Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Clinton's SMTP Packets Sent Through Routers Easily Examined By Bots
Alas Babylon! is a Micorsoft Certified Trainer in Exchange, among other server products ^ | 12 August 2015 | Alas Babylon!

Posted on 08/12/2015 5:03:45 AM PDT by Alas Babylon!

Hillary sent classified messages through the world wide Internet.

The real issue is how many classified documents were sent as SMTP, and which routers on the Internet did each packet go through to reach its destination?

Well, we cannot say, so we HAVE to assume any/all of them.

And THAT, MY FRiends includes routers in Moscow, Beijing, Pyongyang (ha, if they have any—at least for Intel purposes I’m sure), Tehran, Havana, Mosul, etc., etc.

Agencies/Identities can run bots on routers to pull all kinds of packets their way to further store and read them... They can run software against the raw packet data to further examine interesting information that could basically gather ANYTHING.

We have to assume that even a single classified Email sent out and routed through the Internet is compromised


TOPICS: Your Opinion/Questions
KEYWORDS: classified; classifiedemails; hillary; hillaryemails; screwed; spy; topsecretemails
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-87 next last
This is serious. I normally do not create and post vanities, but no other news source is making this point.
1 posted on 08/12/2015 5:03:45 AM PDT by Alas Babylon!
[ Post Reply | Private Reply | View Replies]

To: Alas Babylon!

She is in deep Kim Chee


2 posted on 08/12/2015 5:10:36 AM PDT by Crystal Palace East ("We Must All Hang Together, or Assuredly We Will All Hang Separately" B. Franklin)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alas Babylon!

Is there any information on whether the packet info was encrypted or sent plain text?


3 posted on 08/12/2015 5:12:16 AM PDT by JackOfVA
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alas Babylon!

Assuming you saw this although still not making your point:

Colorado Company Visited as Part of FBI Investigation into Hillary Clinton emails

http://www.freerepublic.com/focus/f-news/3323709/posts

The company’s website lists awards including for being among the best Colorado businesses and places to work. But Metro State University Assistant Professor of Computer Information Systems Dr. Edgar Maldonado says there are questions about what security protocols were in place.

“I would say it’s not the best choice,” Maldonado said.

***************************************
Personally, I think the noose is tightening, but I also think she’ll get a pardon from Obama for any/all issues IF she & Bill keep their mouths shut, no blackmail of Obama/Mooch, no ‘tell all’ books on Obama/his administration & she steps down so the Dems can run someone else ... just my little mental meanderings on the matter.


4 posted on 08/12/2015 5:18:24 AM PDT by Qiviut (Stand up for Jesus, ye soldiers of the cross; lift high his royal banner, it must not suffer loss)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Crystal Palace East

No, I doubt it. She’s part of the protected class.


5 posted on 08/12/2015 5:23:39 AM PDT by xzins (Don't let others pay your share; reject Freep-a-Fare! Donate-https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Alas Babylon!
Basically, any traffic from say your computer goes to your ISPs local system (eg. at the head end of your cable or DSL). From there that traffic could be routed almost anywhere. Depends on the destination IP address and the whim of the dynamic routing protocols and perceived traffic levels.

Now, there is little chance that if you're routing traffic from say Chicago to St. Louis that it would make the hop across the Atlantic and back. But there is no guarantee that it wouldn't if there were transient problems with a more direct route or the routing tables had been polluted/taken over. One or more hops around the US on that journey would be entirely likely though. For fun, and for those of you not afraid of the command line, try the "traceroute" command sometime. I just did, 14 hops between my system and www.google.com. 30 to www.yahoo.com. Only 10 to www.breitbart.com - all on comcast. Hmm, they're using comcast as an ISP too?

Anyway, the takeaway is: once your traffic (packets) - which includes HTTP requests, email transfers, etc. - leaves your computer there is no telling how they get to their destination. Anyone can see them. Anyone. That's why "secure" web traffic encrypts data. That's why FOUO email is encrypted. That's why classified, even with encryption, is only supposed to be sent via trusted dedicated networks, networks that are explicitly connected and monitored to ensure we actually do know where it goes and how it gets there. Clinton's use of a public server, even if she bothered to use encryption (which so far I haven't seen any information that she did) means all that data is basically leaked. There is no reason to believe any of it remains unread by outside intel services. No reason to believe any of it is still secure.

6 posted on 08/12/2015 5:23:51 AM PDT by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alas Babylon!
We have to assume that even a single classified Email sent out and routed through the Internet is compromised

Any business that handles HIPAA or PCI information is supposed insure that information is encrypted if it's sent via email across the public internet because it can be intercepted and read.

If Hillary's supporters think she's the smartest woman in the world, what's that saying about what they think of the rest of them?

7 posted on 08/12/2015 5:23:53 AM PDT by tacticalogic
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alas Babylon!

Unless it’s encrypted, and that is a pain in the neck to set up properly and use properly. No way Hillary was doing that. What an idiot.


8 posted on 08/12/2015 5:26:51 AM PDT by glorgau
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alas Babylon!

She will put the blame on those who set up her servers (Instructions given to her that caused confusion), the Secret Service, and the white male patriarchy “attacking” her because she allegedly has a vagina.


9 posted on 08/12/2015 5:27:52 AM PDT by rollo tomasi (Working hard to pay for deadbeats and corrupt politicians.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tacticalogic

Hillary doesn’t even know what “encryption” means, much less actually doing it.

This stuff was sent out through a wide open door.


10 posted on 08/12/2015 5:28:29 AM PDT by Col Frank Slade
[ Post Reply | Private Reply | To 7 | View Replies]

To: ThunderSleeps
Exactly! This is what I tell my students:

Any email sent to another person who is not on the same Local Area Network is sent via SMTP (Simple Mail Transport Protocol) packets through the Internet, and the routers on the Internet send these to the quickest path they have in their routing tables.

Imagine if I have a brick building in Atlanta I want to tear down and set up in Chicago. I take each brick, assign it a sequence number, so the entire building can be put back together correctly, to a million motorcycle riders with back backs to hold a brick or three...

Now I tell the Motorcyclists to get to a certain address in Chicago, but I do not tell them how to get Chicago, that is, what route to take... So they can take a myriad of different routes. They could leave their bikes behind and take a plane, bus, train, walk--whatever. At every transfer point, their bags are examined. Because SMTP is a store and forward protocol, any examiner can keep a copy of the bricks!

So in this analogy, the motorcycle riders are like the packets, and the transfer examiners are like the routers.

Routers can contain, even unknown to them, or on purpose, software that examines the packets and collects any of them (there are millions and millions each day, potentially) that are interesting based on keywords, IP Address from or to, email address names from or to, and other things.

Would a foreign intelligence agency be willing to sift through such packets on their own router they've conveniently placed somewhere "between Atlanta and Chicago"? Especially since the software is easy to use and very good at what it does?

So, can we assume any email is REALLY safe? No. Classified stuff should never go out on the Internet unless each packet is encrypted with a very strong encryption algorithm.

11 posted on 08/12/2015 5:30:00 AM PDT by Alas Babylon! (As we say in the Air Force, "You know you're over the target when you start getting flak!")
[ Post Reply | Private Reply | To 6 | View Replies]

To: ThunderSleeps
Now, there is little chance that if you're routing traffic from say Chicago to St. Louis that it would make the hop across the Atlantic and back.

If the recipient of those emails was in a foreign country at the time then all bets are off.

12 posted on 08/12/2015 5:30:14 AM PDT by unixfox (Abolish Slavery, Repeal the 16th Amendment)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ThunderSleeps

Clinton’s use of a public server, even if she bothered to use encryption (which so far I haven’t seen any information that she did) means all that data is basically leaked.

*********************************************************

Saw this in an “early” story (March) which may clarify the ‘encryption’ or lack thereof ....

In late March 2009, a “Networks Solutions’ digital certificate and encryption for web-based applications” were installed for the first time on the server, according to Venafi’s research. Then days before the first certificate was set to expire in September 2013, the server got a new certificate from GoDaddy that is valid until 2018. While a step in the right direction, these digital certificates are hardly a reason to celebrate. The encryption didn’t mean that the emails themselves were encrypted—just access to the server.

Link (entire article with more good info): http://www.forbes.com/sites/katevinton/2015/03/11/researchers-say-clintons-email-server-had-no-encryption-for-her-first-three-months-in-office/


13 posted on 08/12/2015 5:30:52 AM PDT by Qiviut (Stand up for Jesus, ye soldiers of the cross; lift high his royal banner, it must not suffer loss)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Alas Babylon!

This woman is totally incompetent. The title of her position demands that all her communications are at least “classified”.


14 posted on 08/12/2015 5:31:28 AM PDT by Chgogal (Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Crystal Palace East
She is in deep Kim Chee

Very deep.

While one might reasonably assume that Obama has finally let the FBI dogs loose on this case I'm starting to think that he really had no other choice.

Sending TS/TK/SI/NF in the clear over the internet by a Secretary of State currently running for the Presidency is TREASONOUS. What else can you call it?

Covering it up, if that were really possible, would be the same. There is really no way that Obama could bottle this up even if he wanted to.

I'm betting the Obama Manchurian Candidate will soon be arriving on the scene. Or perhaps he is already running and drawing big crowds.

15 posted on 08/12/2015 5:33:41 AM PDT by InterceptPoint
[ Post Reply | Private Reply | To 2 | View Replies]

To: Crystal Palace East

Up to her eyes and sinking fast, her Kim Chee keeps getting deeper and deeper!!!

BTW, Welcome aboard FR “Captain”...


16 posted on 08/12/2015 5:35:36 AM PDT by ThomasPaine2000 (Peace without freedom is tyranny.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: glorgau
Yup, sending/receiving encrypted data is a pain, meaning time consuming. Both parties have to know what they are doing.
17 posted on 08/12/2015 5:36:20 AM PDT by Chgogal (Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Alas Babylon!

Where I work we have had special training to tell us “EMAILS ARE FOREVER”. Mostly for legal compliance. I can’t believe there was no backup system for her server. Especially if some outside entity was managing the server for her.


18 posted on 08/12/2015 5:36:23 AM PDT by McGruff (Trump/Cruz 2016 - My Dream Team)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ThunderSleeps
Clinton's use of a public server, even if she bothered to use encryption (which so far I haven't seen any information that she did) means all that data is basically leaked.

She had no security certificates for the first 3 months, thus there was NO encryption. Therfore, when she typed in her login and password, they were sent in the clear. All you need is a traffic sniffer on the network and you can be guaranteed that foreign governments have those running when she visits them. By they way, in the first 3 months she visited Japan, Indonesia, South Korea, China, Egypt, Israel, the Palestinian Authority, Belgium, Switzerland, Turkey and Mexico.

So for 3 months this opened the server to snooping, hacking, and spoofing. Without a certificate, there could easily have been a ‘man in the middle attack’ where they could easily intercept communications because they’re not being encrypted and impersonate her, changing emails sent from her to someone else, add attachments ( hidden keyloggers, spyware), and from there probe into the systems of every agency to which the emails were sent – including the White House.

Here are a few articles :

How Unsafe Was Hillary Clinton's Secret Staff Email System?

Hillary’s private email server was insecure during first 3 mths as secretary of state

Intel Experts: Hillary Clinton’s Email Server ‘A Counterintelligence Disaster of Truly Epic Proportions

19 posted on 08/12/2015 5:37:33 AM PDT by TheCipher (Suppose you were an idiot and suppose you were a member of Congress. But I repeat myself. Mark Twain)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ThunderSleeps
Anyway, the takeaway is: once your traffic (packets) - which includes HTTP requests, email transfers, etc. - leaves your computer there is no telling how they get to their destination. Anyone can see them. Anyone. That's why "secure" web traffic encrypts data.

You can't really compare HTTP traffic to SMTP. HTTP is typically "point to point" - it's routed directly from the client to the server without being "at rest" anywhere in between. HTTPS is used to secure that traffic. This is a "transport layer" encryption - the data stream is encrypted on one end, and decrypted by the receiving system. Email (SMTP) traffic may pass through multiple mail servers on it's way to it's final recipient. SMTP can also use transport layer encryption to secure the data between servers, but it will be sitting unencrypted on any mail server in the chain between the sender and recipient's mail servers and is available to anyone who has access to those servers.

20 posted on 08/12/2015 5:38:01 AM PDT by tacticalogic
[ Post Reply | Private Reply | To 6 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-87 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson