Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The Democracy Alliance meeting (WikiLeaks: Podesta)
WikiLeaks Podesta E-Mails ^ | 4-15-15

Posted on 10/23/2016 6:40:18 PM PDT by Jaded

From:simons@acm.org

To: john.podesta@gmail.com

Date: 2015-04-15 03:35

Subject: The Democracy Alliance meeting

Dear John,

I am following up on our very brief discussion, held as you were leaving the DA meeting, about Hillary Clinton's emails. I've included a summary of the issues and a precautionary step that I think should be taken. Please let me know if I can be of any assistance.

Regards, Barbara


TOPICS: Politics/Elections
KEYWORDS: 201504; 20150415; barbarasimons; clinton; democracyalliance; podesta; simons; wikileaks
It's not the email that's of note it's the attachment.
1 posted on 10/23/2016 6:40:18 PM PDT by Jaded
[ Post Reply | Private Reply | View Replies]

To: Jaded

What’s attachment??


2 posted on 10/23/2016 6:43:01 PM PDT by MNDude (God is not a Republican, but Satan is certainly a Democrat)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jaded

The attachment:

Hillary Clinton’s emails and what to do about them

Barbara Simons simons@acm.org 650-328-8730

I believe that this is a more serious situation than perhaps Secretary Clinton and her aides realize. Fortunately, there is a positive step that can and should be taken.

The problem. There is a very real risk that the system was broken into, possibly by Republican operatives (or China or some other country or organization). If this has happened and if there is anything that might appear problematic in those emails, whether or not it actually is, the relevant emails might be released to the press shortly before the election. Even if the system was not broken into, there is the threat that opponents might release forged emails that are difficult to impossible to distinguish from real ones.

In addition, there are questions that any computer security expert will ask, such as was the system backed up regularly. If so, then it might be possible at least to respond to forged emails. Of course the claim that the server has been wiped clean (was that also done with any backups that were created?) suggests that there may not be adequate backups.

Incidentally, depending on how the deletions on the server were done, it might be possible for the email to be recovered by a forensics expert.
What should be done. Unfortunately, nothing can be done to prevent the risks described above. Given that, it’s important to know how real those risks might be. Therefore, I recommend that a forensics investigator be hired to examine the server and any backups and logs that might still exist to see if there may have been a break-in.

Jeremy Epstein is a prominent computer security expert who has recommended a company called Mandiant. (Neither Jeremy nor I have any involvment with Mandiant of any kind, including financial). According to Jeremy, they are frequently brought in after major corporate breakins. They are very discrete and, in his view, competent. I can put anyone who is interested in touch with Jeremy, who lives in Virginia.

In my opinion it is critical that a highly qualified forensics expert examine the system as soon as possible. It is important to know if there may be a problem or if an attack may have occurred, so that there can be a well thought out response prepared beforehand.

Finally, if nothing serious is uncovered by a forensics examination, that does not prove that nothing happened. Regrettably, the absence of proof of a break-in is not proof of the absence of a break-in.


3 posted on 10/23/2016 6:45:00 PM PDT by Jaded (Pope Francis? Not really a fan... miss the last guy who recognized how Islam spread... the sword.ag)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MNDude

On WikiLeaks there are three tabs. Email. View source and attachments. Attachments if included are usually PDFs.


4 posted on 10/23/2016 6:46:25 PM PDT by Jaded (Pope Francis? Not really a fan... miss the last guy who recognized how Islam spread... the sword.ag)
[ Post Reply | Private Reply | To 2 | View Replies]

To: MNDude
Attachment is PDF, but I will paste the text here:

Hillary Clinton's emails and what to do about them

Barbara Simons
simons@acm.org
650-328-8730
I believe that this is a more serious situation than perhaps Secretary Clinton and her aides realize. Fortunately, there is a positive step that can and should be taken.

The problem. There is a very real risk that the system was broken into, possibly by Republican operatives (or China or some other country or organization). If this has happened and if there is anything that might appear problematic in those emails, whether or not it actually is, the relevant emails might be released to the press shortly before the election. Even if the system was not broken into, there is the threat that opponents might release forged emails that are difficult to impossible to distinguish from real ones.

In addition, there are questions that any computer security expert will ask, such as was the system backed up regularly. If so, then it might be possible at least to respond to forged emails. Of course the claim that the server has been wiped clean (was that also done with any backups that were created?) suggests that there may not be adequate backups.

Incidentally, depending on how the deletions on the server were done, it might be possible for the email to be recovered by a forensics expert.

What should be done. Unfortunately, nothing can be done to prevent the risks described above. Given that, it's important to know how real those risks might be. Therefore, I recommend that a forensics investigator be hired to examine the server and any backups and logs that might still exist to see if there may have been a break-in.

Jeremy Epstein is a prominent computer security expert who has recommended a company called Mandiant. (Neither Jeremy nor I have any involvment with Mandiant of any kind, including financial). According to Jeremy, they are frequently brought in after major corporate breakins. They are very discrete and, in his view, competent. I can put anyone who is interested in touch with Jeremy, who lives in Virginia.

In my opinion it is critical that a highly qualified forensics expert examine the system as soon as possible. It is important to know if there may be a problem or if an attack may have occurred, so that there can be a well thought out response prepared beforehand.

Finally, if nothing serious is uncovered by a forensics examination, that does not prove that nothing happened. Regrettably, the absence of proof of a break-in is not proof of the absence of a break-in.

5 posted on 10/23/2016 6:50:29 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Jaded

I should have just refreshed.


6 posted on 10/23/2016 6:51:17 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Jaded
Hillary Clinton's emails and what to do about them

Barbara Simons simons@acm.org 650-328-8730

I believe that this is a more serious situation than perhaps Secretary Clinton and her aides realize. Fortunately, there is a positive step that can and should be taken. The problem. There is a very real risk that the system was broken into, possibly by Republican operatives (or China or some other country or organization). If this has happened and if there is anything that might appear problematic in those emails, whether or not it actually is, the relevant emails might be released to the press shortly before the election. Even if the system was not broken into, there is the threat that opponents might release forged emails that are difficult to impossible to distinguish from real ones.

In addition, there are questions that any computer security expert will ask, such as was the system backed up regularly. If so, then it might be possible at least to respond to forged emails. Of course the claim that the server has been wiped clean (was that also done with any backups that were created?) suggests that there may not be adequate backups.

Incidentally, depending on how the deletions on the server were done, it might be possible for the email to be recovered by a forensics expert. What should be done. Unfortunately, nothing can be done to prevent the risks described above. Given that, it's important to know how real those risks might be. Therefore, I recommend that a forensics investigator be hired to examine the server and any backups and logs that might still exist to see if there may have been a break-in.

Jeremy Epstein is a prominent computer security expert who has recommended a company called Mandiant. (Neither Jeremy nor I have any involvment with Mandiant of any kind, including financial). According to Jeremy, they are frequently brought in after major corporate breakins. They are very discrete and, in his view, competent. I can put anyone who is interested in touch with Jeremy, who lives in Virginia.

In my opinion it is critical that a highly qualified forensics expert examine the system as soon as possible. It is important to know if there may be a problem or if an attack may have occurred, so that there can be a well thought out response prepared beforehand.

Finally, if nothing serious is uncovered by a forensics examination, that does not prove that nothing happened. Regrettably, the absence of proof of a break-in is not proof of the absence of a break-in.

7 posted on 10/23/2016 6:51:19 PM PDT by PA Engineer (Liberate America from the Occupation Media. DEPLORABLE AND PROUD!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: palmer

Same here.


8 posted on 10/23/2016 6:51:55 PM PDT by PA Engineer (Liberate America from the Occupation Media. DEPLORABLE AND PROUD!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Jaded

So this member of DA is suggesting a forensic ‘expert’ recover the emails and challenge the leaked emails as forgeries. The problem is that emails go to others and get cached on many servers throughout the internet.

The DA is a secretive group of far-left billionaires and their minions. This group needs to be outed.


9 posted on 10/23/2016 6:52:48 PM PDT by Hostage (ARTICLE V):)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PA Engineer

The attachment definitely piqued my interest.


10 posted on 10/23/2016 6:54:40 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 8 | View Replies]

To: palmer

Notice they’re 1 not sure if it was hacked. 2. Blame the Republicans first. 3. What about heather samuelson’s Lenovo laptop with spyware?


11 posted on 10/23/2016 6:58:18 PM PDT by Jaded (Pope Francis? Not really a fan... miss the last guy who recognized how Islam spread... the sword.ag)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Jaded

Yeah, that’s before they came up with the blame Putin strategy. Of course Trump wasn’t on the scene yet.


12 posted on 10/23/2016 7:00:37 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Jaded

BKMK


13 posted on 10/23/2016 7:06:36 PM PDT by VanShuyten ("a shadow...draped nobly in the folds of a gorgeous eloquence.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jaded; maggief; PJ-Comix

As has been discovered by some here and on The_Donald at reddit, the ATTACHMENTS MATTER.

Today, PJ Comix alerted me to an attachment to the email showing how they oversample for polling. The ATTACHMENT however, is showing in detail, state by state who, which demographics should be oversampled.

We have been manipulated for years.


14 posted on 10/23/2016 7:09:22 PM PDT by SE Mom
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jaded

Simons sees the negative potential, but seems interested only in how it might effect Hillary’s political fortunes. (Even with that limitation, her statement, that Hillary and her aides are basically too stupid to realize the importance, is damning.) What matters was the exposure of US security and foreign policy interests to intel operations designed to alienate support. Once Hillary doubled down on stupid by announcing that she had had the server wiped, unfriendly operators could forge documents and pass them on to influence foreign opinion. The US would be in a weak position to prove anything was forged, once Hillary declared that the source material had been destroyed. Example: Let’s say the US needs support of some third world leader in a vote at the UN. All the Russians or Chinese need do is provide that leader’s spooks with fake Hillary communications indicating she/the US was conspiring against the leader or his country’s interests. t minimum, this would sow doubt about the US’s dependability.

What I don’t get is why a fairly shrewd guy like Podesta, would associate himself with Hillary, when his own emails demonstrate that he knows she is dishonest, incompetent, downright stupid, self-centered to the point of dysfunction, etc.


15 posted on 10/23/2016 7:18:17 PM PDT by Chewbarkah
[ Post Reply | Private Reply | To 1 | View Replies]

To: PA Engineer

#7. Did you all miss the very damning but honest statement that Simons made at the end? She wrote, correctly, that “the absence of proof of a break-in is NOT PROOF of the absence of a break-in”.

She directly contradicts the leftist media’s mantra that since there was “no proof of a break-in”, it didn’t happen.

SOMEBODY TELL THE TRUMP PEOPLE TO USE THIS EMAIL AGAINST HILLARY’S PROPAGANDISTS.

IT IS A SURE WINNER IF USED PROPERLY.


16 posted on 10/23/2016 11:34:24 PM PDT by MadMax, the Grinning Reaper
[ Post Reply | Private Reply | To 7 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson