• This is a political forum that is non-biased/non-partisan and treats every person's position on topics equally. This debate forum is not aligned to any political party. In today's politics, many ideas are split between and even within all the political parties. Often we find ourselves agreeing on one platform but some topics break our mold. We are here to discuss them in a civil political debate. If this is your first visit to our political forums, be sure to check out the RULES. Registering for debate politics is necessary before posting. Register today to participate - it's free!

Russian hackers read Obama's unclassified emails last year: NYT......

Cmon now B. Were suppose to believe it doesn't mean nothing and its not serious to have Diplomats and Leaders Schedules and all. They could be holding Birthday parties with their families and only communicating n-stuff.

You're making the claim, the burden of proof is upon you. But you don't have anything, do you?
 
How did the Romanian hacker get into Blumenthal's account and Hack into Hillary's Server?

Lmao, Hillary used a commercially available system. One which admittedly had pretty weak security. US diplomats have laptops connected to State Dept e-mail system. Do you know the difference between them or not? There is no moving goalposts here. You're trying to connect two issues without so much as knowing the approach used in either. So I'll ask you again: How do you hack an e-mail address having only the e-mail address? Here, I'll throw you a bone and let you in on how Hillary's e-mails were hacked:

How Unsafe Was Hillary Clinton's Secret Staff Email System?

Do you know how the approach above would be applied to a State Dept e-mail server? :) I can wait all day for this!
 
Just yoga routines is probably all they got.

Yeah HB, :2wave: that and Bocce Ball parties in Italy, huh? Or who knows a Secrets Service members rolodex of some Columbian Hookers. :shock:



Leaked Private Emails Reveal Ex-Clinton Aide's Secret Spy Network......

Starting weeks before Islamic militants attacked the U.S. diplomatic outpost in Benghazi, Libya, longtime Clinton family confidante Sidney Blumenthal supplied intelligence to then Secretary of State Hillary Clinton gathered by a secret network that included a former CIA clandestine service officer, according to hacked emails from Blumenthal's account. The emails, which were posted on the internet in 2013, also show that Blumenthal and another close Clinton associate discussed contracting with a retired Army special operations commander to put operatives on the ground near the Libya-Tunisia border while Libya's civil war raged in 2011.

Blumenthal's emails to Clinton, which were directed to her private email account, include at least a dozen detailed reports on events on the deteriorating political and security climate in Libya as well as events in other nations. They came to light after a hacker broke into Blumenthal's account and have taken on new significance in light of the disclosure that she conducted State Department and personal business exclusively over an email server that she controlled and kept secret from State Department officials and which only recently was discovered by congressional investigators,

Leaked Private Emails Reveal Ex-Clinton Aide's Secret Spy Network
 
Well what do you think B.....the Romanian Hacker stated he hacked Blumenthal then got to Hillary. Set up shop in her domain and got other people Email accounts?

Why would he do this? Why would he need to get their emails and their email accounts?

That's total BS, he never got into Hillary's sever, if he had, he would have gotten her Emails. If he got other email accounts, he must gotten them from Blumenthal's emails.
 
Yeah and, it looks like I said, this is starting to look like Hillary gave up more than a breach of Security. Which it is, starting to look that way.

Oh and The Times and Reuters pointed out how long it took BO to make some admission on this. Considering it went back a almost a year. :lol:

Holy jeez, how is it starting to look like Hillary gave more than just a breach of security if the two servers in question required entirely different methods of security and held completely different information? I don't think you know how this works at all. :lol:
 
Please list the Democrat senators and congressmen who voted against Homeland Security and while you're at it, list the congressmen and senators who voted against the Iraq invasion.

Your political whore is on neither list, both of which are very, very short.

Nice try to refocus the issue though, Hillary is going to need a war to distract from her troubles
Don't have to. A Republican signed in to existence. ;)
 
Yeah HB, :2wave: that and Bocce Ball parties in Italy, huh? Or who knows a Secrets Service members rolodex of some Columbian Hookers. :shock:



Leaked Private Emails Reveal Ex-Clinton Aide's Secret Spy Network......

Starting weeks before Islamic militants attacked the U.S. diplomatic outpost in Benghazi, Libya, longtime Clinton family confidante Sidney Blumenthal supplied intelligence to then Secretary of State Hillary Clinton gathered by a secret network that included a former CIA clandestine service officer, according to hacked emails from Blumenthal's account. The emails, which were posted on the internet in 2013, also show that Blumenthal and another close Clinton associate discussed contracting with a retired Army special operations commander to put operatives on the ground near the Libya-Tunisia border while Libya's civil war raged in 2011.

Blumenthal's emails to Clinton, which were directed to her private email account, include at least a dozen detailed reports on events on the deteriorating political and security climate in Libya as well as events in other nations. They came to light after a hacker broke into Blumenthal's account and have taken on new significance in light of the disclosure that she conducted State Department and personal business exclusively over an email server that she controlled and kept secret from State Department officials and which only recently was discovered by congressional investigators,

Leaked Private Emails Reveal Ex-Clinton Aide's Secret Spy Network

Other people knew. Other people had to know.
 
Lmao, Hillary used a commercially available system. One which admittedly had pretty weak security. US diplomats have laptops connected to State Dept e-mail system. Do you know the difference between them or not? There is no moving goalposts here. You're trying to connect two issues without so much as knowing the approach used in either. So I'll ask you again: How do you hack an e-mail address having only the e-mail address? Here, I'll throw you a bone and let you in on how Hillary's e-mails were hacked:

How Unsafe Was Hillary Clinton's Secret Staff Email System?

Do you know how the approach above would be applied to a State Dept e-mail server? :) I can wait all day for this!



You can keep on waiting as I am not into the technical applications of what Hackers do. What I know is the hacker was able to Hack Blumenthal and then get to Hillary following his emails. Then he set up shop on her domain, (that's his words). Which he testified to and sent to New sources and Politicians all over the planet.

Its why he sitting in a Romanian Prison and of course now that he dropped a dime on Hillary. He will never see the light of day.

But looking to go off on another tangent still wont help you.
 
Holy jeez, how is it starting to look like Hillary gave more than just a breach of security if the two servers in question required entirely different methods of security and held completely different information? I don't think you know how this works at all. :lol:

Well Holy Cypher, the Matrix, and the One......when Hillary and her aides and others admit to using private servers and email accounts and Then when the WH gets hacked thru State Dept Computers. One does need to ask questions and starting pointing out some obvious facts that have taken place, huh?

Some will point out possible correlations.....but you would never do that, Right? :roll:
 
You can keep on waiting as I am not into the technical applications of what Hackers do.

In other words, you made a claim which you didn't know how to back up. Here, I'll help you out: the most they could do with e-mail accounts secured through SD is publish them. That's it. It is quite literally impossible to try and hack State Dept. in the same way they did Hillary's account (you would have known that if you read the link) BECAUSE THEY AREN'T EVEN REMOTELY CLOSE TO BEING THE SAME TYPE OF SECURITY SYSTEM. That's why I laughed at your absurd notion that Hillary's weak server being hacked could be used as a rebuttal to the question of how a person would go about hacking State Dept. :lol:

Now, with that stated, and seeing as you don't know the first thing about internet security (admittedly, I'm a layman myself but hell even I'm able to tell the differences between Hillary's e-mail and the State Dept's security) how would a hacker use a state dept e-mail to hack other accounts? This should be REALLY good.

What I know is the hacker was able to Hack Blumenthal and then get to Hillary following his emails. Then he set up shop on her domain, (that's his words). Which he testified to and sent to New sources and Politicians all over the planet.

Already addressed above.

Its why he sitting in a Romanian Prison and of course now that he dropped a dime on Hillary. He will never see the light of day.

But looking to go off on another tangent still wont help you.

You're trying too hard to avoid your silly claim. :lol:
 
Well Holy Cypher, the Matrix, and the One......when Hillary and her aides and others admit to using private servers and email accounts and Then when the WH gets hacked thru State Dept Computers.

Lmao, you REALLY don't know what you're talking about, do you? Did you read the link? Do you think State Dept./WH servers are running on SSL VPN? Again, these are two entirely separate attacks, they could have gotten every single e-mail address in Hillary's account and it still wouldn't be enough to hack a WH/State Dept. server. :lol:

Here, I'll do you a solid, if you ever realize the differences in these systems or for that matter how they work, if you ever admit that the information gathered is useless for anything other than phishing scams (which we can only hope State Dept. has taken measures against, you know, seeing as how even hotmail can filter them out these days), I'll provide legally available information showing you how to do what was done to Hillary's account.
 
Last edited:
I like this because it is not going to help MMC. Clinton's servers used SSL VPN, a person could have gathered every single e-mail contained in Hillary's e-mail, and they still would have been useless to a person trying to get into a State Dept server.

A hacker could easily have gained access and copied passwords. It's not about gaining access to government servers. It's about what was on hers.
 
That's total BS, he never got into Hillary's sever, if he had, he would have gotten her Emails. If he got other email accounts, he must gotten them from Blumenthal's emails.


Try again Pete.....note what it says the Romanian hacker did.


Hillary’s Secret Email Was a Cyberspy’s Dream Weapon.....

When a notorious online break-in artist got a hold of the Secretary of State’s now-infamous email address, he gave himself the power to use it to target the global elite. The private email address for Hillary Clinton, which became the talk of Washington this week and created her first major speed bump on her road to the White House, has actually been freely available on the Internet for a year, thanks to a colorful Romanian hacker known as Guccifer.

On March 14, 2013, Guccifer—his real name is Marcel-Lehel Lazar—broke into the AOL account of Sidney Blumenthal, a journalist, former White House aide to Bill Clinton, and personal confidante of Hillary Clinton. Lazar crowed about his exploits to journalists, disclosing a set of memos Blumenthal had written to Clinton in 2012, as well as the personal email address and domain she’s now known to have used exclusively for her personal and official correspondence. Few journalists noticed that at the time, and it caused no ruckus in Washington. But the fact that Clinton’s private email was now public means she was not just putting her own information at risk, but potentially those in the circle of people who knew her private address.

Her email account was the ultimate hacker’s lure. It’s a common technique to impersonate a trusted source via email, in order to persuade a recipient to download spyware hidden inside seemingly innocuous attachments. Indeed, Clinton’s own staff had been targeted with such highly targeted “spear phishing” emails as early as 2009, the year she took office. And according to U.S. authorities, Lazar, who’s now serving a seven-year prison sentence in Romania and is accused of hacking the accounts of other Washington notables like Colin Powell, did commandeer other people’s email accounts . Then he used them to send messages exposing the private correspondence of his other victims. Before Lazar exposed the email domain, it would have been known to people with whom Clinton was trading emails, as well as to a tight inner circle lucky enough to be given @clintonemail.com accounts. Those included Clinton’s daughter, Chelsea, and aide Huma Abedin, whom the former secretary treats like family. Maybe Clinton and her staff thought the relative anonymity of her email domain would have given her a measure of security. It’s hard to say, since they and State Department officials have consistently refused to answer journalists questions about what security measures Clinton took to protect her “homebrew” email system......


Hillary
 
Lmao, you REALLY don't know what you're talking about, do you? Did you read the link? Do you think State Dept./WH servers are running on SSL VPN? Again, these are two entirely separate attacks, they could have gotten every single e-mail address in Hillary's account and it still wouldn't be enough to hack a WH/State Dept. server. :lol:

Here, I'll do you a solid, if you ever realize the differences in these systems or for that matter how they work, if you ever admit that the information gathered is useless for anything other than phishing scams (which we can only hope State Dept. has taken measures against, you know, seeing as how even hotmail can filter them out these days), I'll provide legally available information showing you how to do what was done to Hillary's account.


Here I will do you one too. ;)

What do you think of his method? What do you think about it all going back to State and the year Hillary Started.


Her email account was the ultimate hacker’s lure. It’s a common technique to impersonate a trusted source via email, in order to persuade a recipient to download spyware hidden inside seemingly innocuous attachments. Indeed, Clinton’s own staff had been targeted with such highly targeted “spear phishing” emails as early as 2009, the year she took office......snip~

Hillary
 
A hacker could easily have gained access and copied passwords. It's not about gaining access to government servers. It's about what was on hers.

Copied passwords for what? State Dept. e-mails accounts? LMAO, THAT'S NOT HOW STATE DEPT. SERVERS WORK. Have you ever worked for a corporation in any position? Do you have a Facebook account? Because you're basically saying that the State Dept. has ****tier security than the average company, but only slightly better security than your personal Facebook account. Hillary's e-mail servers were unsecured, yes, that's easy enough to admit. However the leap of faith you're making in regards to any of the information that could be obtained ignores what is technically possible in the first place. It's like saying that if you can understand arithmetic, you can build a space rocket.
 
Here I will do you one too. ;)

What do you think of his method? What do you think about it all going back to State and the year Hillary Started.

What do I think of the method used for Clinton? It's script kiddie stuff that wouldn't even make it past the State Dept's first line of defence. Do you know why? :) I'll give you a clue, it has something to do with SSL VPN. :lol:
 
In other words, you made a claim which you didn't know how to back up. Here, I'll help you out: the most they could do with e-mail accounts secured through SD is publish them. That's it. It is quite literally impossible to try and hack State Dept. in the same way they did Hillary's account (you would have known that if you read the link) BECAUSE THEY AREN'T EVEN REMOTELY CLOSE TO BEING THE SAME TYPE OF SECURITY SYSTEM. That's why I laughed at your absurd notion that Hillary's weak server being hacked could be used as a rebuttal to the question of how a person would go about hacking State Dept. :lol:

Now, with that stated, and seeing as you don't know the first thing about internet security (admittedly, I'm a layman myself but hell even I'm able to tell the differences between Hillary's e-mail and the State Dept's security) how would a hacker use a state dept e-mail to hack other accounts? This should be REALLY good.



Already addressed above.



You're trying too hard to avoid your silly claim. :lol:



No not quite, actually I was looking for the posts about Hillary's email and server and how that hacker did what he said he did. None doubt his word for some reason.


Then he used them to send messages exposing the private correspondence of his other victims. Before Lazar exposed the email domain, it would have been known to people with whom Clinton was trading emails, as well as to a tight inner circle lucky enough to be given @clintonemail.com accounts. Those included Clinton’s daughter, Chelsea, and aide Huma Abedin, whom the former secretary treats like family. Maybe Clinton and her staff thought the relative anonymity of her email domain would have given her a measure of security. It’s hard to say, since they and State Department officials have consistently refused to answer journalists questions about what security measures Clinton took to protect her “homebrew” email system......snip~

Hillary
 
What do I think of the method used for Clinton? It's script kiddie stuff that wouldn't even make it past the State Dept's first line of defence. Do you know why? :) I'll give you a clue, it has something to do with SSL VPN. :lol:

Seems the phising and bait was going on at the State Dept from 2009 until now. Plus they know the Romanian Hacker left his signature. You did note how he got it from Blumenthal and then took whatever from Clinton.


22.jpg


Btw way.....they do know she is discussing Classified Information with someone that has no Security Clearance. Kinda of like Petraeus But worse.


Leaked Private Emails Reveal Ex-Clinton Aide's Secret Spy Network......

Starting weeks before Islamic militants attacked the U.S. diplomatic outpost in Benghazi, Libya, longtime Clinton family confidante Sidney Blumenthal supplied intelligence to then Secretary of State Hillary Clinton gathered by a secret network that included a former CIA clandestine service officer, according to hacked emails from Blumenthal's account. The emails, which were posted on the internet in 2013, also show that Blumenthal and another close Clinton associate discussed contracting with a retired Army special operations commander to put operatives on the ground near the Libya-Tunisia border while Libya's civil war raged in 2011.

Blumenthal's emails to Clinton, which were directed to her private email account, include at least a dozen detailed reports on events on the deteriorating political and security climate in Libya as well as events in other nations. They came to light after a hacker broke into Blumenthal's account and have taken on new significance in light of the disclosure that she conducted State Department and personal business exclusively over an email server that she controlled and kept secret from State Department officials and which only recently was discovered by congressional investigators,

In one exchange in March 2013, Blumenthal emailed Drumheller, "Thanks. Can you send Libya report." Drumheller replied, "Here it is, pls do not share it with Cody. I don't want moin speculating on sources. It is on the Maghreb and Libya." Cody is Cody Shearer, a longtime Clinton family operative—his brother was an ambassador under Bill Clinton and his now-deceased sister was married to Clinton State Department official Strobe Talbott—who was in close contact with Blumenthal. While it's not entirely clear from the documents, "Moin" may refer to the nickname of Mohamed Mansour El Kikhia, a member of the Kikhia family, a prominent Libyan clan with ties to the Libyan National Transition Council. (An email address in Blumenthal's address book, which was also leaked, was associated with his Facebook page.).....snip~

http://gawker.com/leaked-private-emails-reveal-ex-clinton-aides-secret-sp-1694112647
 
Last edited:
Copied passwords for what? State Dept. e-mails accounts? LMAO, THAT'S NOT HOW STATE DEPT. SERVERS WORK. Have you ever worked for a corporation in any position? Do you have a Facebook account? Because you're basically saying that the State Dept. has ****tier security than the average company, but only slightly better security than your personal Facebook account. Hillary's e-mail servers were unsecured, yes, that's easy enough to admit. However the leap of faith you're making in regards to any of the information that could be obtained ignores what is technically possible in the first place. It's like saying that if you can understand arithmetic, you can build a space rocket.

You're entirely missing the point. A hacker doesn't need access to State dept servers if they're interested in Hillary's, which had no security for a full three months. During that time a hacker could obtain enough information to allow continued access even after encryption was installed and a certificate obtained. That's no big technical feat at all.
 
And you believe Iran. Brace for irony...



Why do you believe the Iranian regime? Do you also ascribe to their claims regarding republican presidents?


hahaha

So that wasn't the drone ? Really ?

The Iranian Government built a decoy after the US Government acknowledged in 2011 that we lost a drone over Iran ?

If that wasn't the drone then why on December 12 2011 did the American Government request that it be returned ?

Its pretty clear you haven't looked into this issue at all. Would it kill you to take a whole 5 minutes and Google it ?
 
No not quite, actually I was looking for the posts about Hillary's email and server and how that hacker did what he said he did. None doubt his word for some reason.


Then he used them to send messages exposing the private correspondence of his other victims. Before Lazar exposed the email domain, it would have been known to people with whom Clinton was trading emails, as well as to a tight inner circle lucky enough to be given @clintonemail.com accounts. Those included Clinton’s daughter, Chelsea, and aide Huma Abedin, whom the former secretary treats like family. Maybe Clinton and her staff thought the relative anonymity of her email domain would have given her a measure of security. It’s hard to say, since they and State Department officials have consistently refused to answer journalists questions about what security measures Clinton took to protect her “homebrew” email system......snip~

Hillary

It's almost like you don't know what you're talking about and it becomes clear whenever you post your blocks of text not knowing what they say:

Hillary

On March 14, 2013, Guccifer—his real name is Marcel-Lehel Lazar—broke into the AOL account of Sidney Blumenthal, a journalist, former White House aide to Bill Clinton, and personal confidante of Hillary Clinton. Lazar crowed about his exploits to journalists, disclosing a set of memos Blumenthal had written to Clinton in 2012, as well as the personal email address and domain she’s now known to have used exclusively for her personal and official correspondence.

He broke into an e-mail account which can be broken into using a basic brute force attacks. Yep, sounds like a script kiddie.

Her email account was the ultimate hacker’s lure. It’s a common technique to impersonate a trusted source via email, in order to persuade a recipient to download spyware hidden inside seemingly innocuous attachments. Indeed, Clinton’s own staff had been targeted with such highly targeted “spear phishing” emails as early as 2009, the year she took office. And according to U.S. authorities, Lazar, who’s now serving a seven-year prison sentence in Romania and is accused of hacking the accounts of other Washington notables like Colin Powell, did commandeer other people’s email accounts. Then he used them to send messages exposing the private correspondence of his other victims.

He then used social engineering and spyware. Wow, that would definitely NOT get you into a State Dept. server. It's almost like you can't really explain how one relates to the other so you're trying your hardest to try and connect the two.
 
You're entirely missing the point. A hacker doesn't need access to State dept servers if they're interested in Hillary's, which had no security for a full three months. During that time a hacker could obtain enough information to allow continued access even after encryption was installed and a certificate obtained. That's no big technical feat at all.

Do you recognize what this thread is about? It's about hacking a State Dept. server supposedly, somehow related to Hillary's weak security (as admitted by the OP) even though, one attack simply can't make the other possible.
 
So that wasn't the drone ? Really ?

The Iranian Government built a decoy after the US Government acknowledged in 2011 that we lost a drone over Iran ?

If that wasn't the drone then why on December 12 2011 did the American Government request that it be returned ?

Its pretty clear you haven't looked into this issue at all. Would it kill you to take a whole 5 minutes and Google it ?

Was it 10 missiles being launched or 2? Was it an 'advanced fighter' or cardboard? Did Isreal flood a Palestinian neighborhood with sewage? All of these lies have been perpetrated by the Iranian regime.

If you get your information from Iran, there's no helping you. My contention is with your using them as a source.
 
Back
Top Bottom