Saturday MAGA! Reddit Censorship, just the kind of thing lefties do.

Just in case:

This was originally posted by the user /u/biglymagaback. His account has since been deleted. Justice beats in the hearts of the forgotten. I have no intention of deleting this account. Archive this for posterity.

https://twitter.com/julianassange/status/853242264272998400?

There are two narratives at stake here - the Russian Narrative, and the Seth Rich Narrative. Both are true, from a certain point of view. I'll explain.

Background Info:

/u/stonetear = Paul "I have full access to the server" Combetta

"Hillary Clinton spied on her own campaign staff"

“She believed her 2008 campaign had failed her — not the other way around — and she wanted ‘to see who was talking to who, who was leaking to who,’ said a source familiar with the operation,”

Timeline:

Podesta Email, March 25, 2014: Re: Google Account recovery phone number changed:

That was me [Eryn Sepp is Podesta's secretary]. Changed it from CAP cell phone to your current personal cell phone #. Did that on Sunday when I was downloading Herb's files to your CF thumbdrive (also added it to your "google drive" that has a good deal of space on it).

June 2014 -- Seth Rich joins the DNC as the national data director.

July 23, 2014 -- Stonetear crowdsources e-mail scrub via Reddit - however, specifically asks about hiding email addresses - not whole emails. Also claims he has separate storage.

/u/stonetear, December 10, 2014: "Auto-delete/retention policy and 'save' folder":

Hello- I have a client who wants to push out a 60 day email retention policy for certain users. However, they also want these users to have a 'Save Folder' in their Exchange folder list where the users can drop items that they want to hang onto longer than the 60 day window.

All email in any other folder in the mailbox should purge anything older than 60 days (should not apply to calendar or contact items of course). How would I go about this? Some combination of retention and managed folder policy?

Hillary Clinton email, December 22, 2014: "Re: Could you talk today or over the weekend?"

Sorry. Can't tell what happened with the email elves. I can do tonight after 8:00 or anytime tomorrow before 4:30."

A PHONE CALL?! TO HIS PERSONAL CELL PHONE?!

/u/stonetear Reddit post, December 22, 2014: Bypassing two-factor authentication with domain name?:

Hello- I have a firewall (200D) which seems to be allowing domain users (Whether authenticated via RADIUS or LDAP) to bypass the request for their token by logging in with domainame\username for the SSL VPN. If they use just username, they get the token prompt.

As stated above, I have been testing with both RADIUS and LDAP authentication to the domain controllers, but the behavior seems to be the same with either.

I've been doing a bunch of searching but am coming up empty so far. Before I open a case with Fortinet, I figured I'd ask here. Thanks in advance!

Edit: They can bypass the token via the web portal as well as the Forticlient by logging in as domain\username

"Here’s How an Attacker Can Bypass Your Two-Factor Authentication":

Two-factor authentication systems aren’t as foolproof as they seem. An attacker doesn’t actually need your physical authentication token if they can trick your phone company or the secure service itself into letting them in.

The two-step authentication systems on many websites work by sending a message to your phone via SMS when someone tries to log in.

All an attacker has to do is call your cell phone company’s customer service department and pretend to be you. They’ll need to know what your phone number is and know some personal details about you. These are the kinds of details — for example, credit card number, last four digits of an SSN, and others — that regularly leak in big databases and are used for identity theft. The attacker can try to get your phone number moved to their phone.

Heck, an attacker might not need access to your full phone number. They could gain access to your voice mail, try to log in to websites at 3 a.m., and then grab the verification codes from your voice mailbox. How secure is your phone company’s voice mail system, exactly? How secure is your voice mail PIN — have you even set one? Not everyone has! And, if you have, how much effort would it take for an attacker to get your voice mail PIN reset by calling your phone company?

The intruders so thoroughly compromised the DNC’s system that they also were able to read all email and chat traffic, said DNC officials and the security experts.

Podesta Email, March 5, 2015: Re: Thought:

When I worked for the leadership we had a records retention policy to actively destroy all emails after 3 or 6 months . Each office made up its own policy. Reporters should be asking congress and individual members what their policy is ? Do they use private accounts for biz ? Why does fioa not apply to them ?

We are. Limited Success.

Podesta Email, March 16, 2015: FW: Email retention/deletion:

Good people of American Progress: As we flagged for you last month, we are in the process of implementing CAP/AF's longstanding records retention policy (attached) for email. This process requires your participation.

Over the next three months, you are required to identify and designate any Retention Category emails (defined below) in your possession. Beginning on June 16, all email older than two years that is not designated for preservation will be automatically and permanently deleted.

What is a Retention Category email?

For most employees, Retention Category emails are limited to emails containing important institutional records or knowledge that is not recorded elsewhere.

o This is a limited category, including only emails containing information (not memorialized elsewhere) that you believe will continue to be of importance to CAP/AF's work, even 2+ years after receipt. For instance correspondence setting forth guidelines for ongoing projects, memoranda describing major efforts, documentation of significant decisions with ongoing implications, etc. o Please be selective. Most employees should have few Retention Category emails.

o Legal and Tech will be conducting team briefings in the coming weeks, but please contact us at any time with questions. * Emails relevant to any actual or potential legal proceeding or government investigation must be preserved. However, outside of a small number of intellectual property issues, CAP/AF is not involved in any investigation or proceeding. If that changes, the legal team will let you know.

Legal, financial, HR, and administrative records are preserved under separate policies that apply the legal, finance, HR, and admin teams. What should I do with Retention Category emails? * In the coming weeks, Tech will create a "Retention" folder in your Outlook. Emails in the retention folder will be preserved indefinitely, and will not be automatically deleted. In the meantime, we encourage you to begin identifying and marking Retention Category emails, either by flagging them or by dragging them into a new Outlook folder of your own creation. Once Tech has created a "Retention" folder for you, you can drag your marked emails into it.

Going Forward / Going Back

You have three months to go through your inbox, sent mail, and organizational folders to identify old retention category emails. Starting on June 16, email older than 2 years that is not in your Retention folder will be permanently deleted, on a rolling basis. Going forward, you should move Retention Category emails into the Retention folder as needed. You will be able to create organizational subfolders within the Retention folder. Do not place non-Retention Category emails in the Retention folder Legal and Tech will be going to-to-team to answer questions and help with implementation. But feel free to ask us questions at any time.

/u/stonetear email, July 30, 2015: "VPN log report?":

Hello- Is there any way to spit out a simple VPN connection report? Ie, who logged in, and when? I've been able to cobble something together from the raw log files, then filtering/massaging in Excel, but it's a real pain in the rear. We have several customers that would like to be able to get a weekly or monthly report on remote user logins. Is a syslog server setup/config or FortiAnalyzer the only way to do this?

September 2015 -- Josh Uretsky joins Bernie campaign as national data director, recommended by Seth Rich (according to Sanders in a Dec 2015 interview).

/u/stonetear Reddit post, Oct 26, 2015: "Attachment report?"

I have a customer who wants to be able to run a weekly or monthly report that shows all emails sent that have attachment(s) over X megabytes, along with the from/to/date info, in a format that is at least semi-management friendly. Third party software is fine, though I imagine this is doable via PowerShell/message tracking... however I have been striking out so far. Environment is Exchange 2010 SP3. Any suggestions are welcome!

*** December 16, 2015 -- NGP VAN applies new patch to DNC servers. According to email 15792, due to a "glitch in the code" the normal system barriers were lowered for four hours and users could access other users data. This data could still only be accessed by other DNC user accounts. Four unique users ran and downloaded the results of 25 unique searches, saved to private hard drives and were removed from the premises. ***

*** December 17, 2015 -- DNC officials discover the person who accessed information was connected to the Bernie team and demand discipline of the individual. ***

*** December 18, 2015 -- Bernie campaign fires Josh Uretsky, his campaign's national data director ***

*** December 19, 2015 (Saturday evening at 10pm) Amy Dacey reports the previous incident to Podesta (via Mary Fisher for some reason) ***

*** December 25, 2015 interview about break-in event where Sanders blames the DNC for recommending Josh Urutsky. He says that he was recommended by the DNC's national data dir

/r/The_Donald Thread Parent