Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: rlmorel

What is the significance of “Email Traffic being compromised, rather than the server hacked”? Here is a speculative answer:

That sounds to me like they have discerned that data sent from Hillary’s Blackberry and/or iPad devices was being intercepted by someone before it ever got to her home brew server. The important thing is that her server wasn’t the weak point. The weak link was the Blackberry, and it’s user. That should not surprise anyone.

IIRC, some if not all of Hillary’s many Blackberry devices were NOT specially secure devices. She asked for one of Presidential timber and was turned down. Hillary was warned that Blackberry’s were susceptible to having the signal intercepted if used outside of secure settings, such as special areas at her office. She reportedly ignored this routinely, even using a Blackberry device in Russia to correspond with Obama.

The distinction you have focused upon is potentially the key to showing Clinton’s contempt for data security rules clearly laid out for her. Her crime was not “gross negligence” — it was deliberate misconduct.


25 posted on 06/17/2018 7:06:35 PM PDT by Chewbarkah
[ Post Reply | Private Reply | To 11 | View Replies ]


To: Chewbarkah
"...Her crime was not “gross negligence” — it was deliberate misconduct..."

On one hand, we understand completely it was deliberate misconduct, and was likely done for two main reasons: First, she wished to avoid communications that could be obtained for scrutiny via a Freedom of Information Act request. Secondly, she was lazy and arrogant, and didn't think she should be subject to the rigors of security the way the rest of us are.

But on a different level, we all knew she felt this way: Reading Gary Aldrich's excellent book "Unlimited Access" where he described in excruciating detail the attitude the Clintons and their associates had about security, from absolute top to absolute bottom, was abysmal to the point of traitorous.

They WANTED to flout security, and they WANTED security to fail. Security was part of "The Man".

32 posted on 06/17/2018 7:17:15 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 25 | View Replies ]

To: Chewbarkah

Exactly, and if they (White Hats) had figured out the routing algorithms being used to shunt copies of traffic to alternate addresses (Cisco Routers, F7 algorithm) to hide it and create a sort of private network then we are in RICO territory, big time


33 posted on 06/17/2018 7:18:44 PM PDT by 100American (Knowledge is knowing how, Wisdom is knowing when)
[ Post Reply | Private Reply | To 25 | View Replies ]

To: Chewbarkah; rlmorel
That sounds to me like they have discerned that data sent from Hillary’s Blackberry and/or iPad devices was being intercepted by someone before it ever got to her home brew server. The important thing is that her server wasn’t the weak point. The weak link was the Blackberry, and it’s user.

Depends on link encryption. The traffic to and from is trivial to intercept and it is likely that 100% of her traffic was intercepted at every foreign hotel she stayed at. But whether the eavesdropper can do anything depends on link encryption. I'm pretty sure the blackberry used HTTPS to interact with the mail server. I'm not 100% sure, but I'll look for a reference.

37 posted on 06/17/2018 7:32:23 PM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 25 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson