ADVERTISEMENT

Trump Tower server and Russian 'pings'...interesting story now

Joes Place

HB King
Aug 28, 2003
151,443
163,912
113
Data Patterns Reveal Trump Tower/Spectrum Health Ran a “Stealth Data Machine” With Russia

Jared Kushner is currently taking a victory lap, crowin’ about his “Stealth Data Machine” that put Donald Trump over the top in the 2016 race. Let’s pry off the lid and peer into the inner-workings of this “Data Machine.”

The Signal in the Noise

Building on the work of @LouiseMensch and data analysis by @Conspirator0 on Twitter, Tea Pain has stumbled onto a possible “signal in the noise” that opens a window into the data-swappin’ shenanigans going on between Trump Tower, Spectrum Health and Russia’s Alfa Bank during the election.

Spectrum Health, owned by Michigan’s powerful Devos family, attempted to explain the IP activity as “Voice over IP traffic”, whereas Alfa Bank offered an even more exotic explanation that “hackers attempted to make it look like we contacted Trump Tower.”

The data traffic, when analyzed, tells a very different story, a story of automated, orchestrated data sharing among multiple sites for a strategic end.

Tea Pain originally dismissed this story as a possible red-herring. With the Russia craze at a fever pitch, this activity could be explained by what Tea’s daddy used to say, “When you got a new hammer, everything looks like a nail.” But when Tea Pain saw the data patterns analyzed by Conspiritor0, he knew he’d spotted something mighty familiar: Database Replication. Put a pin in that, more on that later.

At first, data analysts were puzzled by what appeared to be random activity with no apparent pattern. Perhaps it was email activity? Maybe money transfers? But there were literally thousands of these IP “pings.”

Once the activity was charted, a pattern emerged. For example, a connection is made from Alfa Bank to Trump Tower, which may last anywhere from 1 minute to 15 minutes or more, followed by a longer “sleep” period. When averaged over months, these events charted an average time between connections to be 3660 seconds, or 1 hour and 1 minute. Whatever was running, it would hook up, transfer data for a few minutes, then go to sleep for an hour.

This was the clue that led Tea Pain to formulate a much clearer working model to explain what we were all seeing: SQL Server Database Replication between multiple sites.

What Is Database Replication?

Database Replication is a rather simple concept. When you have a database with millions of records representing hundreds of gigabytes of data, and you would like to keep a copy of that database housed in 2 or more locations, it makes no sense to continually copy the entire database from point A to point B every time a change is made, so you “replicate” it.

This allows only the changes made to be sent from one database to another. This is accomplished by a process that runs on timely intervals, usually an hour, that wakes up and checks the changes made since the last hour and broadcasts those changes to the other database. The other database, in turn, check for its changes and broadcasts them in the other direction. Voila! Both databases are identical!

So what does the data traffic patterns suggest? Check out the chart below. Behold, Kushner’s “Stealth Data Machine.”

russia-data-traffic.png


The white box illustrates the scope of data we can now observe. The bulk of the replication took place between Trump Tower and Alfa Bank, while smaller amounts of data were transferred between Trump Tower and Spectrum Health. If, for example, Trump Tower talked to Alfa Bank for 10 minutes, the next Spectrum-Trump Tower connection might last only one minute, indicating data replicated from Trump Tower to the Devos health care empire was being filtered, perhaps by “WHERE StateCode=’MI'” for example. But when changes were made at Spectrum, things looked very different.


ip-packetts.png


Conspiritor0 noted that when Spectrum connected to Trump Tower, Trump Tower’s next connect time was significantly longer, indicating Spectrum had modified a large chunk of records that had to be synced to Trump Tower, then pushed on to Alfa Bank. This detail was important in identifying that replication was in use. In this scenario, Trump Tower was functioning as a center-point, a data distribution center if you will.

We don’t know what was in these data packets; that info is beyond our purview at this time, but ask yourself a simple question and you find your answer: “What do Trump Tower, the Devos Family and the Russians all have in common? A desire for Donald Trump to be President of the United States.

Tea Pain’s working theory is that Russia created a voter targeting database with information gleaned from hacked DNC data rolls and other data rolls “acquired” from other states to feed this growing contact database. That database originated at Russian Intelligence which was in turn replicated to Russia’s Alfa Bank. This is where the “data laundering” takes place, Alfa Bank is the pivot point where the FSB’s data fingerprints are wiped clean. Ironically Russia launders its data at the same place it launders its money.

At Trump Tower, more data could merged into this system using various legal sources as well. Spectrum Health could also add value to the data by matching names and addresses in their extensive healthcare databases to harvest email addresses and phone numbers to flesh out this list. All these changes would be promptly replicated back to Russia in a matter of hours.

Once back in the hands of Russian Intelligence, this massaged data could be programmatically matched up with social media handles to create a micro-targeted “hit list” for the thousand Russian trolls employed by Putin.


The Payoff

How is this a breakthrough? Now that we have identified the likely means of how this data was transferred, data analysts now have more precise points to search for to arrive at a complete reveal of the massive data collusion between Team Trump and America’s foremost adversary.

The “beauty” of this system is its simplicity. Here’s some bullet-points to sum up.




    • No special software needed. SQL Server is used in most every major enterprise. Replication is a built-in tool. No mysterious hidden processes, viruses, malware, etc.
    • Virtually undetectable. No one would blink an eye at data replication, a standard business practice.
    • Could all be set up remotely with only VPN credentials and remote desktop access, information that is often shared via routine third-party data audits. No one inside Trump Tower or Spectrum’s IT department need be involved. One Russian Intelligence data operative could set this up in less than an hour at each location. No low-level “conspirators” needed.
    • Value could be added to the data anywhere in the chain and it would promote back to Russian Intelligence within 2-3 hours.
    • All data-transmission would be out in the open, mixed in with the daily flow of business.
    • Even if found, the data would look benign, just names, addresses, phone numbers, email addresses, social media handles, etc. No financial information. It would look just like a contact lead database purchased from any data-mining merchant.
    • Trump/Spectrum operatives and employees in the United States could interact with this list and have no clue the origins of the data were nefarious. This plain-sight approach was the key to its success.

Wow....no clue how 'legit' this information is, but the indication (and revelation) that the Trump Tower server may have been a link-point between a Russian bank and a Devos system - that's astounding!!

Was this 'intentionally' set up by Trump people?

OR, could it have been covertly set up by Russian intel/spies who were "businessmen" working with Trump people and Devos people and simply 'wormed' in code via Flash drives or something and did this w/o the knowledge/complicity of any of them?

It would certainly imply much larger Russian involvement than simply 'leaking some emails' via WikiLeaks....that's for sure...

Holy cheesenuts!!!

https://teapainusa.wordpress.com/20...ealth-ran-a-stealth-data-machine-with-russia/
 
Data Patterns Reveal Trump Tower/Spectrum Health Ran a “Stealth Data Machine” With Russia

Jared Kushner is currently taking a victory lap, crowin’ about his “Stealth Data Machine” that put Donald Trump over the top in the 2016 race. Let’s pry off the lid and peer into the inner-workings of this “Data Machine.”

The Signal in the Noise

Building on the work of @LouiseMensch and data analysis by @Conspirator0 on Twitter, Tea Pain has stumbled onto a possible “signal in the noise” that opens a window into the data-swappin’ shenanigans going on between Trump Tower, Spectrum Health and Russia’s Alfa Bank during the election.

Spectrum Health, owned by Michigan’s powerful Devos family, attempted to explain the IP activity as “Voice over IP traffic”, whereas Alfa Bank offered an even more exotic explanation that “hackers attempted to make it look like we contacted Trump Tower.”

The data traffic, when analyzed, tells a very different story, a story of automated, orchestrated data sharing among multiple sites for a strategic end.

Tea Pain originally dismissed this story as a possible red-herring. With the Russia craze at a fever pitch, this activity could be explained by what Tea’s daddy used to say, “When you got a new hammer, everything looks like a nail.” But when Tea Pain saw the data patterns analyzed by Conspiritor0, he knew he’d spotted something mighty familiar: Database Replication. Put a pin in that, more on that later.

At first, data analysts were puzzled by what appeared to be random activity with no apparent pattern. Perhaps it was email activity? Maybe money transfers? But there were literally thousands of these IP “pings.”

Once the activity was charted, a pattern emerged. For example, a connection is made from Alfa Bank to Trump Tower, which may last anywhere from 1 minute to 15 minutes or more, followed by a longer “sleep” period. When averaged over months, these events charted an average time between connections to be 3660 seconds, or 1 hour and 1 minute. Whatever was running, it would hook up, transfer data for a few minutes, then go to sleep for an hour.

This was the clue that led Tea Pain to formulate a much clearer working model to explain what we were all seeing: SQL Server Database Replication between multiple sites.

What Is Database Replication?

Database Replication is a rather simple concept. When you have a database with millions of records representing hundreds of gigabytes of data, and you would like to keep a copy of that database housed in 2 or more locations, it makes no sense to continually copy the entire database from point A to point B every time a change is made, so you “replicate” it.

This allows only the changes made to be sent from one database to another. This is accomplished by a process that runs on timely intervals, usually an hour, that wakes up and checks the changes made since the last hour and broadcasts those changes to the other database. The other database, in turn, check for its changes and broadcasts them in the other direction. Voila! Both databases are identical!

So what does the data traffic patterns suggest? Check out the chart below. Behold, Kushner’s “Stealth Data Machine.”

russia-data-traffic.png


The white box illustrates the scope of data we can now observe. The bulk of the replication took place between Trump Tower and Alfa Bank, while smaller amounts of data were transferred between Trump Tower and Spectrum Health. If, for example, Trump Tower talked to Alfa Bank for 10 minutes, the next Spectrum-Trump Tower connection might last only one minute, indicating data replicated from Trump Tower to the Devos health care empire was being filtered, perhaps by “WHERE StateCode=’MI'” for example. But when changes were made at Spectrum, things looked very different.


ip-packetts.png


Conspiritor0 noted that when Spectrum connected to Trump Tower, Trump Tower’s next connect time was significantly longer, indicating Spectrum had modified a large chunk of records that had to be synced to Trump Tower, then pushed on to Alfa Bank. This detail was important in identifying that replication was in use. In this scenario, Trump Tower was functioning as a center-point, a data distribution center if you will.

We don’t know what was in these data packets; that info is beyond our purview at this time, but ask yourself a simple question and you find your answer: “What do Trump Tower, the Devos Family and the Russians all have in common? A desire for Donald Trump to be President of the United States.

Tea Pain’s working theory is that Russia created a voter targeting database with information gleaned from hacked DNC data rolls and other data rolls “acquired” from other states to feed this growing contact database. That database originated at Russian Intelligence which was in turn replicated to Russia’s Alfa Bank. This is where the “data laundering” takes place, Alfa Bank is the pivot point where the FSB’s data fingerprints are wiped clean. Ironically Russia launders its data at the same place it launders its money.

At Trump Tower, more data could merged into this system using various legal sources as well. Spectrum Health could also add value to the data by matching names and addresses in their extensive healthcare databases to harvest email addresses and phone numbers to flesh out this list. All these changes would be promptly replicated back to Russia in a matter of hours.

Once back in the hands of Russian Intelligence, this massaged data could be programmatically matched up with social media handles to create a micro-targeted “hit list” for the thousand Russian trolls employed by Putin.


The Payoff

How is this a breakthrough? Now that we have identified the likely means of how this data was transferred, data analysts now have more precise points to search for to arrive at a complete reveal of the massive data collusion between Team Trump and America’s foremost adversary.

The “beauty” of this system is its simplicity. Here’s some bullet-points to sum up.




    • No special software needed. SQL Server is used in most every major enterprise. Replication is a built-in tool. No mysterious hidden processes, viruses, malware, etc.
    • Virtually undetectable. No one would blink an eye at data replication, a standard business practice.
    • Could all be set up remotely with only VPN credentials and remote desktop access, information that is often shared via routine third-party data audits. No one inside Trump Tower or Spectrum’s IT department need be involved. One Russian Intelligence data operative could set this up in less than an hour at each location. No low-level “conspirators” needed.
    • Value could be added to the data anywhere in the chain and it would promote back to Russian Intelligence within 2-3 hours.
    • All data-transmission would be out in the open, mixed in with the daily flow of business.
    • Even if found, the data would look benign, just names, addresses, phone numbers, email addresses, social media handles, etc. No financial information. It would look just like a contact lead database purchased from any data-mining merchant.
    • Trump/Spectrum operatives and employees in the United States could interact with this list and have no clue the origins of the data were nefarious. This plain-sight approach was the key to its success.

Wow....no clue how 'legit' this information is, but the indication (and revelation) that the Trump Tower server may have been a link-point between a Russian bank and a Devos system - that's astounding!!

Was this 'intentionally' set up by Trump people?

OR, could it have been covertly set up by Russian intel/spies who were "businessmen" working with Trump people and Devos people and simply 'wormed' in code via Flash drives or something and did this w/o the knowledge/complicity of any of them?

It would certainly imply much larger Russian involvement than simply 'leaking some emails' via WikiLeaks....that's for sure...

Holy cheesenuts!!!

https://teapainusa.wordpress.com/20...ealth-ran-a-stealth-data-machine-with-russia/
 
Data Patterns Reveal Trump Tower/Spectrum Health Ran a “Stealth Data Machine” With Russia

Jared Kushner is currently taking a victory lap, crowin’ about his “Stealth Data Machine” that put Donald Trump over the top in the 2016 race. Let’s pry off the lid and peer into the inner-workings of this “Data Machine.”

The Signal in the Noise

Building on the work of @LouiseMensch and data analysis by @Conspirator0 on Twitter, Tea Pain has stumbled onto a possible “signal in the noise” that opens a window into the data-swappin’ shenanigans going on between Trump Tower, Spectrum Health and Russia’s Alfa Bank during the election.

Spectrum Health, owned by Michigan’s powerful Devos family, attempted to explain the IP activity as “Voice over IP traffic”, whereas Alfa Bank offered an even more exotic explanation that “hackers attempted to make it look like we contacted Trump Tower.”

The data traffic, when analyzed, tells a very different story, a story of automated, orchestrated data sharing among multiple sites for a strategic end.

Tea Pain originally dismissed this story as a possible red-herring. With the Russia craze at a fever pitch, this activity could be explained by what Tea’s daddy used to say, “When you got a new hammer, everything looks like a nail.” But when Tea Pain saw the data patterns analyzed by Conspiritor0, he knew he’d spotted something mighty familiar: Database Replication. Put a pin in that, more on that later.

At first, data analysts were puzzled by what appeared to be random activity with no apparent pattern. Perhaps it was email activity? Maybe money transfers? But there were literally thousands of these IP “pings.”

Once the activity was charted, a pattern emerged. For example, a connection is made from Alfa Bank to Trump Tower, which may last anywhere from 1 minute to 15 minutes or more, followed by a longer “sleep” period. When averaged over months, these events charted an average time between connections to be 3660 seconds, or 1 hour and 1 minute. Whatever was running, it would hook up, transfer data for a few minutes, then go to sleep for an hour.

This was the clue that led Tea Pain to formulate a much clearer working model to explain what we were all seeing: SQL Server Database Replication between multiple sites.

What Is Database Replication?

Database Replication is a rather simple concept. When you have a database with millions of records representing hundreds of gigabytes of data, and you would like to keep a copy of that database housed in 2 or more locations, it makes no sense to continually copy the entire database from point A to point B every time a change is made, so you “replicate” it.

This allows only the changes made to be sent from one database to another. This is accomplished by a process that runs on timely intervals, usually an hour, that wakes up and checks the changes made since the last hour and broadcasts those changes to the other database. The other database, in turn, check for its changes and broadcasts them in the other direction. Voila! Both databases are identical!

So what does the data traffic patterns suggest? Check out the chart below. Behold, Kushner’s “Stealth Data Machine.”

russia-data-traffic.png


The white box illustrates the scope of data we can now observe. The bulk of the replication took place between Trump Tower and Alfa Bank, while smaller amounts of data were transferred between Trump Tower and Spectrum Health. If, for example, Trump Tower talked to Alfa Bank for 10 minutes, the next Spectrum-Trump Tower connection might last only one minute, indicating data replicated from Trump Tower to the Devos health care empire was being filtered, perhaps by “WHERE StateCode=’MI'” for example. But when changes were made at Spectrum, things looked very different.


ip-packetts.png


Conspiritor0 noted that when Spectrum connected to Trump Tower, Trump Tower’s next connect time was significantly longer, indicating Spectrum had modified a large chunk of records that had to be synced to Trump Tower, then pushed on to Alfa Bank. This detail was important in identifying that replication was in use. In this scenario, Trump Tower was functioning as a center-point, a data distribution center if you will.

We don’t know what was in these data packets; that info is beyond our purview at this time, but ask yourself a simple question and you find your answer: “What do Trump Tower, the Devos Family and the Russians all have in common? A desire for Donald Trump to be President of the United States.

Tea Pain’s working theory is that Russia created a voter targeting database with information gleaned from hacked DNC data rolls and other data rolls “acquired” from other states to feed this growing contact database. That database originated at Russian Intelligence which was in turn replicated to Russia’s Alfa Bank. This is where the “data laundering” takes place, Alfa Bank is the pivot point where the FSB’s data fingerprints are wiped clean. Ironically Russia launders its data at the same place it launders its money.

At Trump Tower, more data could merged into this system using various legal sources as well. Spectrum Health could also add value to the data by matching names and addresses in their extensive healthcare databases to harvest email addresses and phone numbers to flesh out this list. All these changes would be promptly replicated back to Russia in a matter of hours.

Once back in the hands of Russian Intelligence, this massaged data could be programmatically matched up with social media handles to create a micro-targeted “hit list” for the thousand Russian trolls employed by Putin.


The Payoff

How is this a breakthrough? Now that we have identified the likely means of how this data was transferred, data analysts now have more precise points to search for to arrive at a complete reveal of the massive data collusion between Team Trump and America’s foremost adversary.

The “beauty” of this system is its simplicity. Here’s some bullet-points to sum up.




    • No special software needed. SQL Server is used in most every major enterprise. Replication is a built-in tool. No mysterious hidden processes, viruses, malware, etc.
    • Virtually undetectable. No one would blink an eye at data replication, a standard business practice.
    • Could all be set up remotely with only VPN credentials and remote desktop access, information that is often shared via routine third-party data audits. No one inside Trump Tower or Spectrum’s IT department need be involved. One Russian Intelligence data operative could set this up in less than an hour at each location. No low-level “conspirators” needed.
    • Value could be added to the data anywhere in the chain and it would promote back to Russian Intelligence within 2-3 hours.
    • All data-transmission would be out in the open, mixed in with the daily flow of business.
    • Even if found, the data would look benign, just names, addresses, phone numbers, email addresses, social media handles, etc. No financial information. It would look just like a contact lead database purchased from any data-mining merchant.
    • Trump/Spectrum operatives and employees in the United States could interact with this list and have no clue the origins of the data were nefarious. This plain-sight approach was the key to its success.

Wow....no clue how 'legit' this information is, but the indication (and revelation) that the Trump Tower server may have been a link-point between a Russian bank and a Devos system - that's astounding!!

Was this 'intentionally' set up by Trump people?

OR, could it have been covertly set up by Russian intel/spies who were "businessmen" working with Trump people and Devos people and simply 'wormed' in code via Flash drives or something and did this w/o the knowledge/complicity of any of them?

It would certainly imply much larger Russian involvement than simply 'leaking some emails' via WikiLeaks....that's for sure...

Holy cheesenuts!!!

https://teapainusa.wordpress.com/20...ealth-ran-a-stealth-data-machine-with-russia/
Oh no! The UIHC replicates all its data bases! The freaking Russians are hacking your healthcare!
 
Jesus, man. That's something iowafbddjenfnd for life or OiT would post. I don't discount collusion, but that hurt my brain.

Except that the dude who apparently analyzed this seems to tweet/have ties with Th3J35st3r3301. And that guy seems to have some serious hacking skills.....perhaps this was one of the 'nuggets' that little band of Merry Men has been sorting out.....
 
Oh no! The UIHC replicates all its data bases! The freaking Russians are hacking your healthcare!

When they're doing it to a server at Trump Tower, which pings back to a Russian Bank, you can sound the alarm bells. Until then, it's probably normal....

Is this the story about the old and barely used marketing server getting a Russian bank ping?

Honestly guys, honestly.
 
Is this the story about the old and barely used marketing server getting a Russian bank ping?

Honestly guys, honestly.

Allegedly.
Waiting to see if the info gets any legs anywhere. Could be that it's precisely something US intel groups have been looking into, and thus not being heavily publicized or leaked. The hackers who are posting it seemingly have affiliations with The Jester, who actually has done some pretty wild s***, including hacking a Russian Ministry's website and posting his own stuff on it.

At this point, it's simply an interesting story; I cannot tell if the 'data' they are showing is legit or not. And even if so, it's not proof there was compliance or cooperation with the various servers involved, particularly if any malware got onto them.

If we see FBI/NSA running into those places to snag servers to evaluate them (e.g. for malicious code not intended to be on them), then it'd definitely give this story some legs....
 
Allegedly.
Waiting to see if the info gets any legs anywhere. Could be that it's precisely something US intel groups have been looking into, and thus not being heavily publicized or leaked. The hackers who are posting it seemingly have affiliations with The Jester, who actually has done some pretty wild s***, including hacking a Russian Ministry's website and posting his own stuff on it.

At this point, it's simply an interesting story; I cannot tell if the 'data' they are showing is legit or not. And even if so, it's not proof there was compliance or cooperation with the various servers involved, particularly if any malware got onto them.

If we see FBI/NSA running into those places to snag servers to evaluate them (e.g. for malicious code not intended to be on them), then it'd definitely give this story some legs....

I do recall reading a pretty extensive write-up on this that appeared to lead to malwareville. Which would make sense if it is a marketing email server that is distributing marketing material all over the world. Maybe I am misremembering but I thought this story was hot and then it was, "oh, well that really is nothing".
 
I do recall reading a pretty extensive write-up on this that appeared to lead to malwareville. Which would make sense if it is a marketing email server that is distributing marketing material all over the world. Maybe I am misremembering but I thought this story was hot and then it was, "oh, well that really is nothing".

As I recall, that was the original excuse; it was simply an outdated advertising 'ping' going to Trump Tower and to the health place in MI.

However, if there are more detailed 'timed' pings which match up with how databases might be syncing, that's a completely different deal. At the time of that story, I had not picked up on the Betsy Devos and her brother's connections with Blackwater and Russian banks, either. Those are yet more interesting puzzle pieces.
 
I do recall reading a pretty extensive write-up on this that appeared to lead to malwareville. Which would make sense if it is a marketing email server that is distributing marketing material all over the world. Maybe I am misremembering but I thought this story was hot and then it was, "oh, well that really is nothing".

Hmmm...the one graphic listed was posted on April 1.....

Is that a 'hint' here? Actual story written up is Apr 3, so if they were both 4/1, I'd be getting more suspicious on validity...
 
I do recall reading a pretty extensive write-up on this that appeared to lead to malwareville. Which would make sense if it is a marketing email server that is distributing marketing material all over the world. Maybe I am misremembering but I thought this story was hot and then it was, "oh, well that really is nothing".
No, that was the proffered excuse but it wasn't terribly believable. This new theory makes a lot more sense. Will be interesting to see if it leads anywhere.
 
Isn't this what hillary tweeted about and then somebody used as evidence that she was receiving leaked info from Obama?
 
Hmmm...the plot thickens...

New Analysis Supports Database Replication Theory Between Trump Tower and Alfa Bank

On April 3rd, Tea Pain released an article, “The Trump-Russia Data Machine” that got the internet buzzin’ about the possibility that the unexplained computer traffic between Trump Tower, Russia’s Alfa Bank and Spectrum Health had been deciphered. In just 3 days, over 80,000 viewers read how these 3 unrelated businesses were possibly sharing a growing database of targeted voter rolls through a process known as Database Replication.

Database Replication is a simple concept where 2 or more large databases in different locations stay in sync with one another by broadcasting hourly changes to each other. Building on the analysis of data scientists, Tea Pain was able to theorize that this common business practice is how the data was being stored and passed back and forth to Russian intelligence without raising undue suspicion.

But the article raised additional questions. The new hourly replication theory could be easily debunked if there were more than 24 connections made between Trump Tower and Alfa Bank in one day. Tea Pain contacted key sources on Twitter and soon got his hands on the leaked raw data. Tea loaded the IP transactions into SQL Server and proceeded to see if his theory would stand up against the raw data. What he found caused him to erupt into a cautious “end zone dance” of patriotic optimism.

The data was totaled by connections per day and reflected precisely what Tea Pain’s theory had predicted. Since data is only copied when changes were made, there would scarcely be a day where changes were being made every hour of the day. Tea Pain also discovered that there were few connections during the early days of the database, but those connections grew as the databases grew in size. These connections ceased entirely when the suspicious traffic was discovered and Trump IT pulled the process offline.


UPDATE: Trump Tower uses a Contact Management System from Cendyn that uses SQL Server. The tools needed to achieve this replication were already installed. Tea Pain has been in touch with one Ivy League college and a number of media outlets. This new explanation is causing data analysts to look in new places to reconstruct what appears to be massive data collusion between the Trump Campaign and Russian Intelligence.

https://teapainusa.wordpress.com/20...ion-theory-between-trump-tower-and-alfa-bank/

This blog was only recently set up; either complete hoax, or some of the online hacker-jockeys like Th3J35st3r have been busy little beavers....

If this ends up being 'proof' that these data servers were working as advertised here, it still may not fully prove 'collusion'; just as StuxNet infiltrated Iran's centrifuge control systems, it is still quite possible (perhaps less likely) that these systems were targeted and infiltrated by Russian Intel, taking advantage of gullible rich folks who thought they were getting sweet business deals with 'connected' Russian businessmen....
 
Trump is in deep with the Russian Banks. He's going to steal trillions from America. Look to the State department for the start.
 
Data Patterns Reveal Trump Tower/Spectrum Health Ran a “Stealth Data Machine” With Russia

Jared Kushner is currently taking a victory lap, crowin’ about his “Stealth Data Machine” that put Donald Trump over the top in the 2016 race. Let’s pry off the lid and peer into the inner-workings of this “Data Machine.”

The Signal in the Noise

Building on the work of @LouiseMensch and data analysis by @Conspirator0 on Twitter, Tea Pain has stumbled onto a possible “signal in the noise” that opens a window into the data-swappin’ shenanigans going on between Trump Tower, Spectrum Health and Russia’s Alfa Bank during the election.

Spectrum Health, owned by Michigan’s powerful Devos family, attempted to explain the IP activity as “Voice over IP traffic”, whereas Alfa Bank offered an even more exotic explanation that “hackers attempted to make it look like we contacted Trump Tower.”

The data traffic, when analyzed, tells a very different story, a story of automated, orchestrated data sharing among multiple sites for a strategic end.

Tea Pain originally dismissed this story as a possible red-herring. With the Russia craze at a fever pitch, this activity could be explained by what Tea’s daddy used to say, “When you got a new hammer, everything looks like a nail.” But when Tea Pain saw the data patterns analyzed by Conspiritor0, he knew he’d spotted something mighty familiar: Database Replication. Put a pin in that, more on that later.

At first, data analysts were puzzled by what appeared to be random activity with no apparent pattern. Perhaps it was email activity? Maybe money transfers? But there were literally thousands of these IP “pings.”

Once the activity was charted, a pattern emerged. For example, a connection is made from Alfa Bank to Trump Tower, which may last anywhere from 1 minute to 15 minutes or more, followed by a longer “sleep” period. When averaged over months, these events charted an average time between connections to be 3660 seconds, or 1 hour and 1 minute. Whatever was running, it would hook up, transfer data for a few minutes, then go to sleep for an hour.

This was the clue that led Tea Pain to formulate a much clearer working model to explain what we were all seeing: SQL Server Database Replication between multiple sites.

What Is Database Replication?

Database Replication is a rather simple concept. When you have a database with millions of records representing hundreds of gigabytes of data, and you would like to keep a copy of that database housed in 2 or more locations, it makes no sense to continually copy the entire database from point A to point B every time a change is made, so you “replicate” it.

This allows only the changes made to be sent from one database to another. This is accomplished by a process that runs on timely intervals, usually an hour, that wakes up and checks the changes made since the last hour and broadcasts those changes to the other database. The other database, in turn, check for its changes and broadcasts them in the other direction. Voila! Both databases are identical!

So what does the data traffic patterns suggest? Check out the chart below. Behold, Kushner’s “Stealth Data Machine.”

russia-data-traffic.png


The white box illustrates the scope of data we can now observe. The bulk of the replication took place between Trump Tower and Alfa Bank, while smaller amounts of data were transferred between Trump Tower and Spectrum Health. If, for example, Trump Tower talked to Alfa Bank for 10 minutes, the next Spectrum-Trump Tower connection might last only one minute, indicating data replicated from Trump Tower to the Devos health care empire was being filtered, perhaps by “WHERE StateCode=’MI'” for example. But when changes were made at Spectrum, things looked very different.


ip-packetts.png


Conspiritor0 noted that when Spectrum connected to Trump Tower, Trump Tower’s next connect time was significantly longer, indicating Spectrum had modified a large chunk of records that had to be synced to Trump Tower, then pushed on to Alfa Bank. This detail was important in identifying that replication was in use. In this scenario, Trump Tower was functioning as a center-point, a data distribution center if you will.

We don’t know what was in these data packets; that info is beyond our purview at this time, but ask yourself a simple question and you find your answer: “What do Trump Tower, the Devos Family and the Russians all have in common? A desire for Donald Trump to be President of the United States.

Tea Pain’s working theory is that Russia created a voter targeting database with information gleaned from hacked DNC data rolls and other data rolls “acquired” from other states to feed this growing contact database. That database originated at Russian Intelligence which was in turn replicated to Russia’s Alfa Bank. This is where the “data laundering” takes place, Alfa Bank is the pivot point where the FSB’s data fingerprints are wiped clean. Ironically Russia launders its data at the same place it launders its money.

At Trump Tower, more data could merged into this system using various legal sources as well. Spectrum Health could also add value to the data by matching names and addresses in their extensive healthcare databases to harvest email addresses and phone numbers to flesh out this list. All these changes would be promptly replicated back to Russia in a matter of hours.

Once back in the hands of Russian Intelligence, this massaged data could be programmatically matched up with social media handles to create a micro-targeted “hit list” for the thousand Russian trolls employed by Putin.


The Payoff

How is this a breakthrough? Now that we have identified the likely means of how this data was transferred, data analysts now have more precise points to search for to arrive at a complete reveal of the massive data collusion between Team Trump and America’s foremost adversary.

The “beauty” of this system is its simplicity. Here’s some bullet-points to sum up.




    • No special software needed. SQL Server is used in most every major enterprise. Replication is a built-in tool. No mysterious hidden processes, viruses, malware, etc.
    • Virtually undetectable. No one would blink an eye at data replication, a standard business practice.
    • Could all be set up remotely with only VPN credentials and remote desktop access, information that is often shared via routine third-party data audits. No one inside Trump Tower or Spectrum’s IT department need be involved. One Russian Intelligence data operative could set this up in less than an hour at each location. No low-level “conspirators” needed.
    • Value could be added to the data anywhere in the chain and it would promote back to Russian Intelligence within 2-3 hours.
    • All data-transmission would be out in the open, mixed in with the daily flow of business.
    • Even if found, the data would look benign, just names, addresses, phone numbers, email addresses, social media handles, etc. No financial information. It would look just like a contact lead database purchased from any data-mining merchant.
    • Trump/Spectrum operatives and employees in the United States could interact with this list and have no clue the origins of the data were nefarious. This plain-sight approach was the key to its success.

Wow....no clue how 'legit' this information is, but the indication (and revelation) that the Trump Tower server may have been a link-point between a Russian bank and a Devos system - that's astounding!!

Was this 'intentionally' set up by Trump people?

OR, could it have been covertly set up by Russian intel/spies who were "businessmen" working with Trump people and Devos people and simply 'wormed' in code via Flash drives or something and did this w/o the knowledge/complicity of any of them?

It would certainly imply much larger Russian involvement than simply 'leaking some emails' via WikiLeaks....that's for sure...

Holy cheesenuts!!!

https://teapainusa.wordpress.com/20...ealth-ran-a-stealth-data-machine-with-russia/
Question for ya Joe since you THINK you understand networking.....

1. This proves Trump was under surveillance, correct?

2. Why transfer data over circuits when you can copy data physically and transfer it via hand to hand? You can't trace the circuit flow in that case?


Spin away.
 
Question for ya Joe since you THINK you understand networking.....

1. This proves Trump was under surveillance, correct?
No
2. Why transfer data over circuits when you can copy data physically and transfer it via hand to hand? You can't trace the circuit flow in that case?
Spin away.
Next time you set up a database network you want to 'sync' with overseas servers and intend to 'hand deliver' updates, let me know.

Jeebus, you're dumb.
 
  • Like
Reactions: Tunadog
I'm just spreading the word on Trump's ties to corrupt Russian banks. Do you deny them?

I have no idea. It could be possible. You've decided it is fact apparently. Interesting position to take since you have no facts and repeatedly bash those of us with religious faith.
 
No

Next time you set up a database network you want to 'sync' with overseas servers and intend to 'hand deliver' updates, let me know.

Jeebus, you're dumb.
So you believe they would do that while also in the knowing that the data packets could be itercepted?

That's a Network Security no no, 101.

Try again.
 
I have no idea. It could be possible. You've decided it is fact apparently. Interesting position to take since you have no facts and repeatedly bash those of us with religious faith.
I said I was spreading the word. All it takes is faith right? You must agree with that. My religion is Trump is a crook. I think I have just a little more evidence for mine than you do for yours however.
 
So you believe they would do that while also in the knowing that the data packets could be itercepted?

That a Network Security no no, 101.

Try again.

Who is talking about "intercepting packets"? Sounds like YOU don't understand how the internet works....
 
Oh and also, who were they watching over then?

Who was WHO watching over?
We are talking about packet PINGS going out over the internet. That is information constantly tracked and recorded by ISPs and companies that specialize in malware/antivirus work. Anyone working FOR any of those entities and/or hacking into that info has access to it, including MANY university groups which track internet functioning.

Jesus.H.Tit!!! You're claiming "I" don't know what I'm talking about here? This is "Internet Function:101" right here....
 
I said I was spreading the word. All it takes is faith right? You must agree with that. My religion is Trump is a crook. I think I have just a little more evidence for mine than you do for yours however.

Mine could be total BS, you're correct.
 
  • Like
Reactions: naturalmwa
So 'intercepting packets' isn't a known hacking technique?

Does your post not note data transfer discrepancy?

Why are you Gish Galloping into something unrelated? They are referring to WHEN these IP addresses communicated with each other. Apparently, it wasn't the 'random' spamming that it was purported to be, when some folks dug up the ISP and server data and started plotting it out....
 
So 'intercepting packets' isn't a known hacking technique?

Does your post not note data transfer discrepancy?

transfer discrepancy? No. It's identifying connection times/frequencies AND lengths of time they were connected. That's all stuff that can be readily accessed by ISPs and other entities, w/o any "NSA spy gear". You clearly have no clue what you are talking about.
 
Who was WHO watching over?
We are talking about packet PINGS going out over the internet. That is information constantly tracked and recorded by ISPs and companies that specialize in malware/antivirus work. Anyone working FOR any of those entities and/or hacking into that info has access to it, including MANY university groups which track internet functioning.

Jesus.H.Tit!!! You're claiming "I" don't know what I'm talking about here? This is "Internet Function:101" right here....
No, it's not internet function 101. Ping is what we call ICMP protocol. I assume you know none of this, because of obvious reasoning.
It is nothing more than circuit confirmation.
Send packets to IP address A from IP address B to prove connection integrity.

You know this right?
 
No, it's not internet function 101. Ping is what we call ICMP protocol. I assume you know none of this, because of obvious reasoning.
It is nothing more than circuit confirmation.
Send packets to IP address A from IP address B to prove connection integrity.

You know this right?

You're the one referring to 'hacking into packets'. None of that is pertinent here, chub.
 
transfer discrepancy? No. It's identifying connection times/frequencies AND lengths of time they were connected. That's all stuff that can be readily accessed by ISPs and other entities, w/o any "NSA spy gear". You clearly have no clue what you are talking about.
Using what logging programs and devices? How do you monitor 'frequencies' exactly?

What frequency is capable of doing what you claim by the way?
 
No, it's not internet function 101. Ping is what we call ICMP protocol. I assume you know none of this, because of obvious reasoning.
It is nothing more than circuit confirmation.
Send packets to IP address A from IP address B to prove connection integrity.

You know this right?

That's basically the info they tracked. WHEN the connections were made and HOW LONG they lasted.
And the timing indicates there was a daisy chain consistent with database syncing between the Russian bank, Trump Tower and Davos Spectrum Health. That's an extraordinary "coincidence" for something that was supposed to simply be 'marketing advertising spam'....
 
Do I detect an admission in its absence that you think my new faith is likely based on truth?

I don't know. There is no shortage of lefty media types trying to find ANYTHING. So I'm maybe surprised there's nothing yet? But that doesn't mean it won't be found someday.

You see, my position is known as tolerant.
 
That's basically the info they tracked. WHEN the connections were made and HOW LONG they lasted.
And the timing indicates there was a daisy chain consistent with database syncing between the Russian bank, Trump Tower and Davos Spectrum Health. That's an extraordinary "coincidence" for something that was supposed to simply be 'marketing advertising spam'....
Yes, but what protocols were involved? The protocol information immediately tells you what sort of data was being shared.
Syncing can simply mean that emails were being exchanged, SMTP or POP3 for the uneducated.
 
ADVERTISEMENT
ADVERTISEMENT