Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: GOPJ
If countries that gave large donations to Hillary’s ‘foundation’ got Hillary’s private email address would that assist them stealing State secrets or is it a wash... do you know?

The biggy is linking a basically unsecured (to the pros) commercial email server - or more than one, since Sid Vicious was actualy using his freaking AOL account, and Hillary was using unsecured Apple devices and who the hell knows what else her little flying monkeys were using - to the secured State Department servers.

That's the opening into the secured system. By analyzing the meta-data in those emails, enormous amounts of information can be learned about the secured system - and I'm not even talking about the plaintext information in the emails themselves.

In turn, the State Department is hooked up to every other part of the government. Imagine opening an ice cream store that shares an unsecured back wall with a 100 story secured bank building. And then selling access - not to the bank - but to the ice cream store. That's what Hillary did. Only the ice cream store is her email server system, and the bank building is the ENTIRE federal government, starting with the State Department.

So it's not only the Russians who leaped on this opportunity with every computer expert its has - it's the entire freaking WORLD.

She was denied the presidency in 2008, so she got herself made Secretary of State in order to strike back against America. She left the Middle East literally in flames and opened our secure communications not only to the highest bidder, but to any bidder, and, ultimately, any hacker.

And she knew damn well what she was doing, because she had to break every law, protocol, procedure, process, policy and anything else in her way to do it - all while being questioned and protested to by government computer security experts behind the scenes for four whole years. So it's all very, very deliberate.

And now she wants the powers of the presidency, no doubt to finish what she started.

139 posted on 04/07/2015 4:03:17 PM PDT by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 124 | View Replies ]


To: Talisker
Thank you for your informed opinions. Right on the money.

I especially was struck by:

She was denied the presidency in 2008, so she got herself made Secretary of State in order to strike back against America. She left the Middle East literally in flames and opened our secure communications not only to the highest bidder, but to any bidder, and, ultimately, any hacker.

And she knew damn well what she was doing, because she had to break every law, protocol, procedure, process, policy and anything else in her way to do it - all while being questioned and protested to by government computer security experts behind the scenes for four whole years. So it's all very, very deliberate.

Doesn't this sound like some form of Real investigation is in order. By the FBI? Marshall's Service? The House? Senate? Special Select Committee? Somebody? I mean, for the Love of God, is she just going to get a pass on this and announce with a smile on April 14th? Say it ain't so people!

154 posted on 04/07/2015 4:23:37 PM PDT by Art in Idaho (Conservatism is the only Hope for Western Civilization.)
[ Post Reply | Private Reply | To 139 | View Replies ]

To: Talisker
Bears repeating:

"So it's not only the Russians who leaped on this opportunity with every computer expert it has - it's the entire freaking WORLD."

161 posted on 04/07/2015 4:41:14 PM PDT by Art in Idaho (Conservatism is the only Hope for Western Civilization.)
[ Post Reply | Private Reply | To 139 | View Replies ]

To: Talisker; LucyT

Talisker,

Well put!

LucyT

Ping!


202 posted on 04/07/2015 6:32:41 PM PDT by WildHighlander57 ((WildHighlander57, returning after lurking since 2000)
[ Post Reply | Private Reply | To 139 | View Replies ]

To: doug from upland

Great analysis from Talisker.


210 posted on 04/07/2015 6:50:55 PM PDT by Enterprise ("Those who can make you believe absurdities can make you commit atrocities." Voltaire)
[ Post Reply | Private Reply | To 139 | View Replies ]

To: Talisker

great comments


212 posted on 04/07/2015 6:57:57 PM PDT by doug from upland (Obama and the leftists - destroying our country one day at a time)
[ Post Reply | Private Reply | To 139 | View Replies ]

To: Talisker; LucyT

“And she knew damn well what she was doing, because she had to break every law, protocol, procedure, process, policy and anything else in her way to do it -”

SOP for Hillary/Obama/Holder/Jarrett


217 posted on 04/07/2015 7:07:35 PM PDT by stephenjohnbanker (My Batting Average( 1,000) (GOPe is that easy to read))
[ Post Reply | Private Reply | To 139 | View Replies ]

To: Talisker; WildHighlander57; Old Sarge; EnigmaticAnomaly; Califreak; kalee; TWhiteBear; freeangel; ..
”Image

.

The biggy is linking a basically unsecured (to the pros) commercial email server - or more than one, since Sid Vicious was actualy using his freaking AOL account, and Hillary was using unsecured Apple devices and who the hell knows what else her little flying monkeys were using - to the secured State Department servers.

That's the opening into the secured system. By analyzing the meta-data in those emails, enormous amounts of information can be learned about the secured system - and I'm not even talking about the plaintext information in the emails themselves.

In turn, the State Department is hooked up to every other part of the government. Imagine opening an ice cream store that shares an unsecured back wall with a 100 story secured bank building. And then selling access - not to the bank - but to the ice cream store. -- That's what Hillary did. -- Only the ice cream store is her email server system, and the bank building is the ENTIRE federal government, starting with the State Department.

So it's not only the Russians who leaped on this opportunity with every computer expert its has - it's the entire freaking WORLD.

She was denied the presidency in 2008, so she got herself made Secretary of State in order to strike back against America. -- She left the Middle East literally in flames and opened our secure communications -- not only to the highest bidder, but to any bidder, and, ultimately, -- any hacker. --

And she knew damn well what she was doing, - because she had to break every law, protocol, procedure, process, policy and anything else in her way to do it - all while being questioned and protested to by government computer security experts behind the scenes for four whole years. -- So it's all very, very deliberate. --

And now she wants the powers of the presidency, no doubt to finish what she started.

Back to the thread, check out # 139, # 137 , and more.

Thanks for the pings.

227 posted on 04/07/2015 7:42:03 PM PDT by LucyT
[ Post Reply | Private Reply | To 139 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson