Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 11/12/2012 6:34:13 PM PST by TigerClaws
[ Post Reply | Private Reply | View Replies ]


To: TigerClaws

Anything put on the internet in any shape or form can be read by anyone with just a little knowledge. And is there FOREVER.

The irony - old fashion just talking or sending a letter through snail mail may be the most secure.


2 posted on 11/12/2012 6:40:17 PM PST by 2banana (My common ground with terrorists - they want to die for islam and we want to kill them)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

tactic of terrorists

spy film “Traitor.”

teen-agers

CIA Director David Petraeus


4 posted on 11/12/2012 6:46:39 PM PST by Berlin_Freeper (Unbelievable / Believable!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws
Oh!, what a tangled web we weave when first we practice to deceive.

It reminds me of a story that occurred in my neck of the woods not too long ago.

Charles Wang, the founder and former CEO of Computer Associates (now known as CA) never used e-mail. He was the mastermind behind a billion dollar fraud that made him a very wealthy man.

Meanwhile, his minions (including Sanjay Kumar) spilled their guts (via e-mail) and were destroyed by the Feds.

Lesson learned.

5 posted on 11/12/2012 6:47:04 PM PST by UnBubba
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

US Media to US Citizens: “LOOK! SQUIRREL!!!”


6 posted on 11/12/2012 6:52:27 PM PST by Caipirabob (Communists... Socialists... Democrats...Traitors... Who can tell the difference?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws
So they find her account and the General is sharing the account. Interesting that Broadwell didn't think about that part of the audit trail.
7 posted on 11/12/2012 6:53:50 PM PST by Rashputin (Jesus Christ doesn't evacuate His troops, He leads them to victory.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws
"Rather than transmitting emails to the other’s inbox, they composed at least some messages and instead of transmitting them, left them in a draft folder or in an electronic “dropbox,” the official said. Then the other person could log onto the same account and read the draft emails there. This avoids creating an email trail that is easier to trace"

Oh for crying out loud! Thanks General Petraeus.

Everything into and out of a communications pipe it tracked. This has been in place in the corporate world for at least 20 years based on my experience. I was a consultant in a civil case like this waaaay back...

12 posted on 11/12/2012 7:04:17 PM PST by uncommonsense (Conservatives believe what they see; Liberals see what they believe.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

google mail... monitored by the NSA ... every key you click

exactly how does the head of the CIA not understand this?

how can ANYONE become the head of our intelligence organization and have such horrid security practices??

doesn’t smell right

I’m leaning towards setup to keep him from testifying on Benghazi


13 posted on 11/12/2012 7:08:10 PM PST by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

Patraeus should have heeded the old dictum: Wrong no man — write no woman.


14 posted on 11/12/2012 7:08:10 PM PST by USFRIENDINVICTORIA
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

stars may get you women but women will get your stars/ edited from

your badge may get you $%##^ but ^&*%^ will get your badge...advice given to new LEO’s everywhere


19 posted on 11/12/2012 7:20:33 PM PST by rolling_stone
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

I have to give credit that they at least didn’t use MyFace.


21 posted on 11/12/2012 7:24:04 PM PST by Rebelbase (The most transparent administration ever is clear as mud.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

Unencrypted on Google’s server, and he was our chief spook??

Okay, plain text in a drop box accessed only through a Tor router might count as a sort of steganography, since no one not privy to its existence and (virtual) location would even think to look for it, but unencrypted on Google’s servers in an account identifiably belonging to one of the principals???

(It’s not like folks having an affair have problems with implementing a key agreement protocol.)


22 posted on 11/12/2012 7:27:39 PM PST by The_Reader_David (And when they behead your own people in the wars which are to come, then you will know...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

Pretty clever.


25 posted on 11/12/2012 7:59:52 PM PST by KoRn (Department of Homeland Security, Certified - "Right Wing Extremist")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

Trying to be anonymous on the Internet is a losers game.

Best you can possibly do is encrypt content with PGP which will raise all sorts of red flags and the sender’s and recipient’s IPs, which can then be used to find names, are still out there.

Best way to communicate would be talking/texting between two throwaway cellphones.


26 posted on 11/12/2012 8:02:45 PM PST by expat1000
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

We should not be looking at the man’s personal email. We live in a total surveillance society.


30 posted on 11/12/2012 9:27:01 PM PST by TBP (Obama lies, Granny dies.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws

If only he was the only man in Washington to have an affair! Every president did the same thing - even carter with the lust thing. JFK nailed everyone, Ike had his military driver.....etc.

The media makes a a mountain out of this when the real story is Benghazi.


38 posted on 11/13/2012 4:32:03 AM PST by New Jersey Realist (America: home of the free because of the brave)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerClaws; penelopesire; LucyT; hoosiermama; Protect the Bill of Rights; MestaMachine
Petraeus and Broadwell apparently used a trick, known to terrorists and teen-agers alike, to conceal their email traffic, one of the law enforcement officials said.

Rather than transmitting emails to the other’s inbox, they composed at least some messages and instead of transmitting them, left them in a draft folder or in an electronic “dropbox,” the official said. Then the other person could log onto the same account and read the draft emails there. This avoids creating an email trail that is easier to trace.

41 posted on 11/13/2012 5:02:46 AM PST by maggief
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson