Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Talisker

If countries that gave large donations to Hillary’s ‘foundation’ got Hillary’s private email address would that assist them stealing State secrets or is it a wash... do you know?


124 posted on 04/07/2015 3:43:42 PM PDT by GOPJ (DHS has the same budget as the USMC and has TWICE their headcount - - freeper gaijin)
[ Post Reply | Private Reply | To 98 | View Replies ]


To: GOPJ
If countries that gave large donations to Hillary’s ‘foundation’ got Hillary’s private email address would that assist them stealing State secrets or is it a wash... do you know?

The biggy is linking a basically unsecured (to the pros) commercial email server - or more than one, since Sid Vicious was actualy using his freaking AOL account, and Hillary was using unsecured Apple devices and who the hell knows what else her little flying monkeys were using - to the secured State Department servers.

That's the opening into the secured system. By analyzing the meta-data in those emails, enormous amounts of information can be learned about the secured system - and I'm not even talking about the plaintext information in the emails themselves.

In turn, the State Department is hooked up to every other part of the government. Imagine opening an ice cream store that shares an unsecured back wall with a 100 story secured bank building. And then selling access - not to the bank - but to the ice cream store. That's what Hillary did. Only the ice cream store is her email server system, and the bank building is the ENTIRE federal government, starting with the State Department.

So it's not only the Russians who leaped on this opportunity with every computer expert its has - it's the entire freaking WORLD.

She was denied the presidency in 2008, so she got herself made Secretary of State in order to strike back against America. She left the Middle East literally in flames and opened our secure communications not only to the highest bidder, but to any bidder, and, ultimately, any hacker.

And she knew damn well what she was doing, because she had to break every law, protocol, procedure, process, policy and anything else in her way to do it - all while being questioned and protested to by government computer security experts behind the scenes for four whole years. So it's all very, very deliberate.

And now she wants the powers of the presidency, no doubt to finish what she started.

139 posted on 04/07/2015 4:03:17 PM PDT by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 124 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson