1/ It's weird how much this Rachel Maddow episode repeats Mike Lindell almost verbatim. Both assure us that data showing a conspiracy has been validated by cyberexperts, and that no credible expert has refuted it.
I'm a credible expert, and I refute both.
2/ There is no "Trump server". The Trump org had no control over the domain, and barring some vast convoluted theory probably involving space aliens, no control over the "server" that the domain pointed to.
3/ The domain was created by Cendyn, a hotel marketing company. Among their marketing activities is sending bulk emails, which they outsource to a company called Listrak.
Cendyn controls these domains, their customers have no control.
5/ Cendyn uses Listrak servers. The server the "mail1.trump-email.com" points behaves exactly like all the other servers Cendyn uses with Listrak.
Their customers have even less control over Listrak servers as they do Cendyn domains.
6/ Until March 2016, DNS lookups for "trump-email.com" look like those done for other Cendyn customers (e.g. hyatt-email.com). They are a side effect of spam.
Then Trump and Cendyn parted ways, ending their relationship.
7/ Cendyn explains the odd DNS traffic as the fact they repurposed their servers. They do a lot more than just simple email marketing, so this isn't far fetched.
8/ So at this point you have to create some wild conspiracy theory about a bizarre, secret relationship between the Trump Org, Cendyn, and Listrak that continued after their public relationship ended, and that Cendyn is lying.
9/ Why traffic uniquely from suspect Trump allies Alfa Bank, Spectrum Health, and Heartland? I dunno.
10/ It's unlikely that the data was completely fabricated. But at the same time, this complex conspiracy theory is even less likely.
That's the definition of a "conspiracy theory", theorizing a conspiracy when other explanations are more likely.
11/ The researchers were Democrat operatives currying favor with the upcoming Hillary administration. The data is clearly manipulated. It's not a stretch to conclude that such manipulations included complete fabrication.
12/ The situation is like Mike Lindell, who promises to have "packet-captures" proving 2020 election hacking. He claims he's completely verified them -- but won't let critics like me see them.
13/ In this case, they released only a manipulate DNS data set. They claim it's been verified. They won't let critics like me near it.
14/ Some cyberexperts attended Lindell's symposiums. He didn't provide us the packet captures, then claimed victory by saying that we couldn't prove they weren't from the 2020 election. You can't prove a negative -- I can't prove space aliens weren't involved, either.
15/ The same thing is true here. They won't give independent credible experts the raw data, and then claim victory because no credible experts have refuted the data.
I have refuted the public data. I can't refute private data they won't share.
16/ For your ammusement, here was my live-tweeting my 3 day experience attending Lindell's cybersymposium in order to have a look at the pcaps.
17/ Note: Durham using the criminal justice system for political payback is ugly and evil. Maddow is right to criticize that. She's just wrong defending a conspiracy theory about DNS records, there is no evidence of secret communication with a Trump server.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
This is "Cybersecurity Awareness Month". It's a good time to remind people that it's stupid.
The idea of "security" is inherently irrational and political. The following is a good example. There's never the political will to not be scared. The only question is "how scared".
It's like "active shooter" drills in school. All the evidence points to them being ineffective.
This won't stop schools from doing them, because security is important. shrm.org/resourcesandto…
Same with armed security guards in school. There's no evidence they help. There's a lot of evidence they make other things worse, elevating normal disciplinary issues into law enforcement issues. contemporarypediatrics.com/view/can-armed…
2/ Take vaccines and masks, the things that people get really angry about. The scientific data supporting the "safety" and "efficacy" of vaccines is really, REALLY good.
But the data for masks is shitty, REALLY shitty. And yet, we can't acknowledge this.
3/ There's good reason to believe that masks help reduce the spread. It may be only a little, but it may be the factor that reduces R₀ from 1.1 down to 0.9, meaning a small effect can have huge consequences.
So there's good reasons to support mask mandate policies.
I'm confused. Which is she saying?
a) politicians should interfere with the independence of prosecutors
b) politicians should not interfere with the independence of prosecutors
In our system, prosecutors are independent. That's why it's so important when Trump coerced Ukraine politicians to prosecute Hunter Biden. It's also why it's so important Biden isn't involved in Jan 6 prosecutions. politico.com/news/2021/10/1…
Politicians deciding who should (or should not) be prosecuted based on politics is a very bad thing.
3/ Put it another way, the CEO has already decided their reasons weren't good enough, so that when you make the same arguments, they'll decide your arguments aren't good enough.
FYI: "audit" logs and "forensics" logs are different beasts.
Traditionally, an "audit" is when the auditor is trying to confirm something specific, like whether your numbers add up or you correctly followed procedures.
A "forensics" investigation is open-ended, indeterminate.
An audit starts with something is known, such as reporting quarterly results, and seeks to confirm that they are actually true.
A forensics results with an unsolved crime, and hopes to maybe find out what happened, and half the time, comes to no conclusion.
They do overlap. Forensic auditors seek to find money that people try to hide off books or embezzle, for example. Before computer logs, I'm not sure if there was an important distinction.