Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

SunSeeker

(51,550 posts)
Wed Oct 12, 2016, 11:11 PM Oct 2016

Hackers breach Clinton campaign chairman's Twitter account

Source: CNN

John Podesta's Twitter account was hacked on Wednesday, according to a campaign spokesman, prompting the campaign to inform the social media site of the breach.

The hack comes in the midst of the ongoing release of Podesta's emails, which was stolen and are now being released by Wikileaks. The emails have been embarrassing for the Clinton campaign, bringing internal machinations of the campaign -- and some off-color comments -- into the public.

On Wednesday, as Clinton landed in Las Vegas, Podesta's seemingly tweeted, "I've switched teams. Vote Trump 2016. Hi pol."

Read more: http://www.cnn.com/2016/10/12/politics/john-podesta-twitter-hack-hillary-clinton/index.html



Gee, wonder who did that...
20 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Hackers breach Clinton campaign chairman's Twitter account (Original Post) SunSeeker Oct 2016 OP
Podesta likely used the same password on both accounts Foggyhill Oct 2016 #1
Sounds likely to me. SunSeeker Oct 2016 #6
Peggy jberryhill Oct 2016 #2
This is what they have left? alcibiades_mystery Oct 2016 #3
Maybe it's time to start using pay phones again turbinetree Oct 2016 #4
Or pen and paper and snail mail Midnight Writer Oct 2016 #8
carrier pigeons?? But now that I saw this-I think they are extinct?? riversedge Oct 2016 #9
No, they "came back". But it would be tough for 400 lb hackers to catch a pigeon. Midnight Writer Oct 2016 #10
ha ha riversedge Oct 2016 #18
IP over Avian Carriers or RFC 1149 csziggy Oct 2016 #17
That is funny. Good laugh. Thanks riversedge Oct 2016 #19
I remember reading it in 1990 - then again when they tested it in 2001 csziggy Oct 2016 #20
This is getting beyond the point of ridiculous turbinetree Oct 2016 #13
At this point, we get it....the Russians are trying to engineer an October Suprise for Trump. Old and In the Way Oct 2016 #5
Post removed Post removed Oct 2016 #11
LOL, the Russians might have been successful... cynzke Oct 2016 #12
Who knows? Old and In the Way Oct 2016 #16
Thanks for this, SunSeeker Cha Oct 2016 #7
Hacked (some faked) emails are getting so boring compared to the Trump victims' accusations wishstar Oct 2016 #14
They are posting fake tweets. yallerdawg Oct 2016 #15

csziggy

(34,136 posts)
17. IP over Avian Carriers or RFC 1149
Thu Oct 13, 2016, 10:55 AM
Oct 2016


Network Working Group D. Waitzman
Request for Comments: 1149 BBN STC
1 April 1990


A Standard for the Transmission of IP Datagrams on Avian Carriers

Status of this Memo

This memo describes an experimental method for the encapsulation of
IP datagrams in avian carriers. This specification is primarily
useful in Metropolitan Area Networks. This is an experimental, not
recommended standard. Distribution of this memo is unlimited.

Overview and Rational

Avian carriers can provide high delay, low throughput, and low
altitude service. The connection topology is limited to a single
point-to-point path for each carrier, used with standard carriers,
but many carriers can be used without significant interference with
each other, outside of early spring. This is because of the 3D ether
space available to the carriers, in contrast to the 1D ether used by
IEEE802.3. The carriers have an intrinsic collision avoidance
system, which increases availability. Unlike some network
technologies, such as packet radio, communication is not limited to
line-of-sight distance. Connection oriented service is available in
some cities, usually based upon a central hub topology.

Frame Format

The IP datagram is printed, on a small scroll of paper, in
hexadecimal, with each octet separated by whitestuff and blackstuff.
The scroll of paper is wrapped around one leg of the avian carrier.
A band of duct tape is used to secure the datagram's edges. The
bandwidth is limited to the leg length. The MTU is variable, and
paradoxically, generally increases with increased carrier age. A
typical MTU is 256 milligrams. Some datagram padding may be needed.

Upon receipt, the duct tape is removed and the paper copy of the
datagram is optically scanned into a electronically transmittable
form.

Discussion

Multiple types of service can be provided with a prioritized pecking
order. An additional property is built-in worm detection and
eradication. Because IP only guarantees best effort delivery, loss
of a carrier can be tolerated. With time, the carriers are self-



Waitzman [Page 1]

RFC 1149 IP Datagrams on Avian Carriers 1 April 1990


regenerating. While broadcasting is not specified, storms can cause
data loss. There is persistent delivery retry, until the carrier
drops. Audit trails are automatically generated, and can often be
found on logs and cable trays.

Security Considerations

Security is not generally a problem in normal operation, but special
measures must be taken (such as data encryption) when avian carriers
are used in a tactical environment.

Author's Address

David Waitzman
BBN Systems and Technologies Corporation
BBN Labs Division
10 Moulton Street
Cambridge, MA 02238

Phone: (617) 873-4323

EMail: dwaitzman@BBN.COM
https://www.ietf.org/rfc/rfc1149.txt


It's even been adapted for Linux!

RFC-1149

April 28th, 2001

11 years ago, April 1st 1990, rfc 1149 was written. This rfc specifies a protocol for IP over avian carriers, CPIP (carrier pigeon internet protocol). In 11 years, noone has bothered to implement this important protocol stack. But happily, we don’t need to wait any longer! BLUG in cooperation with Vesta Brevdueforening has given you rfc 1149 support for Linux.
Vital information

Date: April 28 2001, 12:00
Place: Bergen
Addresses:
Lyngbøveien 61, contact: Audun Larsen.
Bråtet Terrasse 21, contact Kjell Haldorsen.

Details from the actual implementation day.

A preliminary writeup of the event.
Log of the ping session
Vegards pictures.
Bjørns pictures.
Karl Magnus’ pictures.

Technical details and links

The software being used.
rfc 1149
Internet Engineering Task Force
GOCR/JOCR

Minutes from BOFs (“Birds of a Feather”s)

Minutes from the BOF on march 6th 2001
http://www.blug.linux.no/rfc1149/


csziggy

(34,136 posts)
20. I remember reading it in 1990 - then again when they tested it in 2001
Thu Oct 13, 2016, 12:15 PM
Oct 2016

They certainly had fun playing with the pigeons!

turbinetree

(24,695 posts)
13. This is getting beyond the point of ridiculous
Thu Oct 13, 2016, 09:29 AM
Oct 2016

I just finished a book about written about the art of espionage during WWII

The book name is

The Secret War Spies, Ciphers, and Guerrillas, by Max Hastings


Talk to the person twice a day somehow, over the phone or like in person every 48 hours and if you know that your password has been comprised, change it, whatever this team or him are doing is not working. Bring back the Navajo code talkers

Great Idea,

Pencil and Paper or snail mail, the mail system is pretty darn good in this country, they can have something to you in less than 24 hrs.

As we speak, three states have had there voting machines hacked or compromised, in my opinion if that happens, you had out ballots, with a pencil, they use to do once before, back in the day, this electronic BS is for what reason, so that election can be called on some tv for ratings BS----but I digress

Old and In the Way

(37,540 posts)
5. At this point, we get it....the Russians are trying to engineer an October Suprise for Trump.
Wed Oct 12, 2016, 11:16 PM
Oct 2016

Why isn't anyone hacking the RNC servers? I suspect there is far more interesting emails to read.

Response to Old and In the Way (Reply #5)

cynzke

(1,254 posts)
12. LOL, the Russians might have been successful...
Thu Oct 13, 2016, 09:28 AM
Oct 2016

EXCEPT......they didn't vet Trump. He completely fooled them like he fooled the GOP. Now there is hardly anything they could leak about Clinton that could be worse than the revelation that Donald Trump is a sexual predator and a pedophile.

Old and In the Way

(37,540 posts)
16. Who knows?
Thu Oct 13, 2016, 09:47 AM
Oct 2016

Maybe, in addition to holding his massive debt, they also have videos of Trump during his business trips to Moscow, playing with underage girls? Maybe Trump was pushed into this race by Putin. I really can't figure out why he wanted to run for office, given the low pay and headaches that the office brings.

wishstar

(5,268 posts)
14. Hacked (some faked) emails are getting so boring compared to the Trump victims' accusations
Thu Oct 13, 2016, 09:36 AM
Oct 2016

It's like, who cares what Hillary's campaign staffers quibbled about since obviously she and the campaign made the correct choices in how to proceed, i.e. doing press conferences and providing press access on her plane etc.

yallerdawg

(16,104 posts)
15. They are posting fake tweets.
Thu Oct 13, 2016, 09:45 AM
Oct 2016

But fake emails and fake speech transcripts described by Fox and Trump surrogates are unimaginable.

Just like 30 year old allegations of sexual impropriety have no place in a campaign.

Latest Discussions»Latest Breaking News»Hackers breach Clinton ca...