Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Compromised codes

Posted on 08/12/2016 7:26:15 AM PDT by rustyboots

A long time ago when I was young I had a job in the military where we were exposed to, used, and changed encryption codes. Compared to today, I assume the methods were primitive, clumsy, and time consuming. This brings us to current events. The use of a private server to handle email for the former Secretary of State may seem to some to be OK, after all, she didn't send many classified emails. But let us assume this, those emails that were unclassified and were sent to her from various people at State and perhaps other places probably has multiple addressees. Now if her server got hacked and those emails were obtained, we now have to look at the possibility that same emails were sent to others, but were encrypted since they went government office to government office. Next, let us assume the bad guys intercepted those encrypted emails. If the same bad guys had the message that was sent to her in the clear, then a brute force approach would allow them to find the same message in the encrypted stream they intercepted. What does this mean? It means they could read every message sent that day using the encryption codes used that day. So, it isn't just her emails that can be read, it could be the whole department and maybe other departments emails that are made available by her choice of communication protocol. Of course, maybe encryption methods have changed and every message sent gets a different code. Maybe the government uses something close to PGP with private and public keys. But just wanted to put this out and see what opinions others may have.


TOPICS: Your Opinion/Questions
KEYWORDS: 201608; boozallenhamilton; cybersecurity; cyberwar; cyberwarfare; encryptioncodes; haroldmartin; haroldthomasmartin; nongovserver
Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 next last
To: rustyboots

Even unclassified information can be deadly. When you combine many pieces of unclass it can become classified.

I just wonder if they still use the TPI (Two person integrity) at her level for TS material?


21 posted on 08/12/2016 8:26:30 AM PDT by rfreedom4u (The root word of vigilante is vigilant!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GOPJ
Yes, our security's been compromised, but on the lighter brighter side... Hillary has the 'right tone' to fit in at Washington DC dinner parties... And reall, isn't THAT all that matters to the 'oh so shallow ones' at the Washington Post and New York Times?

ABSOLUTELY!

22 posted on 08/12/2016 8:28:04 AM PDT by The Sons of Liberty ("We re going to raise taxes on the Middle Class!" - HRC Aug 3, 2016)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Grampa Dave

You misunderstand me (more to the point, I wasn’t clear).

Getting the plaintext to a message encrypted in and unknown code is just about the most valuable thing a crypt-analyst can find.

It tells him in a single document how the code operates, and provides proof positive when he gets the exact code figured out, and each step of the process, every character to character map shows a clear and shining path to understanding not just the code, but the mindset and approach of his opponent.

Then he can go back to pinochle...


23 posted on 08/12/2016 8:29:51 AM PDT by null and void (Has there ever been a death associated with the Clintons that *wasn't* beneficial to them?)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ConservativeWarrior

KIK13s here

Actually the “tape” was pulled through a KOI-18 that was connected to the KYK-13. This loaded the key into the KYK and could subsequently be loaded into a radio or other device.


24 posted on 08/12/2016 8:31:09 AM PDT by rfreedom4u (The root word of vigilante is vigilant!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: rfreedom4u

Right you are!

Seems forever ago.


25 posted on 08/12/2016 8:40:40 AM PDT by ConservativeWarrior (Fall down 7 times, stand up 8. - Japanese proverb)
[ Post Reply | Private Reply | To 24 | View Replies]

To: lacrew

Somehow the neuro-connection of negative proof does not have any traction in this argument / discussion.

By not opening a gov’t-secure account and shunting all her email commun onto her private server; she has in all practicality and in all reality declared in advance that NOTHING she receives shall be TS. A TS email simply landing on her server with zero intervention on her part (just like there is no intervention on your or my part when receiving email) is a felony under 18 USC. It’s a felony before she reads it, forwards it, it’s a felony before she turns on her computer. That means, the markings or lack of markings on her communs are irrelevant. Her discretion as to top secret or yoga isn’t at issue, the felony occurs before she exerts her discretion.

I don’t get it, meaning, I don’t get why the rest of the universe does not get it. But it/they don’t.


26 posted on 08/12/2016 9:03:44 AM PDT by Attention Surplus Disorder (I had a cool idea for a new tagline and I forgot it!)
[ Post Reply | Private Reply | To 18 | View Replies]

To: null and void
I didn't misunderstand you.

Then he can go back to pinochle...chess, blackjack or bridge with his fellow analysts.

27 posted on 08/12/2016 9:14:22 AM PDT by Grampa Dave ((My passion for freedom is stronger than that of the DemYouocrats whose obsession is to enslave me.))
[ Post Reply | Private Reply | To 23 | View Replies]

To: Attention Surplus Disorder

If you ever figure why neither of them are in jail, let me know. I have tried to see this from every angle and can’t find one that doesn’t lead to jail. What time she wakes up can almost be considered “Confidential”. Any official communication with aides or others would at least be sensitive, if not confidential. But these type of laws do not seem to apply to Democrats.


28 posted on 08/12/2016 9:14:52 AM PDT by rustyboots
[ Post Reply | Private Reply | To 26 | View Replies]

To: rustyboots

Code cracker? That’s racist!


29 posted on 08/12/2016 9:26:53 AM PDT by Old Yeller (Hillary is Satan's spiritual advisor.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Adder
Her “word” is worth about as much as a steaming pile of crap.

Actually, I'd take the steaming pile over her word — at least I could sell or use it as fertilizer.

30 posted on 08/12/2016 9:27:40 AM PDT by Edward.Fish
[ Post Reply | Private Reply | To 19 | View Replies]

To: rustyboots
"...Compared to today, I assume the methods were primitive, clumsy, and time consuming..."

Yes, they were. But they also had a trail of custody or ownership. You generally knew who had keys to the locks, and...responsibility was owned and there was generally accountability. People had to undergo security checks, interviews, even polygraph tests. Their friends and families were often interviewed. Someone actually LOOKED at their history. Homosexuals, people with sexual peccadilloes, alchoholics (at least diagnosed ones) people with a history of anti-government agitation, and criminals in general were denied security clearances. That was then.

This is now.

Now, the information is available to people who don't have keys, fake keys, ignore keys and break it open, and do so with the full understanding that there are so many keys, so many locks, so many people and systems guarding those locks, that it is unlikely or impossible to determine any kind of useful custody chain, and if there is, who is going to look at it. And even if they look at it, how will it ever get into the hands of someone who would do something about it, because everyone HAS it and nobody OWNS it. Background or security checks? Hahahahahaha. The First Clinton Administration DESTROYED any semblance of facade of security.

Read "Unlimited Access" by Gary Aldrich. If someone didn't have a pass to get into the White House because they never submitted to their security clearance interview, they would simply go on for months or years at a time working under a temporary pass with the full knowledge and approval BY THE PRESIDENT that the security processes were being DELIBERATELY (and, IN YOUR FACE) bypassed and avoided. People with NO CLEARANCE WHATSOEVER were handling ultra-top secret documents.

As far as I am concerned, the Clinton Administrations did MORE to destroy US security than ANY OTHER ENTITY IN AMERICAN HISTORY. The Soviets, Chinese, and other communist sympathizers had been chewing away at US security from the outside for decades. The Clintons showed how the door could be thrown open from the inside to anyone who hated America, had an axe to grind with someone, or simply wanted more money.

31 posted on 08/12/2016 9:32:34 AM PDT by rlmorel (Orwell described Liberals when he wrote of those who "repudiate morality while laying claim to it.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: GOPJ
Hillary has the 'right tone' to fit in at Washington DC dinner parties

???

Unless the 'right tone' is screeching, hollering, and throwing kitchen utensils ...

32 posted on 08/12/2016 9:32:43 AM PDT by NorthMountain (Hillary Clinton: corrupt unreliable negligent traitor)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Attention Surplus Disorder; The Sons of Liberty; GOPJ; rustyboots

See my post at #31...


33 posted on 08/12/2016 9:35:44 AM PDT by rlmorel (Orwell described Liberals when he wrote of those who "repudiate morality while laying claim to it.")
[ Post Reply | Private Reply | To 31 | View Replies]

To: NorthMountain

Tsk Tsk. We all know an ashtray is not classified as a “kitchen utensil”...:)


34 posted on 08/12/2016 9:37:44 AM PDT by rlmorel (Orwell described Liberals when he wrote of those who "repudiate morality while laying claim to it.")
[ Post Reply | Private Reply | To 32 | View Replies]

To: Grampa Dave

Dave:

We really don’t know how many classified emails she sent. Remember that she did manage to delete on the order of 33000 emails without any way to estimate the number of classified.

Francesco


35 posted on 08/12/2016 9:39:57 AM PDT by francesco525
[ Post Reply | Private Reply | To 4 | View Replies]

To: Grampa Dave; null and void; rustyboots; CodeToad; ASA Vet
You will all forgive me if I don't comment at all on this thread.

I would REALLY like to but I don't want to even get started because of where I might go.

"Ceterum censeo Hillary esse delendam."

Garde la Foi, mes amis! Nous nous sommes les sauveurs de la République! Maintenant et Toujours!
(Keep the Faith, my friends! We are the saviors of the Republic! Now and Forever!)

LonePalm, le Républicain du verre cassé (The Broken Glass Republican)

36 posted on 08/12/2016 9:49:39 AM PDT by LonePalm (Commander and Chef)
[ Post Reply | Private Reply | To 6 | View Replies]

To: rlmorel
... the Clinton Administrations did MORE to destroy US security than ANY OTHER ENTITY IN AMERICAN HISTORY. The Soviets, Chinese, and other communist sympathizers had been chewing away at US security from the outside for decades. The Clintons showed how the door could be thrown open from the inside to anyone who hated America, had an axe to grind with someone, or simply wanted more money.

The first I've heard of Hillary or Bill expressing concern about 'security' is over their DNC stuff being hacked... Apparently they 'get it' when 'their ox is being gored'...thanks for sharing your insight rlmorel.

37 posted on 08/12/2016 9:56:21 AM PDT by GOPJ (Chicago and Detroit are NOT accidents... they're DEMOCRAT CITIES BASED ON DEMOCRAT VALUES.)
[ Post Reply | Private Reply | To 31 | View Replies]

To: Nip

The writer is correct - once you break a code system you can then “read” any and all mails using that code.


That is true for simple substitution codes. No one uses simple substitution past “Drink Ovaltine” cryptography.


38 posted on 08/12/2016 10:08:41 AM PDT by sparklite2 ( "The white man is the Jew of Liberal Fascism." -Jonah Goldberg)
[ Post Reply | Private Reply | To 12 | View Replies]

To: sparklite2

Actually, you’re correct as systems go. But look what it took to break Enigma. It’s more than working with pen and paper.


39 posted on 08/12/2016 10:11:05 AM PDT by sparklite2 ( "The white man is the Jew of Liberal Fascism." -Jonah Goldberg)
[ Post Reply | Private Reply | To 38 | View Replies]

To: rustyboots

Rules are for little people.


40 posted on 08/12/2016 10:13:07 AM PDT by Organic Panic (Hillary Clinton, the elderly white woman's version of "I dindu nuffins.")
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson