Posted on 12/13/2018 2:44:45 AM PST by MNDude
Read the document (only a page long) and come to your own conclusions.
Why couldn’t they make a new warrant to check the context of the emails?
Might hurt Hillary’s election outcome I guess.
ping
Is there news here? I think we already knew this. Ill say this, the dude did not know how to organize his mailbox.
Come really covered for them. Lock HIM up!
Wasn’t this a case where the NY cops held the laptop and had uncovered all of these extra emails....unrelated to Wiener himself?
NYPD made a copy of the entire hard drive.
Someone can correct me....but I think they still hold that one copy, and I’ll bet at least a dozen other additional copies have been made as ‘insurance’ by various NY cops.
If in the course of exercising a lawful search warrant, evidence of other crimes arise, the agent is allowed to examine that evidence.
How do you think Cohen was nailed for Taxi medallion fraud when Mueller was investigating Russian Collusion? Evidence of the fraud was taken during the exercise of a search warrant.
No, this email was from a low-level agent interested in protecting his FBI career, and pulled a Sgt. Schultz on the laptop contents.
“NYPD made a copy of the entire hard drive.”
I’ve always heard that’s the very first thing cops do when a computer is taken into evidence. Copy the hard drive, then research and work from the copy. So they gave the laptop to the crooks in Deep State. Who has the copy? Rudy, maybe? I understand the NYPD still has great loyalty to Rudy.
They eventually got one a month later and pretended to review them all, but only did a few thousand.
Getting a new warrant should have taken a day at best, but it took a month, hmm
The story I heard was they made a hard drive copy, and handed the laptop over to FBI.
Comey’s FBI.
Good thing they made a copy.
I don’t do forensics, but this makes sense to me, as a possible procedure. You don’t want to do anything to tamper with the original hard drive, and you definitely don’t want to boot the OS and run software, because just operating it can change the data structure and what remains. So you explore the data on a mirrored hard drive, and keep the original, because there are ways to inspect the original for data that has been overwritten, physically (can’t be done on a mirror).
But you are assuming that they did this.
Would you really be surprised if they didn’t nudge and wink at each other every step along the way. IE, and thing that can accidentally sabotage evidence potentially harmful to the former NY Senator...
“...the dude did not know how to organize his mailbox.”
My libtard socialist sister in-law thinks that turning off the computer screen shuts down the computer. Maybe it’s an Apple thing...
The only thing in that memo that I hadn’t heard was that Hillary apparently used “multiple” emails. So how many different servers and email accounts/addresses did she have?
Not that we’ll ever know, mind you.
I’m going to sound like a technological illiterate here, but I’m going to do it anyway. I went to the FBI citizen’s academy several years ago. There can be a problem with proving chain of custody on electronic devices. If I remember correctly, they make a copy of the data and basically serialize it. If any changes are made to the data it will reflect in the serialization. That’s how they prove to the court that the data has not been manipulated to create evidence. There was about an hour class on this but it started above my head and got deeper. Maybe someone more knowledgeable can describe the process better. An interesting point they made was when they conduct a search these days they have to look at everything because flash drives can be disguised about a million different ways these days.
Half the people I fix stuff for believe that too.
The serialization process you mention is known as taking a cryptographic hash or “hashing”. It is a one way (not reversible) encryption/mathematical function that takes a large input and generates a fixed length output. If so much as 1 bit changes in that input, then the output will change significantly.
A more detailed explanation can be found here:
https://simple.wikipedia.org/wiki/Cryptographic_hash_function
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.