• This is a political forum that is non-biased/non-partisan and treats every person's position on topics equally. This debate forum is not aligned to any political party. In today's politics, many ideas are split between and even within all the political parties. Often we find ourselves agreeing on one platform but some topics break our mold. We are here to discuss them in a civil political debate. If this is your first visit to our political forums, be sure to check out the RULES. Registering for debate politics is necessary before posting. Register today to participate - it's free!

Russian hackers read Obama's unclassified emails last year: NYT......

Seems the phising and bait was going on at the State Dept from 2009 until now. Plus they know the Romanian Hacker left his signature. You did note how he got it from Blumenthal and then took whatever from Clinton.

None of this is intelligible or even remotely connected to how one would be able to hack State Dept servers.
 
Try again Pete.....note what it says the Romanian hacker did.


Hillary’s Secret Email Was a Cyberspy’s Dream Weapon.....

When a notorious online break-in artist got a hold of the Secretary of State’s now-infamous email address, he gave himself the power to use it to target the global elite. The private email address for Hillary Clinton, which became the talk of Washington this week and created her first major speed bump on her road to the White House, has actually been freely available on the Internet for a year, thanks to a colorful Romanian hacker known as Guccifer.

On March 14, 2013, Guccifer—his real name is Marcel-Lehel Lazar—broke into the AOL account of Sidney Blumenthal, a journalist, former White House aide to Bill Clinton, and personal confidante of Hillary Clinton. Lazar crowed about his exploits to journalists, disclosing a set of memos Blumenthal had written to Clinton in 2012, as well as the personal email address and domain she’s now known to have used exclusively for her personal and official correspondence. Few journalists noticed that at the time, and it caused no ruckus in Washington. But the fact that Clinton’s private email was now public means she was not just putting her own information at risk, but potentially those in the circle of people who knew her private address.

Her email account was the ultimate hacker’s lure. It’s a common technique to impersonate a trusted source via email, in order to persuade a recipient to download spyware hidden inside seemingly innocuous attachments. Indeed, Clinton’s own staff had been targeted with such highly targeted “spear phishing” emails as early as 2009, the year she took office. And according to U.S. authorities, Lazar, who’s now serving a seven-year prison sentence in Romania and is accused of hacking the accounts of other Washington notables like Colin Powell, did commandeer other people’s email accounts . Then he used them to send messages exposing the private correspondence of his other victims. Before Lazar exposed the email domain, it would have been known to people with whom Clinton was trading emails, as well as to a tight inner circle lucky enough to be given @clintonemail.com accounts. Those included Clinton’s daughter, Chelsea, and aide Huma Abedin, whom the former secretary treats like family. Maybe Clinton and her staff thought the relative anonymity of her email domain would have given her a measure of security. It’s hard to say, since they and State Department officials have consistently refused to answer journalists questions about what security measures Clinton took to protect her “homebrew” email system......


Hillary

JFC, why do you make your posts look like a ****ing Christmas Tree? It makes them hard to read. Anyway the article doesn't say he broke in to Hillary's server, so your implication that I got it wrong is bull****.
 
Do you recognize what this thread is about? It's about hacking a State Dept. server supposedly, somehow related to Hillary's weak security (as admitted by the OP) even though, one attack simply can't make the other possible.

You don't understand. Hillary gave Russia, Iran and China all the secrets on purpose. They've got all the information they need to hack everything forever no matter what we do. It's over. The bad guys got us. Take to the hills. Wolverines.
 
You're entirely missing the point. A hacker doesn't need access to State dept servers if they're interested in Hillary's, which had no security for a full three months. During that time a hacker could obtain enough information to allow continued access even after encryption was installed and a certificate obtained. That's no big technical feat at all.

What do you think HB.....WH gets hacked, and thru State Dept Computers?
 
You don't understand. Hillary gave Russia, Iran and China all the secrets on purpose. They've got all the information they need to hack everything forever no matter what we do. It's over. The bad guys got us. Take to the hills. Wolverines.

It's absolutely insane what these people are proposing. We have a guy who doesn't understand that one thing can't make the other possible, debating that phishing, viruses and social engineering methods can be used to to hack into a State Dept. e-mail. That just boggles the mind.
 
Do you recognize what this thread is about? It's about hacking a State Dept. server supposedly, somehow related to Hillary's weak security (as admitted by the OP) even though, one attack simply can't make the other possible.

Anything can be compromised with enough sophistication and power.
 
It's absolutely insane what these people are proposing. We have a guy who doesn't understand that one thing can't make the other possible, debating that phishing, viruses and social engineering methods can be used to to hack into a State Dept. e-mail. That just boggles the mind.

You're missing the premise. Hillary, Obama et al. are EVIL. They are HELPING THE ENEMY - ON PURPOSE!

Once you grasp that, the rest makes (twisted and sad) sense.
 
What do you think HB.....WH gets hacked, and thru State Dept Computers?

Hard to say. There are many avenues from which an attack can be mounted against virtually any system. It's a brave new world. There are also attacks and infiltrations which are low level and designed to push information to other places. It's a pretty sophisticated game sometimes, and appearances can be deceiving. Sometimes the objective is just inconvenience and embarrassment.
 
Anything can be compromised with enough sophistication and power.

Sure enough, however social engineering, viruses and keyloggers will never get you into a State Dept's server. Neither will the information that they produce. There simply is no transmittable information contained in any e-mail that would allow somebody to get into a State Dept server because they're not facebook accounts. You don't simply get a password and an account and you're good to go which is what you've been inferring for some time. That's why the entire premise that the WH/State Dept were hacked through some bit of information contained in Hillary's account is laughable if not outright mythical. This isn't a movie.
 
Hard to say. There are many avenues from which an attack can be mounted against virtually any system. It's a brave new world. There are also attacks and infiltrations which are low level and designed to push information to other places. It's a pretty sophisticated game sometimes, and appearances can be deceiving. Sometimes the objective is just inconvenience and embarrassment.

When you're a state intelligence agency, the objective is never just to inconvenience and embarrass, especially not via a ****ing rolodex.
 
Just yoga routines is probably all they got.

They say stuff like yoga and that makes me think yoga pants and then I have to think Hillary in yoga pants and then it's
th
every time.
So knock it off.
 
You're missing the premise. Hillary, Obama et al. are EVIL. They are HELPING THE ENEMY - ON PURPOSE!

Once you grasp that, the rest makes (twisted and sad) sense.

This place keeps getting nuttier and nuttier. I miss the days where the most we had to deal with were 9/11 conspiracy theories and Obama's birth certificates.
 
This place keeps getting nuttier and nuttier. I miss the days where the most we had to deal with were 9/11 conspiracy theories and Obama's birth certificates.

These days we roll it all up into one big nutball. Then we roll it at people and see if it squashes them. As one can see, there are casualties.
 
It'd sound like something if there was a quote. But there's not. Know why? Because the only quotes they have would look stupid.

Hypothetically ... if Hillary was arranging Bill's speaking fee with a Foundation donor for whose business enterprise she was discussing details, would you consider that official or private?
 
These days we roll it all up into one big nutball. Then we roll it at people and see if it squashes them.

What do you need to hack into State Dept. servers? Just somebody's e-mail and password. It works like Facebook.
 
What do you need to hack into State Dept. servers? Just somebody's e-mail and password. It works like Facebook.

Hillary gave them the password so they can destroy America. Obama is the devil.




Wolverines
 
None of this is intelligible or even remotely connected to how one would be able to hack State Dept servers.

Whats not intelligible with my post to the one you posted up about Phishing and bait? What english words didn't you understand and are having so much trouble with? Do you think I need to know this limitation of yours or something? I do have to go by what you try to construct with your so called smart power.







Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.

While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president's schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies, U.S. officials say. The White House in October said it noticed suspicious activity in the unclassified network that serves the executive office of the president. The system has been shut down periodically to allow for security upgrades.

The FBI, Secret Service and U.S. intelligence agencies are all involved in investigating the breach, which they consider among the most sophisticated attacks ever launched against U.S. government systems. ​The intrusion was routed through computers around the world, as hackers often do to hide their tracks, but investigators found tell-tale codes and other markers that they believe point to hackers working for the Russian government. To get to the White House, the hackers first broke into the State Department, investigators believe.

How Russians hacked the White House - CNNPolitics.com


What do I think of the method used for Clinton? It's script kiddie stuff that wouldn't even make it past the State Dept's first line of defence. Do you know why? :) I'll give you a clue, it has something to do with SSL VPN. :lol:



What Happened Hatuey.....here you are saying this is script kiddie stuff and it wouldn't even make it past the State first line of defense. No one can get into the State Dept etc etc and here our people are calling whatever the Russians are doing.....that they are the most sophisticated attacks they have ever seen.

Now who do we believe......BO's own people, Heads of other depts, in government that all investigate this type of stuff.....or you a left leaning liberal who cant figure how how this is starting to point to Hillary and when she was breached and used for bait.

Note what they said also about how other Foreign Agencies Prize that info? Also how it includes schedules that aren't made public.
 
Last edited:
Hypothetically ... if Hillary was arranging Bill's speaking fee with a Foundation donor for whose business enterprise she was discussing details, would you consider that official or private?

"For whose business enterprise she was discussing details"

Why don't you just say she was pimping Bill and giving away government contracts? I would consider pimping an ex-pres and selling state stuff to be official.
 
Hard to say. There are many avenues from which an attack can be mounted against virtually any system. It's a brave new world. There are also attacks and infiltrations which are low level and designed to push information to other places. It's a pretty sophisticated game sometimes, and appearances can be deceiving. Sometimes the objective is just inconvenience and embarrassment.


Yeah it seems so check out what I just put up.....also don't forget they like to go tangential on other points when they can't get past their own construct. Its like half the time they don't even know what they are saying.

Maybe we should pull up a chair and discuss their alleged smart power and come to some conclusion upon it. :mrgreen:
 
Whats not intelligible with my post to the one you posted up about Phishing and bait? What english words didn't you understand and are having so much trouble with? Do you think I need to know this limitation of yours or something? I do have to go by what you try to construct with your so called smart power.

None of it is intelligible because it has absolutely nothing to do with hacking a server. Do you not get that yet?

What Happened Hatuey.....here you are saying this is script kiddie stuff and it wouldn't even make it past the State first line of defense. No one can get into the State Dept etc etc and here our people are calling whatever the Russians are doing.....that they are the most sophisticated attacks they have ever seen.

Nope, I said that the information gained from one would not make hacking the other possible. That doesn't mean State Dept. is unhackable. Not even in your wildest dreams. What it means is that one is not related to the other because the approach and information obtained from one, are irrelevant to the approach taken for the other. You seem to have a penchant for addressing arguments nobody has ever made. Why do you do that to yourself?

Now who do we believe......BO's own people, Heads of other depts, in government that all investigate this type of stuff.....or you a left leaning liberal who cant figure how how this is starting to point to Hillary and when she was breached and used for bait.

Lmao, Hillary is a starting point? For what?!?!?! I've asked you repeatedly how you hack a server or even an e-mail just by being aware of it. You don't know how. I've asked you how an e-mail address would allow you to hack a server, you don't know. I've pointed out that SD would not use Facebook level security on its computers, and you can't even seem to address that.

Note what they said also about how other Foreign Agencies Prize that info? Also how it includes schedules that aren't made public.

That's cute. They got Obama's PDA. I'm sure they'll be able... to... assassinate him? What? Send a commando after him? What exactly can they do? This is why your entire premise falls flat on its face. Not only does not lead anywhere, it's so obviously ignorant of what is possible with this information that it completely destroys itself under a little scrutiny.
 
Hillary gave them the password so they can destroy America. Obama is the devil.




Wolverines

This whole thing reminds me of little kids screaming that they can hack you just by knowing your IP. That's the level of discussion we're having here. One side is arguing that some guy in Russia hacked what is probably absurdly secure servers on the planet with information that Hillary would have no reason to discuss or even access to and techniques that have beaten AOL. The other is saying that this is definitely something which can be done, it just can't be done in the way they're saying.

Also, I'm going to Angola in August. Any tips?
 
Also, I'm going to Angola in August. Any tips?

I got a tip for you: Kenya gets most of its energy sustainably, has been a multiparty democracy since 2003 and has the most liberal constitution (adopted by public referendum 2011) in the world.
 
I got a tip for you: Kenya gets most of its energy sustainably, has been a multiparty democracy since 2003 and has the most liberal constitution (adopted by public referendum 2011) in the world.

Angola... not so much. Lingala and Bakongo sound like the names of vicious alien groups on Star Trek.
 
Angola... not so much. Lingala and Bakongo sound like the names of vicious alien groups on Star Trek.

Kenya has Mombasa and Embu, warm and inviting names.


Edit: oh, those are languages :)
 
None of it is intelligible because it has absolutely nothing to do with hacking a server. Do you not get that yet?

Oh, due to it not correlating to what you wanted it to.....you thought it was better to go with not understanding english words and what one said. To try and play it off like you can't understand and comprehend. I get it now. Yeah that's not another good tactic to try and play with.


Nope, I said that the information gained from one would not make hacking the other possible. That doesn't mean State Dept. is unhackable. Not even in your wildest dreams. What it means is that one is not related to the other because the approach and information obtained from one, are irrelevant to the approach taken for the other. You seem to have a penchant for addressing arguments nobody has ever made. Why do you do that to yourself?

What you also said it was trivial and didn't really mean much. But of course now that's been shown what the reality actually is. Which it was already mentioned about WH being hacked thru State.


Lmao, Hillary is a starting point? For what?!?!?! I've asked you repeatedly how you hack a server or even an e-mail just by being aware of it. You don't know how. I've asked you how an e-mail address would allow you to hack a server, you don't know. I've pointed out that SD would not use Facebook level security on its computers, and you can't even seem to address that.

Yeah Right, and then I showed one way it was done to get to others by using Hillary as bait. :lamo

Then he used them to send messages exposing the private correspondence of his other victims.....snip~

Plus with all that I have shown.....its like I said its Starting to look like Hillary breached more than National Security.


That's cute. They got Obama's PDA. I'm sure they'll be able... to... assassinate him? What? Send a commando after him? What exactly can they do? This is why your entire premise falls flat on its face. Not only does not lead anywhere, it's so obviously ignorant of what is possible with this information that it completely destroys itself under a little scrutiny.

As usual.....always thinking in one dimension when it comes to BO. You still cant comprehend that part about others overseas and their Non public schedules as well as others in the WH and their being hacked. Don't worry tho.....one day you will understand it. But it wont be as exciting as when you think of BO.
 
Back
Top Bottom