Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Calling all DU computer wizards! Re: Rove e-mail to Hadley

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU
 
Whoa_Nelly Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 12:35 PM
Original message
Calling all DU computer wizards! Re: Rove e-mail to Hadley
Edited on Sun Jul-17-05 12:36 PM by Whoa_Nelly
Hey Wizards!

Is it possible to gin up an email with a date, and if investigated, also assign it a fake cookie to "document" the validity of that email?

I find it sooooooo hard to believe that at this juncture in the Plame investigation that there is a "convenient" email from Rove to Hadley that serves to validate and paint Rove as "upright, forthcoming person who acted properly".
(End quote is me being facetious and completely disbelieving of anything Rove says or comes up with, documented or not.)

on edit: Want to add the Yahoo story re: Rove/Hadley email
http://news.yahoo.com/s/ap/20050715/ap_on_go_pr_wh/cia_leak_rove
Printer Friendly | Permalink |  | Top
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Sun Jul-17-05 12:39 PM
Response to Original message
1. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 12:40 PM
Response to Original message
2. WH's internal email system is without a doubt special...

...common email system knowlege doesn't apply here.

Personally I think that the email is more an indication that Rove was acting out part of a detailed plan to keep his ass clean while he, in cahoots with others in the WH, betrayed our country's security interests, more than anything else.

He knew what he was doing was wrong, and he was walking the tightrope with great finesse to put as many technicalities and misdirections between him and the evidence as possible.



Printer Friendly | Permalink |  | Top
 
Whoa_Nelly Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 12:50 PM
Response to Reply #2
5. I have to agree with you to some degree
Edited on Sun Jul-17-05 01:45 PM by Whoa_Nelly
Yet, I still find it too damn convenient that NOW there's "email proof". The WH has sat on so much re: Plame for so long...many denials, much flaming/discrediting of anyone who counters their doublespeak.

So, I still have to wonder that should this particular "email" be introduced as evidence in an attempt to exonerate Rove et al., would it be possible to create such a fake email that has "validity" through attachment of a fake cookie?
Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:05 PM
Response to Reply #5
12. Keep in mind...

That when we the public get it, is not necessarily when Fitz and the GJ got it. The convenient timing is easily explained... the email existed, Fitz and the GJ knew about it, and when Rove needed help in the media, he arranged for the information about the email to get leaked to the press.

Printer Friendly | Permalink |  | Top
 
AndyTiedye Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:35 PM
Response to Reply #5
15. A High-School Student Could Do It
Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:07 PM
Response to Reply #2
13. In Networking Class.... we were shown.... how to send a VALID
email from.... ANYWHERE... we sent each other emails from.... the Whitehouse.... true that.
Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 02:17 PM
Response to Reply #13
19. Yes, but...

...I bet you couldn't use that old trick from a Whitehouse desktop.

Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 03:09 PM
Response to Reply #19
20. One would hope not..... but there are other desktops.... many of
them already compromised.
Printer Friendly | Permalink |  | Top
 
Contrary1 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 12:45 PM
Response to Original message
3. I'm not a wizard...
but my husband thinks it is possible. He said, that even though he wouldn't know exactly how to do it right now; given enough time, he could figure it out.

This comes from a guy who use to work for Ross Perot's company, EDS, and also Diebold. By the way, he says the theory of Diebold helping fix the election is not only possible, but most likely impossible to prove, since you can program a computer to "forget".

Printer Friendly | Permalink |  | Top
 
Whoa_Nelly Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:01 PM
Response to Reply #3
8. Damn!
Am impressed with your husband's input on this :) Thanks!
...and am still in a PO'd political mental state coupled with the usual WASFBF (We Are So Far Beyond Fucked) feeling that has been in my life ever since December 2000.

My personal aside note in trying to find daily humor, no matter how small, when it comes to current political climate:
(LOL Test taste saying WASFBF aloud. It comes out as something * would say in stumbling to say any word beyond two syllables.)
Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:13 PM
Response to Reply #3
14. You can program a computer to forget... BUT code can be raised
just like the dead... even after the particular part of the hard drive has been written to repeatedly. If they wanted to know... they would find out... and the mystery would be over.

http://www.ontrack.com/

Ontrack News and Information

6/28/2005 – EasyRecovery 6.10 Now Available - Ontrack Data Recovery has launched a new version of its EasyRecovery™ family of “do-it-yourself” data recovery and file repair software. Ontrack® EasyRecovery version 6.10 enhances support to include the latest file types and improves functionality for newer hardware configurations, helping users find the recovery solution most suitable for their specific needs. Buy Now

6/14/2005 – Ontrack Launches VeriFile - Establishing a new standard for data recovery evaluations, Ontrack Data Recovery™ introduces VeriFile™ Online Data Reports, part of the fastest, most comprehensive pre-service evaluation package in the industry. VeriFile allows customers to view a complete listing of their recoverable and non-recoverable files in an organized, easily searchable format before committing to additional charges and proceeding with an actual recovery. Press Release
Printer Friendly | Permalink |  | Top
 
ArkDem Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 04:31 PM
Response to Reply #3
37. He sounds really sophisticated.
Printer Friendly | Permalink |  | Top
 
Eloriel Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 09:57 PM
Response to Reply #3
41. Yeah. Someone who examined some of the Diebold code found
self-deleting malicious routines. Nice, huh?
Printer Friendly | Permalink |  | Top
 
longship Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 12:47 PM
Response to Original message
4. Unless WH has VPN type system.
The e-mail will inevitably touch servers in between source and destination. All this is recorded in the e-mail's header as "Received" records. The logs of those servers, and they could be anywhere along the path, would have to be consistent with the headers on the e-mail as received.

But if the WH is using a virtual private network as an e-mail infrastructure, it could go point-to-point, in which case there would be no logs on intervening servers. I would think they have something like that for security.
Printer Friendly | Permalink |  | Top
 
Whoa_Nelly Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 12:52 PM
Response to Reply #4
6. Hmmmm and double-Hmmmm
If that is the case, and am thinking it may well be, how would validity of the date and source of that email be proved?
Printer Friendly | Permalink |  | Top
 
longship Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:05 PM
Response to Reply #6
11. Logs and e-mail headers must be consistent.
The e-mail system (should) log all transactions separately. These must be consistent with the entries on the headers of the e-mail. Even if the e-mail went point-to-point on a VPN, the e-mail server will record the receipt in both its log and in the e-mail header. It's possible to spoof headers, SPAMMERs do it every day. But the spoofed headers are not consistent with log entries.

The SP will have his experts analyze these things. When they subpoena the e-mails they will have also subpoenaed the logs at both ends.
Printer Friendly | Permalink |  | Top
 
AndyTiedye Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:37 PM
Response to Reply #11
16. Easy To Get Around
The easiest way would be to use a real message and alter the content.
Then all the logs would be correct.

If they control the mail servers (which they obviously do), they can
also edit the log files.
Printer Friendly | Permalink |  | Top
 
Whoa_Nelly Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:43 PM
Response to Reply #16
17. So, all in all, per the responses to this thread
means that the email should not be used as "documented evidence" in front of the GJ as it can be shown that true validity of same can be comepletely discredited. However, the argument can be raised that ANYTHING from the WH is "absolutely true and without prejudice", and must be assumed to be so as the WH is the ultimate custodian of our laws.

WASFBF!
Printer Friendly | Permalink |  | Top
 
longship Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 05:56 PM
Response to Reply #17
23. True, except
Except if the e-mail touched an independent server, which is highly unlikely.
Printer Friendly | Permalink |  | Top
 
LiberalFighter Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 12:58 PM
Response to Reply #4
7. The prosecutor's staff would have to incompetent not to catch that.
Printer Friendly | Permalink |  | Top
 
Auntie Bush Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 08:42 AM
Response to Reply #4
27. Maybe that is why bush used the term..."InternetS".
Maybe he outed his own WH system.
Printer Friendly | Permalink |  | Top
 
FormerRepublican Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:01 PM
Response to Original message
9. As a computer expert...
...it would be so riduculously easy a child could do it. The White House would have it's own email servers that pull incoming mail from the internet - the White House would have full control to hack away on the servers and get the right fake. And let's not forget that classified email systems (given the WH lack of concern with classified materials, I have no way of knowing if the system they used was classified) are totally separate from any other email servers, and the White House could do just about anything to them without anyone being the wiser. Heck, I could probably hoke the email date by having the wrong date on my computer (depending on what email appy I use).

One of the things I used to get called about endlessly as a network admin was emails with the wrong date and time because it would screw up calendar synchronization and appointment setting. We had to synchronize the server with atomic clocks. Gives you an idea of how easy it is for the date to get screwed up, doesn't it?

An email date isn't as good as the paper it's written on. Any techie worth their salt could fake an email to the point of total indetectability in about an hour, given access to the equipment and an admin account.

It's what hackers do, too.
Printer Friendly | Permalink |  | Top
 
Whoa_Nelly Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 01:04 PM
Response to Reply #9
10. Thanks! And DAMMIT
I figured as much. The spin from the Rove/Hadley email is more smoke and mirrors. WASFBF!
Printer Friendly | Permalink |  | Top
 
zulchzulu Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 03:11 PM
Response to Reply #9
21. Perhaps server logs could tell when settings were tangled with...
If you were investigating the email date, there would of course be a few things to check with to verify whether the date was correct and if settings had been messed with on the dates by analyzing server logs..and depending on how the email is generated, whether the logs on the email server would jive with the investigated email and its date.

I'd check the logs and any backup programs first before verifying the email date.

If Rove decided to change the date on his computer and then send an email, the email server he was sending to would have a log that could be checked. I'm sure the White House uses servers that are redundant and have logs outside the White House net admins.

Make sense?
Printer Friendly | Permalink |  | Top
 
Boo Boo Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 11:22 AM
Response to Reply #9
32. Self-deleted /nt
Edited on Mon Jul-18-05 11:24 AM by Boo Boo
Printer Friendly | Permalink |  | Top
 
ArkDem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-19-05 08:41 AM
Response to Reply #9
42. Windows Server 2003 won't let a computer whos time hasn't
been syncronized onto the network. Send and receive times are set on the
(time syncronized) mail server with exchange 2000 and higher. The stuff you are talking about sounds like 10 to 15 years ago, Mr. Expert.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-19-05 05:04 PM
Response to Reply #42
43. That's not the point.
These are all plain files (mail folders, mail logs, system logs), if you have proper access you can edit them to your hearts content, and you can also reset the file properties to make it impossible to detect that you did that. It is possible that one could compare with archival copies, assuming such existed and cover the requisite dates, but archives dates spread out rapidly as one recedes into the past, and given sufficient motivation one can go "fix" the archival copies too,
in some ways that's less hassle because you can do it offline.
Printer Friendly | Permalink |  | Top
 
chieftain Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 02:02 PM
Response to Original message
18. Didn't Abu Alberto announce
that a Special Prosecutor was going to be appointed? This would have given WH staff the opportunity to clean files of damaging info or salt them with exculpatory material before subpoenas could be issued.
Printer Friendly | Permalink |  | Top
 
zulchzulu Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 03:30 PM
Response to Original message
22. The question about server logs and how it could be traceable
Granted, as people have mentioned, the White House could mess with the email server logs that Rove's computer send an email after he and they change the date/time the email is sent.

The email could be sent from the White House with the altered date (and no one else could send emails at the time) and have the altered email logs show the receipt of the email sent. Surely, the log would have to be pretty surgically changed and emails within that period of time would have to jive with the other emails sent. You could grab the logs and see if Mary Q. sent an email about the subject line by cracking her computer and verifying that it happened.

Then, the logs from the email server sent to Hadley (and any other server bounces to its path) would have to jive with the White House email server logs.

Those logs would have to have the same date/time/size/header info that was on the Rove email.

It would take a lot of work to cover their tracks. And if there is any backup system that can be viewed, the email transaction and log would have to be tampered wth as well.

Rove email ------> WH email server -----> Logs =====> Hadley's Email server ----> Logs--->Hadley
Printer Friendly | Permalink |  | Top
 
applegrove Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 08:40 PM
Response to Original message
24. I think it it more likely that it took place moments after. I don't know
for sure obviously, but the creep would have been very aware that he just made a mistake ... and would start running the 'alibi' that second. Remember Rove not only has to convince the public that he is not breaking the law, he also had to convince Rice & Bush.

Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-17-05 08:57 PM
Response to Original message
25. It's all just little magnetic bits somewhere, nothing tangible about it.
Edited on Sun Jul-17-05 09:06 PM by bemildred
And you can fix the mail transfer agent to say anything you like.
Printer Friendly | Permalink |  | Top
 
jody Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 05:25 AM
Response to Original message
26. Yes, very easy. n/t
Printer Friendly | Permalink |  | Top
 
sendero Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 08:56 AM
Response to Original message
28. I think some clarification..
.... needs to be made.

Yes, it is easy to fake "headers" on an email to change the date or the sender or whatever.

But, and this is a BIG but, if you are going to do something like that you need one of these two things to be true:

1) the investigators are rubes who are simply going to take your email at face value

or

2) you've covered every base - which means that if there are backup tapes/media of servers involved ANYWHERE you have eliminated them, backup tapes/media of sending/receiving computers ANYWHERE you have elminiated them, you have cleaned up all server logs, etc, etc, etc/.

When you send an email it leaves an electronic trail all over the place. It really is not easy to clean that trail up if an investigator is suspicious of the email evidence.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 09:24 AM
Response to Reply #28
29. "When you send an email it leaves an electronic trail all over the place"
Not really. How much logging is done is a setting, and by default the answer is not much, certainly not every email. Most Sysadmins will leave it that way, the last thing they want to do is be in the position of groveling over huge mail logs. For most emails the only traceback is in the incorporated headers.
Printer Friendly | Permalink |  | Top
 
sendero Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 09:41 AM
Response to Reply #29
30. I think another clarification...
... would be that that depends on whether the email is delivered internally on an "intranet", or goes out over the "internet".

If it goes out over the internet, I stand by everything I have said.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 09:35 PM
Response to Reply #30
39. You would still be wrong.
Edited on Mon Jul-18-05 09:36 PM by bemildred
It is not even possible (in general) to trace the route of an email, or to specify that it travelled any single route, out there in the big wide world, and no sysadmin in his right mind would try to log all the packets and how they were re-assembled.

No offense, that's how IP works.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 09:40 PM
Response to Reply #30
40. To clarify myself, you would have better luck on an intranet.
Edited on Mon Jul-18-05 09:41 PM by bemildred
In terms of traceablity and archival and so on.
But you also then have the complete sort of control to do really effective fake emails.
This is not to say it might not be a bit of work.
Printer Friendly | Permalink |  | Top
 
Commie Pinko Dirtbag Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 09:43 AM
Response to Original message
31. There are ways to tell if a date in an e-mail is fake.
I'm not going to use DU to help Rove slither away, though. I'll just say that, if (BIG if) properly investigated, such fakeries can be exposed. Or at the very least thrown out as no evidence at all.
Printer Friendly | Permalink |  | Top
 
Boo Boo Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 11:24 AM
Response to Original message
33. I think that those of you posting here that
Edited on Mon Jul-18-05 11:31 AM by Boo Boo
this would be child's play, or in some way a trivial thing to do, are talking out your asses.

If the criteria is to fake an email such that it would be difficult to detect by an expert then, in my view, this would be non-trivial. It seems to me that it would require the collusion of Cooper, and it would require unfettered access to all systems involved in sending the email---both the government's systems, and Time Magazine's systems---and would probably require collusion on the part of persons that are in charge of those systems.

Even if such conditions could be arranged, there is still a major problem with this scenario: it all would've had to have been arranged two years ago, because that's when Rove's email was seized by the FBI.

I make no claims WRT being an "expert."
Printer Friendly | Permalink |  | Top
 
Boo Boo Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 12:37 PM
Response to Reply #33
34. Oops, forget what I said about Cooper...
Edited on Mon Jul-18-05 12:38 PM by Boo Boo
I got so fired up I forgot we weren't talking about Rove <--> Cooper!

The gist of what I said still holds, I think. It would certainly be easier, though, to fake something like this if the system requirements didn't involve another organization. Nonetheless, I think this is a very unlikely scenario.
Printer Friendly | Permalink |  | Top
 
FormerRepublican Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 12:48 PM
Response to Reply #34
35. That's because you're not an Network Admin...
We know just how easy it is to fake that kind of thing.

Keep in mind that most admins turn logging off because it takes up too much drive space and slows the server down. Email runs much better when there's no logging going on.

Intra-Whitehouse email could even be sent on a dummy setup. 2 computers and a server on it's own small network is all it would take. The server mirrored to the 'real' White House system, then broken off into it's own network to do the dirty deal, then wiped after the fact to conceal it. It doesn't have to include the 'real' White House email system. Network Admins have these kinds of set ups all the time to investigate network problems in system software before they roll them out to everybody else. They often have a hot server set up mirrored to the live one, as well.

Faking an email when you have the resources of the White House and boatloads of lock-stepping zombies is a walk in the park.
Printer Friendly | Permalink |  | Top
 
Boo Boo Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 03:10 PM
Response to Reply #35
36. And of course, this was all done two years ago
Edited on Mon Jul-18-05 03:13 PM by Boo Boo
by Karl Rove and Hadley while they were under orders not to mess with evidence, and the FBI was investigating. Again, the FBI seized WH records and email two years ago. Either the "deed" was done back then, or it would be quite obviously not part of the records originally confiscated by the FBI; a bit of a red flag, yes?

As far as system administration goes, I don't claim to be an expert on that, but I did program email software for a number of years with a major corporation. I've no idea if this company turned off logging or not, but the email servers were mirrored and the mirrors were archived. That way when someone calls IT and says, "Help me, I lost all the messages on my laptop," the IT guy says "No problem, how far back do you want to go?", as opposed to "Sorry boss, you're completely fucked."

I have no way of knowing what WH IT policy is regarding this stuff, and, I'm assuming, neither do you. But, one thing I am fairly certain of: the scenario you detail above is not something that children are typically capable of doing; it falls under my admittedly very general category of "non-trivial." Nonetheless, since this email didn't go between two organizations as I assumed (erroneously) in my original post, it is perhaps somewhat more plausible that it could be faked.

Anyway, this conversation is following what I find to be the typical course. Some tech-savvy person makes a hyperbolic statement about how anybody could hack this thing, even a child could do it---or other such declarations. Then, when you call 'em on it, they tell you how all you have to do is... inventing a scenario which usually turns out to be nothing even remotely like child's-play. In this case it would require a high degree of technical expertise, access to the email servers, and the willingness to commit a crime in order to help Rove fake an email.

I still consider this idea to be highly unlikely, and really not worth the trouble in any case.
Printer Friendly | Permalink |  | Top
 
ArkDem Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jul-18-05 04:37 PM
Response to Reply #35
38. Since sarbanes-oxley those logs had better be on.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 06:57 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC