Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

VANITY: The Inspector General Report was very important...Here's why.
Various | 6/17/2018 | Myself

Posted on 06/17/2018 5:38:33 PM PDT by rlmorel

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-107 next last
To: rlmorel

good job.


21 posted on 06/17/2018 6:45:15 PM PDT by LS ("Castles made of sand, fall in the sea . . . eventually" (Hendix))
[ Post Reply | Private Reply | To 1 | View Replies]

To: discostu

I hear you discostu, but I would like to think this is going to be a signal point in the downfall of the media as we have known it, and a dawning of the “new” media. (Note: not that this process below hasn’t been going on for some time, but now, with the credibility of the media diminishing to the point the President can safely point out how biased or ill-informed they are, and their audiences are beginning to see it too, whether they want to or not.

I think that the days of having a small handful of analysts at CBS, CNN, or Fox who take in the data, provide their version of context to it, and disseminate it to people who consume it unthinkingly (as if they were eating potato chips) is over as the dominant model of both dissemination and consumption. Those people are often bound by contract to their outlet, and their interpretation is often subject to approval at a corporate level.

In the “new” media, you are going to have people like Jeff Carlson at The Markets Work and Chuck Ross at The Daily Caller doing incredible specialized work, both independently of each other (or not!) and someone like Dan Bongino who can provide context and take content from other authors and like them and make the sum of everything better than the individual parts. And these people aren’t bound by contract to each other or even to anyone apart from themselves.

I am hopeful we see something new.


22 posted on 06/17/2018 7:01:24 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: palmer

I just went back and listened to the podcast, and basically he said, in the IG report, they stated for fact and on record that Hillary Clinton’s private email “system” had been compromised and stolen by foreign actors. Dan Bongino has sources that say the server was hacked, but the report says “email stream” or something like that. Not as specific as I had thought.

But that is indeed on par with your post! Thank you for the explanation.


23 posted on 06/17/2018 7:04:04 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: rlmorel

24 posted on 06/17/2018 7:04:42 PM PDT by BTerclinger (MAGA)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rlmorel

What is the significance of “Email Traffic being compromised, rather than the server hacked”? Here is a speculative answer:

That sounds to me like they have discerned that data sent from Hillary’s Blackberry and/or iPad devices was being intercepted by someone before it ever got to her home brew server. The important thing is that her server wasn’t the weak point. The weak link was the Blackberry, and it’s user. That should not surprise anyone.

IIRC, some if not all of Hillary’s many Blackberry devices were NOT specially secure devices. She asked for one of Presidential timber and was turned down. Hillary was warned that Blackberry’s were susceptible to having the signal intercepted if used outside of secure settings, such as special areas at her office. She reportedly ignored this routinely, even using a Blackberry device in Russia to correspond with Obama.

The distinction you have focused upon is potentially the key to showing Clinton’s contempt for data security rules clearly laid out for her. Her crime was not “gross negligence” — it was deliberate misconduct.


25 posted on 06/17/2018 7:06:35 PM PDT by Chewbarkah
[ Post Reply | Private Reply | To 11 | View Replies]

To: LS

Thanks, LS...

I like to look at current events and view the as if it is fifty years in the future, just to imagine how significant or important a thing is that is occurring today.

Granted, things may not play out the way I think they should, and this will be a tiny blip, but I hope that the events we currently see are, from the perspective of the dangers of societal surveillance, viewed fifty years down the road as something that slowed or stopped our republic’s slide into a surveillance state.

(I know it is likely a pipe dream, but I have always been optimistic!)


26 posted on 06/17/2018 7:11:28 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: rlmorel

The media as we know it has been falling for 20 years. They still control the narrative. The new media is nothing more than people spreading the same narrative they get from the old media. Again look at the UN report. All the new media was around then, and it didn’t change a damn thing. The new media is a waste of 3 characters, cause it’s still just the media.


27 posted on 06/17/2018 7:12:34 PM PDT by discostu (Does this kind of life look interesting to you?!)
[ Post Reply | Private Reply | To 22 | View Replies]

To: palmer

You are on the target, breaking in to a server is a far cry from monitoring traffic, especially that on a channel or stored in a repository that is in violation of the law.

Man in the middle is more likely, or tap an save if unencrypted etc. Once someone slips up then an opening occurs for evidentiary exploration. The use of servers outside of established and mandated one is a violation of the law and that opens the door for a whole different perspective on how things can and were done

Great post!


28 posted on 06/17/2018 7:13:55 PM PDT by 100American (Knowledge is knowing how, Wisdom is knowing when)
[ Post Reply | Private Reply | To 20 | View Replies]

To: rlmorel

Point #9

Page 294

“crime against children”

It is not about Weiner’s weiner photos. It was what was in the “Life insurance” file.


29 posted on 06/17/2018 7:14:38 PM PDT by Lopeover ( The 2016 Election is about allegiance to the United States!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rlmorel

Thank you! I have put it on my Favorites for quick referral later.


30 posted on 06/17/2018 7:15:23 PM PDT by spel_grammer_an_punct_polise (Note to all foreigners: GET OUT and STAY OUT!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rlmorel

Freedom of speech is one thing, but being called to task for saying it if it is false or being done deliberately in support of criminal activity a whole different thing


31 posted on 06/17/2018 7:15:54 PM PDT by 100American (Knowledge is knowing how, Wisdom is knowing when)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Chewbarkah
"...Her crime was not “gross negligence” — it was deliberate misconduct..."

On one hand, we understand completely it was deliberate misconduct, and was likely done for two main reasons: First, she wished to avoid communications that could be obtained for scrutiny via a Freedom of Information Act request. Secondly, she was lazy and arrogant, and didn't think she should be subject to the rigors of security the way the rest of us are.

But on a different level, we all knew she felt this way: Reading Gary Aldrich's excellent book "Unlimited Access" where he described in excruciating detail the attitude the Clintons and their associates had about security, from absolute top to absolute bottom, was abysmal to the point of traitorous.

They WANTED to flout security, and they WANTED security to fail. Security was part of "The Man".

32 posted on 06/17/2018 7:17:15 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Chewbarkah

Exactly, and if they (White Hats) had figured out the routing algorithms being used to shunt copies of traffic to alternate addresses (Cisco Routers, F7 algorithm) to hide it and create a sort of private network then we are in RICO territory, big time


33 posted on 06/17/2018 7:18:44 PM PDT by 100American (Knowledge is knowing how, Wisdom is knowing when)
[ Post Reply | Private Reply | To 25 | View Replies]

To: 100American

I don’t think we disagree.

With freedom of speech comes responsibility, and part of that responsibility is being subject to having that speech scrutinized, deconstructed, and disproven.

Where I have an issue is some entity (the government) looking at speech, deciding if it is acceptable or unacceptable in some way, and acting unilaterally on that before it is even allowed to see the light of day.

I think we agree on deliberately false or in support of criminal activity.


34 posted on 06/17/2018 7:21:43 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 31 | View Replies]

To: BTerclinger

LOL, I don’t care who you are, that’s funny!


35 posted on 06/17/2018 7:22:45 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Lopeover
"...It is not about Weiner’s weiner photos. It was what was in the “Life insurance” file..."

When I heard that the NYPD and the NY Attorney's office were up in arms with what they found on Weiner's laptop, and were threatening to leak it to the media, which caused Loretta Lynch to threaten a federal investigation into the death of Eric Garner....your "life insurance" reference was the first thing I thought of.

IIRC, Dan Bongino sounded like he had some connections up in New York who gave him the gist of the hostile environment. (That is where he was from)

36 posted on 06/17/2018 7:31:35 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 29 | View Replies]

To: Chewbarkah; rlmorel
That sounds to me like they have discerned that data sent from Hillary’s Blackberry and/or iPad devices was being intercepted by someone before it ever got to her home brew server. The important thing is that her server wasn’t the weak point. The weak link was the Blackberry, and it’s user.

Depends on link encryption. The traffic to and from is trivial to intercept and it is likely that 100% of her traffic was intercepted at every foreign hotel she stayed at. But whether the eavesdropper can do anything depends on link encryption. I'm pretty sure the blackberry used HTTPS to interact with the mail server. I'm not 100% sure, but I'll look for a reference.

37 posted on 06/17/2018 7:32:23 PM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 25 | View Replies]

To: spel_grammer_an_punct_polise

Glad you found it helpful...I found his explanation to be both upbeat and easy to understand. I was falling prey to thinking how useless it was, as I had been to busy to dig into it.


38 posted on 06/17/2018 7:33:16 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: LucyT

mark -
rlmorel, good job!


39 posted on 06/17/2018 7:33:59 PM PDT by bitt (t\\)
[ Post Reply | Private Reply | To 4 | View Replies]

To: palmer; Chewbarkah

I remembered reading somewhere in the report that Hillary had instructed her IT Goon to obtain a certificate and a domain...that would imply secure traffic, no?


40 posted on 06/17/2018 7:35:47 PM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 37 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-107 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson