SaintsInDome2006
Footballguy
Well good it was a Friday night, I was out myself.Tim was correct The tag team correcting him was not.
And the password stuff was particularly painful. I think I pulled a muscle laughing at that. And before you go to find the article(s) to prove to me that such an investigation is going on realize that I have already read them and more importantly understood them.
If you've read the article then you know they specifically referred to the "spear phishing" emails that turned up in Hillary's tranche. That's it. You can define hacking that way if you want, but there's a lot more to hacking and hacking is also one of only one of several ways to access data. As Rich mentions the network is one primary one, real time live eavesdropping over the network is one way and very common. I'd also remind you that Hillary was often traveling during some of her most controversial emails, including the mideast, but obviously also all over the world. When she was first meeting with Lavrov and the famous "Reset" episode which would prove such a harbinger of our future devolution of relations with Russia the Russians had probably already plugged into Hillary's email.
These are some article talking about some of those issues surrounding Hillary's (non) configuration at that time:
http://www.infosecisland.com/blogview/24382-Lessons-From-Hillary-Clintons-Email-Security-Oversight-.html
http://www.securityweek.com/clinton-email-server-vulnerable-3-months-venafi
https://www.venafi.com/blog/post/what-venafi-trustnet-tells-us-about-the-clinton-email-server/
And signals intelligence covers a wide range of disciplines, but whether it includes hacking or not we also know that hacking regardless goes a lot further than just phishing. I think maybe the funniest thing about that NYT piece is it highlights Pagliano's own narrow, limited view of data security for someone as high up as a SOS. Hey the security logs show no intrusions, see? Well I'm sure Bryan Pagliano vs the Russian, Chinese, NKorean (etc., etc.) intelligence agencies was a close fight. Hillary had intelligence agencies and the best at State to help her maintain the security of classified information. She apparently typically eschewed it, and in setting up her personal email system she entirely avoided it. That as Commish points out is entirely unforgivable. Cheryl Mills at one point "lost" her Blackberry in SE Asia (it could have been stolen, who knows) and whether it was compromised or not is beyond the point, Hillary was irresponsible to the level of bad faith. And she constantly lies about it throughout and is now still
.I don't think this is a bad point. This again refers to the spear phishing report from a while back. It was said then that those attempts had failed, so why bring it up again now? I think it's pretty clear the defenses that Hillary's followers (no, you're not, I know) will cling to are being publicly established: she wasn't hacked (sure with a limited definition of hacking like this given a broad application...), the marked/unmarked bs (not the standard), Hillary acted voluntarily (false, she was compelled by State, Congress, Foia, and the courts and the hacking of Blumenthal), and other SOS's did it too (well two emails below Secret, between 3 SOS's over 12 years). But that will be enough for folks like Tim to feel good about things and tapdance on the graves of VRWC'ers.Absolutely. This was settled around August!
Last edited by a moderator: