[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Utopian Visionaries Who Won’t Leave People Alone

No - no - no Ain'T going To get away with iT

Pete Buttplug's Butt Plugger Trying to Turn Kids into Faggots

Mark Levin: I'm sick and tired of these attacks

Questioning the Big Bang

James Webb Data Contradicts the Big Bang

Pssst! Don't tell the creationists, but scientists don't have a clue how life began

A fine romance: how humans and chimps just couldn't let go

Early humans had sex with chimps

O’Keefe dons bulletproof vest to extract undercover journalist from NGO camp.

Biblical Contradictions (Alleged)

Catholic Church Praising Lucifer

Raising the Knife

One Of The HARDEST Videos I Had To Make..

Houthi rebels' attack severely damages a Belize-flagged ship in key strait leading to the Red Sea (British Ship)

Chinese Illegal Alien. I'm here for the moneuy

Red Tides Plague Gulf Beaches

Tucker Carlson calls out Nikki Haley, Ben Shapiro, and every other person calling for war:

{Are there 7 Deadly Sins?} I’ve heard people refer to the “7 Deadly Sins,” but I haven’t been able to find that sort of list in Scripture.

Abomination of Desolation | THEORY, BIBLE STUDY

Bible Help

Libertysflame Database Updated

Crush EVERYONE with the Alien Gambit!

Vladimir Putin tells Tucker Carlson US should stop arming Ukraine to end war

Putin hints Moscow and Washington in back-channel talks in revealing Tucker Carlson interview

Trump accuses Fulton County DA Fani Willis of lying in court response to Roman's motion

Mandatory anti-white racism at Disney.

Iceland Volcano Erupts For Third Time In 2 Months, State Of Emergency Declared

Tucker Carlson Interview with Vladamir Putin

How will Ar Mageddon / WW III End?

What on EARTH is going on in Acts 16:11? New Discovery!

2023 Hottest in over 120 Million Years

2024 and beyond in prophecy

Questions

This Speech Just Broke the Internet

This AMAZING Math Formula Will Teach You About God!

The GOSPEL of the ALIENS | Fallen Angels | Giants | Anunnaki

The IMAGE of the BEAST Revealed (REV 13) - WARNING: Not for Everyone

WEF Calls for AI to Replace Voters: ‘Why Do We Need Elections?’

The OCCULT Burger king EXPOSED

PANERA BREAD Antichrist message EXPOSED

The OCCULT Cheesecake Factory EXPOSED

Satanist And Witches Encounter The Cross

History and Beliefs of the Waldensians

Rome’s Persecution of the Bible

Evolutionists, You’ve Been Caught Lying About Fossils

Raw Streets of NYC Migrant Crisis that they don't show on Tv

Meet DarkBERT - AI Model Trained On DARK WEB

[NEW!] Jaw-dropping 666 Discovery Utterly Proves the King James Bible is God's Preserved Word

ALERT!!! THE MOST IMPORTANT INFORMATION WILL SOON BE POSTED HERE


Status: Not Logged In; Sign In

United States News
See other United States News Articles

Title: Where's The Media? A BOMBSHELL Is Being Ignored!
Source: market-ticker,org
URL Source: https://market-ticker.org/akcs-www?post=231606
Published: Nov 2, 2016
Author: Karl Denninger
Post Date: 2016-11-02 16:38:44 by nolu chan
Keywords: None
Views: 345
Comments: 3

https://market-ticker.org/akcs-www?post=231606

Where's The Media? A BOMBSHELL Is Being Ignored!

2016-11-01 11:33
by Karl Denninger
in Editorial

So you want to talk to Mark Cuban on the latest Hillary email thing eh?

You ought to try someone with a bit of credibility. You see, Mark Cuban is not ignorant and his appearance this morning on CNBC did not contain "mistakes."

He was lying.

This "newly discovered" laptop is very likely to be literal nuclear waste for Hillary and everyone around her, including the Clinton Foundation and all of Hillary's "advisers" such as Podesta.

Mark Cuban said that Huma used Outlook and IMAP (for Yahoo and similar.) True.

But then he said this was unlikely to lead to "new" evidence in the form of the emails.

That's a lie.

It's a lie because Cuban knows he's full of crap; he knows enough about the technologies involved to be fully aware that he was peddling nonsense.

IMAP and Exchange are email protocols. (So is POP3, but that's pretty much deprecated everywhere for good reason.) Exchange, when available, is often preferred by business people because it syncs not just email but also calendars and contact lists, which can (and does) include both phone numbers and email addresses.

IMAP is typically used by clients like Thunderbird because it doesn't know to speak Exchange. There's a plug-in for calendars using the davical protocol and another (the SoGo connector) for contacts, but no integrated Exchange support.

Outlook can use IMAP, but where the server supports it (like Clinton's "homebrewed" email server) Exchange would normally be used instead as a preferred choice. It both does more and also does a far better job of threading conversations (which is very convenient) and thus is almost-always preferred when it is available.

Here's the problem for the Clintons: Both of these protocols will sync any folder they are told to monitor and can be told to pull local copies of emails. By default both will typically do so on a desktop or laptop environment because WiFi is usually available and it has enough bandwidth to make that efficient. Mobile devices sometimes are configured to only grab email headers by default but increasingly, with 4g service, they're set up to get full messages too, sometimes including all attachments.

The reason to do this is that it is a lot faster to search messages locally than over the wire, and it's convenient to be able to search messages. In addition pulling full copies (including attachments) allows you to work offline (when there's no WiFi or other network available), and then re-sync when you get back in range.

Here's the problem for Hillary -- when the server had emails deleted and then was "Bleached" it had already been taken offline and was never returned to service. As such the laptop client would have been unable to connect back to it and thus it would never be told to remove anything.

Without that machine (Weiner's laptop) being under remote administration such as Domain Policy control (which we can reasonably assume it was not as Huma claims "she didn't know about it" and it was allegedly a private laptop) there is no remote capability to wipe or otherwise get into said computer and remove the emails either. In fact there's a decent chance it's running an operating system edition (if Windows) that lacks domain control capability entirely.

This means that the odds are extremely high that all of the deleted emails to which Huma was a participant are on that computer.

Every.
Single.
One.

If that examination shows that work product, or worse, classified information was sent and/or received and the evidence intentionally destroyed via the "Bleachbit" process then everyone involved is cooked. Remember, the claim was that the emails deleted were nothing more than yoga chat and similar; all "personal" content that the government had no right to and implicated no national security interest. Further, Huma claimed twice (once during her exit from State, and again under oath when questioned) that she had turned over all devices that might or did have US Government work product on them and had retained no copies.

If that is proved to be a lie, or worse, proof of felony conduct such as influence peddling or (God forbid for them) something like the rumored link to Epstein's Lolita Express is found in those archives then a whole bunch of people are going straight to prison not only on the original acts evidenced in the emails themselves but also on felony obstruction of justice and perjury charges.

Yes, folks, this is a very big deal because it is the first discovery of a computer that appears to have been sync'd against the Clinton server but was neither tampered with or destroyed, and thus it likely contains all of the pertinent evidence to which Huma was a part.

I argue that the media is lying and soliciting others to lie. Mark Cuban knows all of this as he's well-aware of how email works on the Internet. I'm aware of it too, having run an ISP during the early 1990s, having run corporate, personal and ISP-level email servers both before and since up to and including the present day, and I can confidently state that unless someone took affirmative action to alter the record the odds are extremely high that every single email chain Huma participated in is likely on that laptop, whether Hillary and her friends tried to delete it or not.

I'm a subject matter expert in this regard folks.

Yeah, CNBC, I'm not your biggest fan. But you (and the rest of the media) know damn well I can get to a studio in about an hour and a half and if you call I will be happy to don a suit (ok, at least the top half that the camera can see) and scoot on over to correct the record from a technical level on exactly what has been found and what is likely now in both the FBI's and the NY State Police/NYPD's hands.

Consider this an open invite to any of the MSM folks to do exactly that; you folks all still have my phone number and I can only conclude it hasn't rung because you are not interested in the truth from someone who has the technical competence to explain it to your viewers.

Report the news, media wonks, instead of trying to shape it.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: All (#0)

https://market-ticker.org/akcs-www?singlepost=3412501

Where's The Media? A BOMBSHELL Is Being Ignored!;

entered at 2016-11-01 12:26:12
Mtdm

I agree 1000% with all your conclusions, nothing I'm about to say changes any of that.

One observation, however, which is in part a cautionary tale for others who use Exchange/Activesync connections, and in part serves to reinforce (ever so slightly) your present story:

Quote:

Without that machine (Weiner's laptop) being under remote administration such as Domain Policy control (which we can reasonably assume it was not as Huma claims "she didn't know about it" and it was allegedly a private laptop) there is no remote capability to wipe or otherwise get into said computer and remove the emails either. In fact there's a decent chance it's running an operating system edition (if Windows) that lacks domain control capability entirely.

Suprisingly, (and disturbingly, in a BYOD world,) it turns out that modern Exchange clients, even non-Microsoft ones, do include significant backdoor MDM. For example: you may be aware that connecting an iOS device using the Apple Mail app to an Activesync connection provides the ability for the Exchange server to specify some device restrictions, such as minimum passcode length, maximum passcode age before passcode must be changed, etc. However what is less obvious, is that by the mere act of connecting your Apple Mail app to an Exchange server in this way, you have given away sufficient privilege to that server that it can now instruct a full wipe of your *entire device*, not just the local copy of the emails in that email account. (There is no pop-up to inform/warn you of this when configuring the Mail client, etc.)

Now, this is of course entirely moot on a going-forward basis in the current circumstance, because of either/both: (i) the laptop is offline and FBI already have forensic copies of the evidence without such a wipe having been instructed (self-evidently); (ii) assuming, as seems to be the case, that the Exchange server has indeed been completely torn down and is not able to be resurrected without raising a ton of red flags, they no longer have any easy way to instruct such a wipe on any other devices which may still exist out there, even if such a device were still online and attempting to connect to it.

So why am I mentioning all this? Well, it lends further credence to the notion that: the IT staff involved here were all a bunch of amateurs AND/OR were rushing to completion and sacrificing quality for speed (which clearly points to an intent to tamper/destroy/defraud before "it's too late") AND/OR perhaps, for whatever reason, they knew/intended that there would be copies left lying around. If a reasonably competent person were tasked with cleaning up that server, and purging some or all of the content, (and assuming they intended to do so, competently,) I put it to you that one of the very first and most important steps which they would have taken would be to use all available logging to identify the set of devices which had been connecting to the server and might have retained copies, so that those devices could be addressed comprehensively, with any and all of the tools at their disposal.

In sum, it is indeed hard to countenance any other explanation for this whole mess, than that many people were involved in a massive conspiracy to hide or destroy evidence.

I look forward to some honesty and plain speaking from any element of the MSM in this regard, but have no confidence that this will happen.

2016-11-01 12:26:12
Comment by Mtdm

nolu chan  posted on  2016-11-02   16:39:30 ET  Reply   Trace   Private Reply  


#2. To: nolu chan (#0)

Where's The Media? A BOMBSHELL Is Being Ignored!

The biggest bombshell is Hillary and Obama's use of our military to establish an aggressive islamic jihadist caliphate in Libya. Nothing has been mentioned about it.

rlk  posted on  2016-11-04   11:23:51 ET  Reply   Trace   Private Reply  


#3. To: rlk (#2)

The biggest bombshell is Hillary and Obama's use of our military to establish an aggressive islamic jihadist caliphate in Libya. Nothing has been mentioned about it.

“All serious analysts know, and even the US government has agreed, that some Saudi figures have been supporting ISIS and funding ISIS, but the dodge has always been that it is some “rogue” princes using their oil money to do whatever they like, but actually the government disapproves. But that email says that it is the government of Saudi Arabia, and the government of Qatar that have been funding ISIS.”

WIKILEAKS 3774 - the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region

https://wikileaks.org/podesta-emails/emailid/3774

Congrats!

From: john.podesta@gmail.com
To: hrod17@clintonemail.com
Date: 2014-09-27 15:15
Subject: Congrats!

Send our love to Chelsea, Marc and Grandpa. Can't wait to meet Charlotte.

On Aug 19, 2014 9:22 AM, "H" wrote:

Agree but there may be opportunities as the Iraqi piece improves.

Also, any idea whose fighters attacked Islamist positions in Tripoli, Libya? Worth analyzing for future purposes.

*From*: John Podesta [mailto:john.podesta@gmail.com]
*Sent*: Tuesday, August 19, 2014 09:19 AM
*To*: H
*Subject*: Re: Here's what I mentioned

Hit send too soon. Meant to say Syria elements are vexing.

On Aug 19, 2014 9:17 AM, "John Podesta" wrote:

I think we are headed down this path in Iraq, but the Syria elements are

On Aug 17, 2014 3:50 PM, "H" wrote:

Note: Sources include Western intelligence, US intelligence and sources in the region.

1. With all of its tragic aspects, the advance of ISIL through Iraq gives the U.S. Government an opportunity to change the way it deals with the chaotic security situation in North Africa and the Middle East. The most important factor in this matter is to make use of intelligence resources and Special Operations troops in an aggressive manner, while avoiding the old school solution, which calls for more traditional military operations. In Iraq it is important that we engage ISIL using the resources of the Peshmerga fighters of the Kurdish Regional Government (KRG), and what, if any, reliable units exist in the Iraqi Army. The Peshmerga commanders are aggressive hard fighting troops, who have long standing relationships with CIA officers and Special Forces operators. However, they will need the continued commitment of U.S. personnel to work with them as advisors and strategic planners, the new generation of Peshmerga commanders being largely untested in traditional combat. That said, with this U.S. aid the Kurdish troops can inflict a real defeat on ISIL.

2. It is important that once we engage ISIL, as we have now done in a limited manner, we and our allies should carry on until they are driven back suffering a tangible defeat. Anything short of this will be seen by other fighters in the region, Libya, Lebanon, and even Jordan, as an American defeat. However, if we provide advisors and planners, as well as increased close air support for the Peshmerga, these soldiers can defeat ISIL. They will give the new Iraqi Government a chance to organize itself, and restructure the Sunni resistance in Syria, moving the center of power toward moderate forces like the Free Syrian Army (FSA). In addition to air support, the Peshmerga also need artillery and armored vehicles to deal with the tanks and other heavy equipment captured from the Iraqi army by ISIL.

3. In the past the USG, in an agreement with the Turkish General Staff, did not provide such heavy weapons to the Peshmerga, out of a concern that they would end up in the hands of Kurdish rebels inside of Turkey. The current situation in Iraq, not to mention the political environment in Turkey, makes this policy obsolete. Also this equipment can now be airlifted directly into the KRG zone.

4. Armed with proper equipment, and working with U.S. advisors, the Peshmerga can attack the ISIL with a coordinated assault supported from the air. This effort will come as a surprise to the ISIL, whose leaders believe we will always stop with targeted bombing, and weaken them both in Iraq and inside of Syria. At the same time we should return to plans to provide the FSA, or some group of moderate forces, with equipment that will allow them to deal with a weakened ISIL, and stepped up operations against the Syrian regime. This entire effort should be done with a low profile, avoiding the massive traditional military operations that are at best temporary solutions. While this military/para-military operation is moving forward, we need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region. This effort will be enhanced by the stepped up commitment in the KRG. The Qataris and Saudis will be put in a position of balancing policy between their ongoing competition to dominate the Sunni world and the consequences of serious U.S. pressure. By the same token, the threat of similar, realistic U.S. operations will serve to assist moderate forces in Libya, Lebanon, and even Jordan, where insurgents are increasingly fascinated by the ISIL success in Iraq.

6. In the end the situation in Iraq is merely the latest and most dangerous example of the regional restructuring that is taking place across North Africa, all the way to the Turkish border. These developments are important to the U.S. for reasons that often differ from country to country: energy and moral commitment to Iraq, energy issues in Libya, and strategic commitments in Jordan. At the same time, as Turkey moves toward a new, more serious Islamic reality, it will be important for them to realize that we are willing to take serious actions, which can be sustained to protect our national interests. This course of action offers the potential for success, as opposed to large scale, traditional military campaigns, that are too expensive and awkward to maintain over time.

7. (Note: A source in Tripoli stated in confidence that when the U.S. Embassy was evacuated, the presence of two U.S. Navy jet fighters over the city brought all fighting to a halt for several hours, as Islamist forces were not certain that these aircraft would not also provide close ground support for moderate government forces.)

8. If we do not take the changes needed to make our security policy in the region more realistic, there is a real danger of ISIL veterans moving on to other countries to facilitate operations by Islamist forces. This is already happening in Libya and Egypt, where fighters are returning from Syria to work with local forces. ISIL is only the latest and most violent example of this process. If we don’t act to defeat them in Iraq something even more violent and dangerous will develop. Successful military operations against these very irregular but determined forces can only be accomplished by making proper use of clandestine/special operations resources, in coordination with airpower, and established local allies. There is, unfortunately, a narrow window of opportunity on this issue, as we need to act before an ISIL state becomes better organized and reaches into Lebanon and Jordan.

9. (Note: It is important to keep in mind that as a result of this policy there probably will be concern in the Sunni regions of Iraq and the Central Government regarding the possible expansion of KRG controlled territory. With advisors in the Peshmerga command we can reassure the concerned parties that, in return for increase autonomy, the KRG will not exclude the Iraqi Government from participation in the management of the oil fields around Kirkuk, and the Mosel Dam hydroelectric facility. At the same time we will be able to work with the Peshmerga as they pursue ISIL into disputed areas of Eastern Syria, coordinating with FSA troops who can move against ISIL from the North. This will make certain Basher al Assad does not gain an advantage from these operations. Finally, as it now appears the U.S. is considering a plan to offer contractors as advisors to the Iraqi Ministry of Defense, we will be in a position to coordinate more effectively between the Peshmerga and the Iraqi Army.)

nolu chan  posted on  2016-11-04   12:01:16 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com