Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 19 submissions in the queue.
posted by martyb on Thursday April 18 2019, @04:15PM   Printer-friendly

Read the Mueller report

Pardon the brevity; submitted via my mobile phone.

[Update (20190418_203255 UTC) --martyb]

I was listening to the radio while running an errand when I heard the Mueller Report had been released. The above link was the first that came up when I did a search. I quickly posted the story using my mobile phone to get it to the community as quickly as possible. Here are additional sources as well as the MD5SUM and resultant file sizes from downloading each. The CNN file has a different size from the others. A quick inspection suggests that it contains searchable text (presumably through OCR (Optical Character Recognition) processing) whereas the others contain images of each of the pages in the report.

CNN (searchable): http://www.cnn.com/2019/04/18/politics/full-mueller-report-pdf/index.html provided a link to:
https://cdn.cnn.com/cnn/2019/images/04/18/mueller-report-searchable.pdf:
MD5: 614529b6979e7ec5323af8c2a286afdd
Size: 140,352,112 bytes

DOJ: https://www.justice.gov/storage/report.pdf:
MD5: ce5859e9b5d8b76aedd18dc296dcc1e6
Size: 145,509,756 bytes

NPR: https://www.npr.org/2019/04/18/708850903/read-the-full-mueller-report-with-redactions provided a link to:
https://media.npr.org/assets/news/2019/04/muellerreport.pdf
MD5: ce5859e9b5d8b76aedd18dc296dcc1e6
Size: 145,509,756 bytes

PBS: https://www.pbs.org/newshour/politics/read-the-redacted-mueller-report provided a link to:
https://d3i6fh83elv35t.cloudfront.net/static/2019/04/Muellereport.pdf
MD5: ce5859e9b5d8b76aedd18dc296dcc1e6
Size: 145,509,756 bytes


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Thexalon on Thursday April 18 2019, @05:36PM (10 children)

    by Thexalon (636) on Thursday April 18 2019, @05:36PM (#831741)

    I don't have the time to read the whole thing right now, but I am going to be interested in how exactly the Russians broke into the DNC and Hillary campaign email systems. About the only public information about that is that John Podesta was pwned by a phishing attack so simple that most Soylentils could have pulled it off, combined with a lack of 2-factor authentication that any halfway decent admin should have been able to set up.

    If that is really what happened, it means one of two things:
    1. The Clinton campaign and the DNC (under control of the Clinton campaign the whole time [npr.org]) hired laughably incompetent tech staff, probably in exchange for a large donation, or
    2. Their tech staff pushed for halfway-decent security and the Clinton top brass overruled them to their own detriment.

    --
    The only thing that stops a bad guy with a compiler is a good guy with a compiler.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 1) by Sulla on Thursday April 18 2019, @05:59PM (3 children)

    by Sulla (5173) on Thursday April 18 2019, @05:59PM (#831764) Journal

    From what I have read so far. There is a another report out there that the FBI relied upon that said the Chinese, Russians, and Iranians had access to Hillary's servers going back to when she was Secretary of State. This timeline lines up with when the Chinese somehow found and purged the American agents working in China when she was Secretary of State. Did not give methods, and I am not suggesting wrong doing by Hillary (other than her tech people's incompetence), but none-the-less interesting.

    --
    Ceterum censeo Sinae esse delendam
    • (Score: 2) by Thexalon on Thursday April 18 2019, @08:30PM (2 children)

      by Thexalon (636) on Thursday April 18 2019, @08:30PM (#831857)

      I'd have to think that a server in her closet set up to be an email system by some random admin and probably not updated all that diligently is most likely less secure than the email system set up and managed by the State Department. I mean, the State Department IT crew has experience and training dealing with the kinds of attacks that most of us will never see because nobody cares whether we're going to see Grandma Tilly in Florida next June half as much as they care whether, say, when that expected shipment of American-made tanks will arrive in Kiev.

      --
      The only thing that stops a bad guy with a compiler is a good guy with a compiler.
      • (Score: 1) by Sulla on Thursday April 18 2019, @08:43PM (1 child)

        by Sulla (5173) on Thursday April 18 2019, @08:43PM (#831862) Journal

        I also question when Russia had access to this information, or maybe they hacked it at a different time. We know that the Chinese had access because they culled all the spies. Same time period Russia did not kill/capture/whatever the American spies that were in its territory. That said the Russians must have had it at some point (maybe Iran) but I don't really see the Chinese releasing the email from the server because they would have been far better off with Clinton as president.

        --
        Ceterum censeo Sinae esse delendam
        • (Score: 3, Interesting) by deimtee on Friday April 19 2019, @01:52PM

          by deimtee (3272) on Friday April 19 2019, @01:52PM (#832144) Journal

          Or maybe the Russians are a bit better at this spy stuff. If you fortuitously acquire a list of enemy agents in your country you don't just shoot them all, even if you believe the list is real. You might have a bit of a clean up in sensitive areas, but you would leave most in place and either feed them false information or work on turning them into double agents. You also watch their contacts to see if you can find any others who weren't on the list.

          --
          If you cough while drinking cheap red wine it really cleans out your sinuses.
  • (Score: 0) by Anonymous Coward on Thursday April 18 2019, @07:50PM

    by Anonymous Coward on Thursday April 18 2019, @07:50PM (#831834)

    All the report does is repeat the assertion that it was Russians, not Seth Rich. No justification is provided.

  • (Score: 0) by Anonymous Coward on Thursday April 18 2019, @07:52PM (2 children)

    by Anonymous Coward on Thursday April 18 2019, @07:52PM (#831837)

    Nice off topic post you've got there.

    I guess you're one of those weirdos that use butter instead of sunscreen.

    • (Score: 1) by Sulla on Thursday April 18 2019, @08:02PM (1 child)

      by Sulla (5173) on Thursday April 18 2019, @08:02PM (#831849) Journal

      Kind of. The US and Russia have a treaty where we are each legally obligated to provide the other with evidence of criminal wrongdoing by citizens. If Russia had information, no matter how they obtained it, showing criminal misconduct of any American it is a violation to not hand that over.

      --
      Ceterum censeo Sinae esse delendam
      • (Score: 0) by Anonymous Coward on Friday April 19 2019, @11:29AM

        by Anonymous Coward on Friday April 19 2019, @11:29AM (#832114)

        You're hilarious. This is an entire report ABOUT Russian illegal behavior.

  • (Score: 2) by Thexalon on Thursday April 18 2019, @09:57PM (1 child)

    by Thexalon (636) on Thursday April 18 2019, @09:57PM (#831901)

    Now that I've had a chance to read the relevant portions (pp 37-40), it's not as interesting as I hoped. Basically, they phished for credentials, once they had them they had no problem logging in and installing some malware, and at that point the DNC and DCCC were completely pwned.

    So what have we learned? If you're protecting something important, usernames / passwords are insufficient, because somebody in your organization will be dumb enough to let their password loose.

    --
    The only thing that stops a bad guy with a compiler is a good guy with a compiler.
    • (Score: 3, Interesting) by Thexalon on Thursday April 18 2019, @11:35PM

      by Thexalon (636) on Thursday April 18 2019, @11:35PM (#831955)

      And apparently many state boards of elections were pwned by SQL Injection attacks (page 50). This is downright embarrassing.

      The interesting thing is that these are portrayed in much of the mainstream press as super-secret techniques that nobody could understand when in fact they were being taught as part of standard undergrad computer science course work over a decade ago, and been at the top of the list for OWASP for a long time.

      --
      The only thing that stops a bad guy with a compiler is a good guy with a compiler.