Posted on 09/17/2016 7:22:15 AM PDT by doug from upland
Hackers may have gained access to Hillary Clintons and Sidney Blumenthals unsecured files by initially hacking Marcel Lazar Lehel, aka Guccifer, sources told PJ Media.
At least one or more American whistleblowers told House and Senate Intelligence Committees the unsecured files stolen by the unidentified hackers can be found at specific locations in the Deep Web and are known as the Russian files.
According to a PJ Media source, attaining the files did not require hacking Russians or any other computer, but instead locating the images of the files that remain when the hackers move the files around the Deep Web.
When Clinton associates thought they were deleting her files, they may not have realized that files leave images even in the Deep Web when moved by hackers, PJ Media noted.
An initial review of the files show they include unclassified and classified information and one document relating to Benghazi, Libya. Congress knows the FBI was aware of a breach by foreign actors from Clintons server before agency director James Comey announced he would not recommend prosecuting Clinton for mishandling classified information on her private email server.
*
Yeah - well if that happened and the hackers got that all bets are off and it very well could be out the in the Dark Web, Dark Net, Deep Web whatever the kids call it these days., The rough/bad/wildwest part of cyberville.
More than likely they tapped into these IT guys backup cycle and were getting weekly updates done for them.
People who attack IT have a great understanding of how IT is used as intended. Having a semi clueless System Admin can be like having some one do most of your work for you if you are trying to copy files and change permissions.
Wouldn't surprise me if the had some mail filter or cron job installed. Doesn't always need to be complicated especially with clueless system admins, which is what it appears HRC had.
Blumenthal was ambidextrous---chronically emailing Hillary Libya foreign policy messages w/ one hand....his other hand firmly in the State Dept cookie jar.
In one confidential e-mail to Clinton, Blumenthal was clearly colluding w/ onetime Amb Joe Wilson (Valerie Plame's hubby) to help himself to the tax dollars in the State Dept cookie jar.
GAME ON Amb Wilson pumped himself up as a 'director' of Symbion Power---an outfit seeking millions of dollars in contracts from an obscure government agency chaired by Hillary....the Millennium Challenge Corp. (MCC)
In September 2010, Hillary's MCC awarded Symbion $47 million tax dollars for (cough) 'power projects in Tanzania.'
EVER WONDER how much of the $47 million tax dollars got to Tanzania....after the players divvied it up among Blumenthal, Wilson, the Clintons, Obama?
NOTE: Millenium is also the govt agency Boobamba extracted 100 million dollars to give to Michelle as a gift to Morocco to teach Muslim girls. ===========================================
FREEPER ACTION PROJECT--DO THIS NOW: demand the Millennium Challenge Corporation (MCC) books be opened. We demand to know the financial details and the scope and dimension of individuals connected to these outrageous State Dept giveaways.........govt parasites profiting at taxayers' expense.
CONTACT CONGRESS HERE---http://www.contactingthecongress.org/
Yes, you are right.
Whether possible or not let her think it’s possible.
Indeed yes
Oh please.....this little twerp makes me sick
He is mentally ill
David Brock I believe.
When Clinton associates thought they were deleting her files, they may not have realized that files leave images even in the Deep Web when moved by hackers, PJ Media noted.”
“This sounds like gibberish”
total gibberish. However, in plain language, it’s likely that copies of her emails still exist somewhere on one or more hacker’s hard drive. these copies could have been hacked along the way from a number of places, including directly from one of Hillary’s many servers or from one of the backup copies from some company like Platt River Networking before they deleted their backups.
Here's an older photo of him with Barney Frank and some other guy. Brock is the creepy one on the right.
“Darn...and, I was just getting ready to compliment him on his hair.”
Dude, you’re skating on thin ice there ...
Yes, of course, in principle. The question is how secure Guccifer's collection is (which might not have been intended to be all that secure), as well as "wiretap" or "man in the middle" access to the network traffic that handled the transportation of the information to and from his equipment.
ISPs can collect EVERYTHING that passes through, trivially.
FWIW, this so-called "dark web" is nothing more than systems that aren't cataloged by domain-name. The systems are all hooked up to the same network. Your computer is part of this "dark web," and you could admit access to parts of it on your volition. People who VPN (virtual provate netowrk) are a common part of the "dark web."
The “new” Church Lady!
There are at least two parties to any e-mail message, the one who sent it and the one who received it. Its an odds on bet that both ends of these messages were not totally erased. If we get a legitimate justice department a whole administration is going down.
LOL!
In the common parlance, "hacking into a server" means basically logging on to that system and accessing the contents, or otherwise manipulating that system. Sometimes, but not always, a "hacker" will leave evidence behind in the form of access logs or other changes. A skilled hacker erases his tracks. All the FBI said was that it found no evidence that an unauthorized (and non-local to the machine) person gained access to Clinton's private server.
However, that form of "hacking" is not the only way to get the information. The senders and recipients of transmission are other places the information is available; and the information is transmitted and can be copied by anybody who handles the transmission, or who has access to the transmission. NSA vacuums 100% of the transmissions that cross national boundary, and likely 100% of transmission that is domestic.
I think the writer is referring to the existence of multiple copies. when you compose and e-mail, there is only one. When you send it, there is probably a dozen copies, at least temporarily, and certainly two copies, one on your machine and one on the receiver’s. You can erase yours - melt the hard drive in a smelting furnace - but the other images are still “out there.”
Please release me, let me go,
For I don’t love you anymore.
To live a lie would be a sin.
Release me and let me love again.
He’s a homosexual. Before he came out, he was o the right.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.