Oliver Stone: The Putin Interviews - Politics Forum.org | PoFo

Wandering the information superhighway, he came upon the last refuge of civilization, PoFo, the only forum on the internet ...

Language, bias, ownership, influence; all media related topics.
Forum rules: No one line posts please.
#14814222
Part 1 is out. Just watched it. Really good. Even better given the western media reaction to it. So salty that Oliver Stone didn't spend 99.99% of the first hour mentioning Russian hackers and other fake nonsense. Love it.

Watch on Showtime, or by any means available to you.

Trailer;

#14814246
Igor Antunov wrote:Putin 'needs' it? He's more liked in the west than any western politician, across the board.

This is Oliver Stone jumping at the chance. He's interviewed other world leaders in the past.

Oliver Stone also needs it, no question about it, but as Russiagate keeps going on and escalating, Putin needs it too. He needs PR stunts like that to maintain his popularity anyways. I really wonder if he's that much popular in Europe.
#14814265
Beren wrote:Oliver Stone also needs it, no question about it, but as Russiagate keeps going on and escalating, Putin needs it too. He needs PR stunts like that to maintain his popularity anyways. I really wonder if he's that much popular in Europe.


Ha ha escalating, how ?
#14814292
It's escalating in many ways, here is one of them. Putin and his propaganda machine, as well as fans will have to work hard to counterbalance the fake news media, which Trump and his administration just can't do alone it seems.
Bloomberg wrote:Russian Cyber Hacks on U.S. Electoral System Far Wider Than Previously Known

by Michael Riley and Jordan Robertson
13/06/2017 11:00 CEST

--> Attackers said to take measure of voting systems, databases
--> A ‘red phone’ warning to the Kremlin from Obama White House

Video: Russian Election Cyberattack Breached 39 U.S. States

Russia’s cyberattack on the U.S. electoral system before Donald Trump’s election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported.

In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states, one of them said.

The scope and sophistication so concerned Obama administration officials that they took an unprecedented step -- complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict.

The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept, show the scope of alleged hacking that federal investigators are scrutinizing as they look into whether Trump campaign officials may have colluded in the efforts. But they also paint a worrisome picture for future elections: The newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies comes less than a week after former FBI Director James Comey warned Congress that Moscow isn’t done meddling.

“They’re coming after America,” Comey told the Senate Intelligence Committee investigating Russian interference in the election. “They will be back.”

A spokeswoman for the Federal Bureau of Investigation in Washington declined to comment on the agency’s probe.

Kremlin Denials

Russian officials have publicly denied any role in cyber attacks connected to the U.S. elections, including a massive “spear phishing” effort that compromised Hillary Clinton’s campaign and the Democratic National Committee, among hundreds of other groups. President Vladimir Putin said in recent comments to reporters that criminals inside the country could have been involved without having been sanctioned by the Russian government.

One of the mysteries about the 2016 presidential election is why Russian intelligence, after gaining access to state and local systems, didn’t try to disrupt the vote. One possibility is that the American warning was effective. Another former senior U.S. official, who asked for anonymity to discuss the classified U.S. probe into pre-election hacking, said a more likely explanation is that several months of hacking failed to give the attackers the access they needed to master America’s disparate voting systems spread across more than 7,000 local jurisdictions.

Video: How to See If Russia Meddled With Your Vote

Such operations need not change votes to be effective. In fact, the Obama administration believed that the Russians were possibly preparing to delete voter registration information or slow vote tallying in order to undermine confidence in the election. That effort went far beyond the carefully timed release of private communications by individuals and parties.

One former senior U.S. official expressed concern that the Russians now have three years to build on their knowledge of U.S. voting systems before the next presidential election, and there is every reason to believe they will use what they have learned in future attacks.

Secure Channel

As the first test of a communication system designed to de-escalate cyber conflict between the two countries, the cyber “red phone” -- not a phone, in fact, but a secure messaging channel for sending urgent messages and documents -- didn’t quite work as the White House had hoped. NBC News first reported that use of the red phone by the White House last December.

The White House provided evidence gathered on Russia’s hacking efforts and reasons why the U.S. considered it dangerously aggressive. Russia responded by asking for more information and providing assurances that it would look into the matter even as the hacking continued, according to the two people familiar with the response.

“Last year, as we detected intrusions into websites managed by election officials around the country, the administration worked relentlessly to protect our election infrastructure,” said Eric Schultz, a spokesman for former President Barack Obama. “Given that our election systems are so decentralized, that effort meant working with Democratic and Republican election administrators from all across the country to bolster their cyber defenses.”

Illinois Database

Illinois, which was among the states that gave the FBI and the Department of Homeland Security almost full access to investigate its systems, provides a window into the hackers’ successes and failures.

In early July 2016, a contractor who works two or three days a week at the state board of elections detected unauthorized data leaving the network, according to Ken Menzel, general counsel for the Illinois board of elections. The hackers had gained access to the state’s voter database, which contained information such as names, dates of birth, genders, driver’s licenses and partial Social Security numbers on 15 million people, half of whom were active voters. As many as 90,000 records were ultimately compromised.

But even if the entire database had been deleted, it might not have affected the election, according to Menzel. Counties upload records to the state, not the other way around, and no data moves from the database back to the counties, which run the elections. The hackers had no way of knowing that when they attacked the state database, Menzel said.

The state does, however, process online voter registration applications that are sent to the counties for approval, Menzel said. When voters are added to the county rolls, that information is then sent back to the state and added to the central database. This process, which is common across states, does present an opportunity for attackers to manipulate records at their inception.

Patient Zero

Illinois became Patient Zero in the government’s probe, eventually leading investigators to a hacking pandemic that touched four out of every five U.S. states.

Using evidence from the Illinois computer banks, federal agents were able to develop digital “signatures” -- among them, Internet Protocol addresses used by the attackers -- to spot the hackers at work.

The signatures were then sent through Homeland Security alerts and other means to every state. Thirty-seven states reported finding traces of the hackers in various systems, according to one of the people familiar with the probe. In two others -- Florida and California -- those traces were found in systems run by a private contractor managing critical election systems.

(An NSA document reportedly leaked by Reality Winner, the 25-year-old government contract worker arrested last week, identifies the Florida contractor as VR Systems, which makes an electronic voter identification system used by poll workers.)

In Illinois, investigators also found evidence that the hackers tried but failed to alter or delete some information in the database, an attempt that wasn’t previously reported. That suggested more than a mere spying mission and potentially a test run for a disruptive attack, according to the people familiar with the continuing U.S. counterintelligence inquiry.

States’ Response

That idea would obsess the Obama White House throughout the summer and fall of 2016, outweighing worries over the DNC hack and private Democratic campaign emails given to Wikileaks and other outlets, according to one of the people familiar with those conversations. The Homeland Security Department dispatched special teams to help states strengthen their cyber defenses, and some states hired private security companies to augment those efforts.

In many states, the extent of the Russian infiltration remains unclear. The federal government had no direct authority over state election systems, and some states offered limited cooperation. When then-DHS Secretary Jeh Johnson said last August that the department wanted to declare the systems as national critical infrastructure -- a designation that gives the federal government broader powers to intervene -- Republicans balked. Only after the election did the two sides eventually reach a deal to make the designation.

Relations with Russia remain strained. The cyber red phone was announced in 2011 as a provision in the countries’ Nuclear Risk Reduction Centers to allow urgent communication to defuse a possible cyber conflict. In 2008, what started during the Cold War as a teletype messaging system became a secure system for transferring messages and documents over fiber-optic lines.

After the Obama administration transmitted its documents and Russia asked for more information, the hackers’ work continued. According to the leaked NSA document, hackers working for Russian military intelligence were trying to take over the computers of 122 local election officials just days before the Nov. 8 election.

While some inside the Obama administration pressed at the time to make the full scope of the Russian activity public, the White House was ultimately unwilling to risk public confidence in the election’s integrity, people familiar with those discussions said.
#14814325
Beren wrote:It's escalating in many ways, here is one of them. Putin and his propaganda machine, as well as fans will have to work hard to counterbalance the fake news media, which Trump and his administration just can't do alone it seems.


Is this officially shifting of the narrative, since nobody is buying your "guilty by anonymous source and the facts and evidence will eventually come" angle .
#14814326
You asked how Russiagate is escalating and I gave you an example that was just in, the rest is up to you. Sessions also testifies soon. Stay tuned, I would say, only god knows how long this will last and how deep the rabbit hole is. ;)
#14814327
Beren wrote:You asked how Russiagate is escalating and I gave you an example that was just in, the rest is up to you. Sessions also testifies soon. Stay tuned, I would say, only god knows how long this will last and how deep the rabbit hole is. ;)


Remember when you were a kid playing in the sand at the beach, and your parents said you can dig to China?
#14814335
Sessions already lied, completely unprompted by Senator Franken, and had to recuse himself as a result.

He's not a smart man, as evidenced by the fact that he volunteered to help with the campaign and works with the Trump administration. I believes Sessions dumb speak change narrative.
#14814336
Finfinder wrote:It will be interesting watching the Democrats attempt to claim Sessions perjured himself. Its not going to work out so well.

How does that respond to what you quoted? :?:

I thought we were finished, maybe I'm really old indeed. :lol:
#14814340
SpecialOlympian wrote:Watch out, Beren. I know this move. Finfinder try change narrative, no fall trick!



Is this part of the forum , where members follow you around like stalkers, bringing up old threads and false claims. Do you have anything at all to add to this discussion or is it just too far above your adolescent intellect to participate in an adult manner?
#14814344
SpecialOlympian wrote:I did just add to the conversation. Please stop try change narrative.


When you keep saying "Try Change Narrative" can you please tell the forum what it is you mean by that. You have followed me around like a stalker from different threads saying that. If you are doing nothing wrong and you are really on topic and are not trying to troll me then it shouldn't be a problem for you to explain. ;) 8) :lol:

@Beren
You can put all this to bed if you can offer this forum just one scrap of evidence to prove any one of your claims. I'm getting confused you keep changing the story, first it was Trumps collusion and that is why he won the election, now its Obstruction of justice. That's out now, because last week was devastating for your argument. Whats next?
#14814345
Finfinder wrote:You can put all this to bed if you can offer this forum just one scrap of evidence to prove any one of your claims.


Why would any organisation doing an investigation publish evidence before a conclusion? What is it with people in this forum. Do they not have any common sense. What benefit does the FBI have by announcing their current evidence when they are still working on this hacking scandal? Would you expect the FBI to announce evidence of terror plots before they have got the culprits in custody? Whatever the outcome, you can be assured that when a conclusion is finally accomplished, all evidence will be published with it. Until then, you shouldn't be naive.
#14814349
Finfinder wrote:When you keep saying "Try Change Narrative" can you please tell the forum what it is you mean by that. You have followed me around like a stalker from different threads saying that. If you are doing nothing wrong and you are really on topic and are not trying to troll me then it shouldn't be a problem for you to explain. ;) 8) :lol:


Explain what? I simply point out you try change narrative.

You offer nothing of substance in any thread you post in. Lets do a recap of page 1 for you:

Post 1: "Oh yeah where's your proof?"

[Beren presents you with proof]

Post 2: "I reject your proof on no logical grounds you try change narrative, not me I no try change narrative you change narrative."

Post 3: Ad hominem, further try change narrative.

Post 4: Liberals are dumb!

Post 5: Ad hominem, further try change narrative.

Isn't oil and electricity bought and sold like ev[…]

@Potemkin I heard this song in the Plaza Grande […]

Russia-Ukraine War 2022

The "Russian empire" story line is inve[…]

I (still) have a dream

Even with those millions though. I will not be ab[…]