um... The real world tends to exist in the range between those extremes.
____________________________
King Nobby wrote:
More words please
#238 Jul 22 2016 at 8:45 PM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
Gbaji wrote:
Wait? What? First off, what the heck does that have to do with what I said? Secondly, I'm not even sure where to begin. Tell you what. You go run a full nmap scan on 0.0.0.0/32, then get back to me when it's done. If the forums are still running then, that is.
You attacked me for not realizing that you previously mentioned NMAP, saying that was telling. I countered to say that you have no idea on the most basic tool for hacking, which is telling.

Gbaji wrote:

I get that this is your argument. The problem is that your argument doesn't actually counter what I was talking about.
You admitted that your solution doesn't affect a number of people which means your massive list won't be so massive.


Gbaji wrote:
Exactly. Which is why it's a good way to go if you want to hack into as many systems as possible. Let me also point out that you are obsessing on just one of several different methods I mentioned, somehow assuming that if the whole "use a self replicating hack" method can't hack into everything, that this means that there's no chance of anyone getting hacked. That's... bizarre.
What's bizarre is ignoring the fact that entire nation states and rogue players are spending a number of resources daily to get this done. Cybersecurity is one of the fastest growing areas of interest.


Gbaji wrote:
Sigh. You have a very narrow attention span, don't you? There were *two* different points I was making:

Point 1. The government currently runs systems where they collect large amounts of arbitrary data and use it to perform pattern searches for various criteria, arguably to look for terrorists, but that could be used for anything (ie: abused). The phone metadata collection is one part of this. The stuff Snowden leaked about collecting data on social media is another. There are presumably others that haven't become public knowledge.

Point 2. While that first issue is problematic, it's not actually illegal. However, we need to be diligent to make sure that the government does not add "hacking into people's personal computers and pulling data off of them" to the datasets they may use for these kinds of searches. This would violate the 4th amendment and result in a reduction of our privacy.

Point 1 was about the utility to government to collect "everything" (if they could) because it would increase the amount of things they could search for, and the odds that they could find whatever they are looking for within the data. I never once suggested that it was possible to actually physically access "everything", but merely to say that the more data that can be used for such searches the better (from a "find bad guys" point of view).

Point 2 was purely about the potential violation of our privacy and the need to makes sure that our privately held data is not accessed in this manner. I never even remotely suggested that hacking into people's home computers would magically contain every single bit of data. I was talking about adding that "private" data to the "public" data they already have access to.

It's like you can't follow a conversation, but just pick out individual statements that are made, take them completely out of context, and then just kinda randomly vomit responses. It's strange.
You just fail to follow my responses. I'm directly contradicting your claim of the government 1. creating an automated system that will grab everyone's information in a reasonable time period and 2. without any reason but to only collect data.


Gbaji wrote:

No. This is incredibly annoying btw.
You don't respond to stuff and then wonder why there is confusion as you decide to bring in and out topics.

Gbaji wrote:
Or, Oh I don't know. Live in an area with a lot of tech companies and a largish military presence? You can't possibly think that all those biotech companies are working on research for the good of mankind can you? Because the government really just has a great interest in pure research, right? And software development. They just want to help make better firewalls for people. I'm sure that's it!

What rock have you been living under? I'm not some crazy guy spouting conspiracy theories about the government, but I'm am a realist who accepts that our government does do a large amount of secret stuff some of which is technically illegal. Kinda has to. They key IMO isn't to rail about anything that might be being done, but to make sure that certain boundaries that we really care about are not crossed. You seem to be insistent that either nothing illegal is being done at all, or everything that could be illegal is. Um... The real world tends to exist in the range between those extremes.
I am a reservist. My civilian job is a government contractor, blue team. My military job is on the red team. I live in the capital of government contracts, government agencies and everything that has to do with government. But, hey, you always seem to know more.

Gbaji wrote:
And? You get that a contract generally involves the business getting paid in return for some service it provides, right? That doesn't "go against their bottom line". It's like you just completely ignored what I just wrote.


Gbaji wrote:
Huh? Who do you think designed and built the rifles our soldiers use? Who do you think designed and built the ships our Navy sails? Who do you think designed and built every single tank, humvee, MRE, uniform, radio, tent, patch, and nail file that government employees (military or otherwise) use? Where do you think the software programs that our intelligence agencies use come from? Magic? You think that missiles are built by government employees? Or the guidance systems for those missiles? You think government employees develop nerve gasses, and chemicals, and bio weapons?

All of these things (yes, even the illegal ones) are done by civilian businesses contracted by our government. They are bound by incredibly tight NDAs with ridiculous legal penalties if they tell anyone what kinds of things they are working on. And yes, if/when the government wants to do something illegal, it's not hard at all to part out the pieces among a number of such contractors so that none of them see the big picture. More to the point, they do this with pretty much every secret project, whether the resulting use is legal or illegal, partly so that the act of parting the pieces out doesn't allow anyone to assume anything nefarious is going on and as a means of ensuring that if there is a security breach or someone leaks information, the whole project isn't compromised. It's a smart way to keep things secret, but also allows for any sort of illegal projects to be done as you might wish.

You're incredibly naive if you don't think this sort of thing is going on now, and has been all along.


Gbaji wrote:

What... The... ****.... does that have to do with government contracts? Nothing at all.

You said that the government could create infected hot spots. Who do you think will develop and maintain that Internet? Do you think they will not know that their stuff is compromised? You think clients will want their service if they know or think the ISPs are allowing the government to spy on them? You don't think cybersecurity companies won't pick up on your virus/worm signatures? Do you expect clients to choose cybersecurity that spy on you? The fact that companies fought against open Internet laws, along with every other government tech law, is evidence that the private sector will always choose their bottom line over the government's interest. No one is talking about the contract to sweep your floor or cut the grass.

Edited, Jul 23rd 2016 4:47am by Almalieque
#239 Jul 22 2016 at 8:52 PM Rating: Good
****
4,137 posts
gbaji wrote:
Secondly, I'm not even sure where to begin.

You could always begin with
Quote:
First off, what the heck does that have to do with what I said?
____________________________
Dandruffshampoo wrote:
Curses, beaten by Professor stupidopo-opo.
Annabella, Goblin in Disguise wrote:
Stupidmonkey is more organized than a bag of raccoons.
#240 Jul 23 2016 at 4:42 AM Rating: Good
Avatar
*****
13,240 posts
Quote:
Or, Oh I don't know. Live in an area with a lot of tech companies and a largish military presence? You can't possibly think that all those biotech companies are working on research for the good of mankind can you? Because the government really just has a great interest in pure research, right? And software development. They just want to help make better firewalls for people. I'm sure that's it!


The US bioweapons programs have really ramped down, because it's not a great tool for our interest set. Most of those places are now dedicated to increasing the price of healthcare, and some are creating really novel solutions to disease.

As an aside, Gbaji, I'd like to know how you feel about Snowden. (for a few reasons, but I won't tip my hand)



____________________________
Just as Planned.
#241 Jul 23 2016 at 7:25 AM Rating: Excellent
Liberal Conspiracy
*******
TILT
I'd like to know how Gbaji feels about the Snow Den, the hottest night club in the Arctic Circle.
____________________________
Belkira wrote:
Wow. Regular ol' Joph fan club in here.
#242 Jul 23 2016 at 8:39 AM Rating: Good
Avatar
*****
13,240 posts
Jophiel wrote:
I'd like to know how Gbaji feels about the Snow Den, the hottest night club in the Arctic Circle.


Skip it. It's filled with sniveling cubs.
____________________________
Just as Planned.
#243 Jul 23 2016 at 6:45 PM Rating: Good
Avatar
*****
13,240 posts
The fun never ends.
____________________________
Just as Planned.
#244 Jul 23 2016 at 9:00 PM Rating: Excellent
Liberal Conspiracy
*******
TILT
Ironic that you'd link to RT.com since the "hacker" was almost certainly the Russian government and intentionally dropped just prior to the convention. It's almost as though Putin wants the pro-Putin, anti-NATO guy to win.

I was reading the emails yesterday. When they say "nearly 20,000 emails" they really mean "15,000 email blasts from Politico, CNN, Reuters, AP, etc plus 4,000 news stories forwarded without comment" -- it's a dump of emails "to and from" the DNC which means there's a ton of spam and junk mail. The reason the same five emails are in every story about the dump is because they're the only thing mildly noteworthy.

Anyway, Donna Brazil visited Camp Sanders during the pre-convention stuff today and apologized and it was all rainbows or something.
____________________________
Belkira wrote:
Wow. Regular ol' Joph fan club in here.
#245 Jul 23 2016 at 10:22 PM Rating: Decent
Scholar
***
1,323 posts
Jophiel wrote:
Ironic that you'd link to RT.com since the "hacker" was almost certainly the Russian government and intentionally dropped just prior to the convention. It's almost as though Putin wants the pro-Putin, anti-NATO guy to win.

I was reading the emails yesterday. When they say "nearly 20,000 emails" they really mean "15,000 email blasts from Politico, CNN, Reuters, AP, etc plus 4,000 news stories forwarded without comment" -- it's a dump of emails "to and from" the DNC which means there's a ton of spam and junk mail. The reason the same five emails are in every story about the dump is because they're the only thing mildly noteworthy.

Anyway, Donna Brazil visited Camp Sanders during the pre-convention stuff today and apologized and it was all rainbows or something.


You make it sound like Russia is the the only entity with interest in influencing US race. It is just like with the 9/11 conversation. The argument who benefits is null as everyone will try to pull in their own direction. Is it interesting observation? Kinda.

Admittedly, few have found anything really interesting and lord knows people were looking hard. There are some interesting quips here and there, though. If I was more obsessive, I would be all over it.

I think the emails do serve a purpose though. If I was 17 year old watching my first election evolve the way it does now, I would probably be going into ***** they are lying to us' mode already. I personally think it is a valuable community service to awaken young minds early.

I am trying to remember the time my veil of innocence was torn asunder. Today it seems to happen way early man.

Also.

Apparently, some changes were made as a result of those emails. Still nothing too interesting.

Edited, Jul 24th 2016 12:49am by angrymnk
____________________________
Your soul was made of fists.

Jar the Sam
#246 Jul 23 2016 at 11:09 PM Rating: Excellent
Liberal Conspiracy
*******
TILT
angrymnk wrote:
You make it sound like Russia is the the only entity with interest in influencing US race.

Did I? Certainly not my intention. Few people though are questioning that "Guccifer2.0" is anything but a cover for the Russian government. So I found the RT.com link ironic.

If tossing DWS off the speaking list makes anyone feel better, go for it. Who actually wants to hear DWS speak?

The "interesting" emails feel like people straining too hard, especially the ones where people seem amazed that DWS did push-back against a show portraying the DNC negatively. The religion one is pretty shitty but at least the DNC didn't actually act on the suggestion. Stuff like the DNC acting as though Clinton would be the nominee in May (when Sanders was essentially mathematically eliminated) or catty asides to a story are pretty yawnsville. Anyone suggesting that DWS saying "This is a silly story. He's not going to be president" is evidence of rigging an election has no perspective or clue on what rigging an election looks like.

Edited, Jul 24th 2016 12:11am by Jophiel
____________________________
Belkira wrote:
Wow. Regular ol' Joph fan club in here.
#247 Jul 23 2016 at 11:23 PM Rating: Decent
Scholar
***
1,323 posts
Jophiel wrote:
angrymnk wrote:
You make it sound like Russia is the the only entity with interest in influencing US race.

Did I? Certainly not my intention. Few people though are questioning that "Guccifer2.0" is anything but a cover for the Russian government. So I found the RT.com link ironic.

If tossing DWS off the speaking list makes anyone feel better, go for it. Who actually wants to hear DWS speak?

The "interesting" emails feel like people straining too hard, especially the ones where people seem amazed that DWS did push-back against a show portraying the DNC negatively. The religion one is pretty shitty but at least the DNC didn't actually act on the suggestion. Stuff like the DNC acting as though Clinton would be the nominee in May (when Sanders was essentially mathematically eliminated) or catty asides to a story are pretty yawnsville. Anyone suggesting that DWS saying "This is a silly story. He's not going to be president" is evidence of rigging an election has no perspective or clue on what rigging an election looks like.

Edited, Jul 24th 2016 12:11am by Jophiel


Agreed. Unless there are really good snippets show up with, dunno, baby eating, there is nothing there so far. On the other hard, I was so wrong about this cycle I am now fully justified with saying Gary will show up to a presidential debate. It is not like I could more wrong at this point.
____________________________
Your soul was made of fists.

Jar the Sam
#248 Jul 24 2016 at 8:24 AM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
Jophiel wrote:

The "interesting" emails feel like people straining too hard, especially the ones where people seem amazed that DWS did push-back against a show portraying the DNC negatively. The religion one is pretty shitty but at least the DNC didn't actually act on the suggestion. Stuff like the DNC acting as though Clinton would be the nominee in May (when Sanders was essentially mathematically eliminated) or catty asides to a story are pretty yawnsville. Anyone suggesting that DWS saying "This is a silly story. He's not going to be president" is evidence of rigging an election has no perspective or clue on what rigging an election looks like.

Edited, Jul 24th 2016 12:11am by Jophiel


What they did was wrong, but Sanders supporters are acting like it made any difference in the outcome. Any normal minded person would assume that the DNC was not supporting the guy who admitted to becoming a Democrat out of convenience with the intent of fundamentally changing the party.

#249 Jul 24 2016 at 9:17 AM Rating: Decent
Scholar
***
1,323 posts
Almalieque wrote:
Jophiel wrote:

The "interesting" emails feel like people straining too hard, especially the ones where people seem amazed that DWS did push-back against a show portraying the DNC negatively. The religion one is pretty shitty but at least the DNC didn't actually act on the suggestion. Stuff like the DNC acting as though Clinton would be the nominee in May (when Sanders was essentially mathematically eliminated) or catty asides to a story are pretty yawnsville. Anyone suggesting that DWS saying "This is a silly story. He's not going to be president" is evidence of rigging an election has no perspective or clue on what rigging an election looks like.

Edited, Jul 24th 2016 12:11am by Jophiel


What they did was wrong, but Sanders supporters are acting like it made any difference in the outcome. Any normal minded person would assume that the DNC was not supporting the guy who admitted to becoming a Democrat out of convenience with the intent of fundamentally changing the party.



It could have, but I guess we won't know now, will we; not after the illusion of a fair playing field has been removed. There is a reason Sanders was eventually started to be treated as a genuine threat as opposed to a nuisance. Amusingly enough, by doing so they actively undermined credibility of their own party. For the record, I am all for it. I want both Rs and Ds to fail, disband, and fall into obscurity. Rs are well on their the way. Ds just need a little push...

Edited, Jul 24th 2016 11:20am by angrymnk
____________________________
Your soul was made of fists.

Jar the Sam
#250 Jul 24 2016 at 10:07 AM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
angrymnk wrote:
It could have, but I guess we won't know now, will we; not after the illusion of a fair playing field has been removed. There is a reason Sanders was eventually started to be treated as a genuine threat as opposed to a nuisance. Amusingly enough, by doing so they actively undermined credibility of their own party. For the record, I am all for it. I want both Rs and Ds to fail, disband, and fall into obscurity. Rs are well on their the way. Ds just need a little push...
Yes, we do know, because nothing in those emails had any effect on people actually voting.
#251 Jul 24 2016 at 10:53 AM Rating: Decent
Scholar
***
1,323 posts
Almalieque wrote:
angrymnk wrote:
It could have, but I guess we won't know now, will we; not after the illusion of a fair playing field has been removed. There is a reason Sanders was eventually started to be treated as a genuine threat as opposed to a nuisance. Amusingly enough, by doing so they actively undermined credibility of their own party. For the record, I am all for it. I want both Rs and Ds to fail, disband, and fall into obscurity. Rs are well on their the way. Ds just need a little push...
Yes, we do know, because nothing in those emails had any effect on people actually voting.


Remarks such as these force me to question your intelligence. Are you really arguing that politician's perceived piety level is not an issue for electorate? Really?
____________________________
Your soul was made of fists.

Jar the Sam
Reply To Thread

Colors Smileys Quote OriginalQuote Checked Help

 

Recent Visitors: 320 All times are in CST
Anonymous Guests (320)