Posted on 09/02/2016 5:36:42 PM PDT by NoLibZone
Let’s see she has a radical Muslim as her closest associate and she’s carrying around state secrets on her phones. Hmm....who could have taken them?
I went fishing, and the phone fell out of the boat.
oops, my bad
Presumably she lost them a couple of years ago. But you are correct there was no hacker. Assange who received the material said it came from an insider.
Gee...maybe Huma helped her lose them.
Assange received some DNC emails. The hackers took more than that. Assange suggested that Seth Rich was a potential source, but he didn’t confirm it.
The DNC was hacked regardless of whether or not Seth Rich leaked anything to Assange.
Simply HAVING classified material on a non-government Blackberry is Mishandling Classified Information, period.
Information is classified by its very existence. It matters not whether it is marked or not.
"Ceterum censeo Hillary esse delendam."
Garde la Foi, mes amis! Nous nous sommes les sauveurs de la République! Maintenant et Toujours!
(Keep the Faith, my friends! We are the saviors of the Republic! Now and Forever!)
LonePalm, le Républicain du verre cassé (The Broken Glass Republican)
She has an asbestos pad under her flaming pantsuit.
Lost them? Hell, I’ll bet she sold them.
Any chance the hacks occurred (read: were staged) later to create a detectable event that would throw off investigation into the “lost” mobile devices?
Intentionally lost, so enemy spies could pick them up.
2nd request for sources discussing the signatures.
It might have made it easier for hackers to leverage the data to do some real hacking.
Assange told the NPR interviewer he got the emails from an insider but would not name the insider. He did not confirm or deny Rich. But he insisted it was not from Russian hackers.
Yes, please ping me when someone presents actual evidence of hacking or even a source with a name.
CrowdStrike Services Inc., our Incident Response group, was called by the Democratic National Committee (DNC), the formal governing body for the US Democratic Party, to respond to a suspected breach. We deployed our IR team and technology and immediately identified two sophisticated adversaries on the network COZY BEAR and FANCY BEAR
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.