[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Mail] [Sign-in] [Setup] [Help] [Register]
Status: Not Logged In; Sign In
United States News Title: Where's The Media? A BOMBSHELL Is Being Ignored! https://market-ticker.org/akcs-www?post=231606 Where's The Media? A BOMBSHELL Is Being Ignored! 2016-11-01 11:33 So you want to talk to Mark Cuban on the latest Hillary email thing eh? You ought to try someone with a bit of credibility. You see, Mark Cuban is not ignorant and his appearance this morning on CNBC did not contain "mistakes." He was lying. This "newly discovered" laptop is very likely to be literal nuclear waste for Hillary and everyone around her, including the Clinton Foundation and all of Hillary's "advisers" such as Podesta. Mark Cuban said that Huma used Outlook and IMAP (for Yahoo and similar.) True. But then he said this was unlikely to lead to "new" evidence in the form of the emails. That's a lie. It's a lie because Cuban knows he's full of crap; he knows enough about the technologies involved to be fully aware that he was peddling nonsense. IMAP and Exchange are email protocols. (So is POP3, but that's pretty much deprecated everywhere for good reason.) Exchange, when available, is often preferred by business people because it syncs not just email but also calendars and contact lists, which can (and does) include both phone numbers and email addresses. IMAP is typically used by clients like Thunderbird because it doesn't know to speak Exchange. There's a plug-in for calendars using the davical protocol and another (the SoGo connector) for contacts, but no integrated Exchange support. Outlook can use IMAP, but where the server supports it (like Clinton's "homebrewed" email server) Exchange would normally be used instead as a preferred choice. It both does more and also does a far better job of threading conversations (which is very convenient) and thus is almost-always preferred when it is available. Here's the problem for the Clintons: Both of these protocols will sync any folder they are told to monitor and can be told to pull local copies of emails. By default both will typically do so on a desktop or laptop environment because WiFi is usually available and it has enough bandwidth to make that efficient. Mobile devices sometimes are configured to only grab email headers by default but increasingly, with 4g service, they're set up to get full messages too, sometimes including all attachments. The reason to do this is that it is a lot faster to search messages locally than over the wire, and it's convenient to be able to search messages. In addition pulling full copies (including attachments) allows you to work offline (when there's no WiFi or other network available), and then re-sync when you get back in range. Here's the problem for Hillary -- when the server had emails deleted and then was "Bleached" it had already been taken offline and was never returned to service. As such the laptop client would have been unable to connect back to it and thus it would never be told to remove anything. Without that machine (Weiner's laptop) being under remote administration such as Domain Policy control (which we can reasonably assume it was not as Huma claims "she didn't know about it" and it was allegedly a private laptop) there is no remote capability to wipe or otherwise get into said computer and remove the emails either. In fact there's a decent chance it's running an operating system edition (if Windows) that lacks domain control capability entirely. This means that the odds are extremely high that all of the deleted emails to which Huma was a participant are on that computer. Every. If that examination shows that work product, or worse, classified information was sent and/or received and the evidence intentionally destroyed via the "Bleachbit" process then everyone involved is cooked. Remember, the claim was that the emails deleted were nothing more than yoga chat and similar; all "personal" content that the government had no right to and implicated no national security interest. Further, Huma claimed twice (once during her exit from State, and again under oath when questioned) that she had turned over all devices that might or did have US Government work product on them and had retained no copies. If that is proved to be a lie, or worse, proof of felony conduct such as influence peddling or (God forbid for them) something like the rumored link to Epstein's Lolita Express is found in those archives then a whole bunch of people are going straight to prison not only on the original acts evidenced in the emails themselves but also on felony obstruction of justice and perjury charges. Yes, folks, this is a very big deal because it is the first discovery of a computer that appears to have been sync'd against the Clinton server but was neither tampered with or destroyed, and thus it likely contains all of the pertinent evidence to which Huma was a part. I argue that the media is lying and soliciting others to lie. Mark Cuban knows all of this as he's well-aware of how email works on the Internet. I'm aware of it too, having run an ISP during the early 1990s, having run corporate, personal and ISP-level email servers both before and since up to and including the present day, and I can confidently state that unless someone took affirmative action to alter the record the odds are extremely high that every single email chain Huma participated in is likely on that laptop, whether Hillary and her friends tried to delete it or not. I'm a subject matter expert in this regard folks. Yeah, CNBC, I'm not your biggest fan. But you (and the rest of the media) know damn well I can get to a studio in about an hour and a half and if you call I will be happy to don a suit (ok, at least the top half that the camera can see) and scoot on over to correct the record from a technical level on exactly what has been found and what is likely now in both the FBI's and the NY State Police/NYPD's hands. Consider this an open invite to any of the MSM folks to do exactly that; you folks all still have my phone number and I can only conclude it hasn't rung because you are not interested in the truth from someone who has the technical competence to explain it to your viewers. Report the news, media wonks, instead of trying to shape it. Post Comment Private Reply Ignore Thread Top Page Up Full Thread Page Down Bottom/Latest Begin Trace Mode for Comment # 1.
#1. To: All (#0)
https://market-ticker.org/akcs-www?singlepost=3412501 Where's The Media? A BOMBSHELL Is Being Ignored!; entered at 2016-11-01 12:26:12 I agree 1000% with all your conclusions, nothing I'm about to say changes any of that. One observation, however, which is in part a cautionary tale for others who use Exchange/Activesync connections, and in part serves to reinforce (ever so slightly) your present story: Quote: Suprisingly, (and disturbingly, in a BYOD world,) it turns out that modern Exchange clients, even non-Microsoft ones, do include significant backdoor MDM. For example: you may be aware that connecting an iOS device using the Apple Mail app to an Activesync connection provides the ability for the Exchange server to specify some device restrictions, such as minimum passcode length, maximum passcode age before passcode must be changed, etc. However what is less obvious, is that by the mere act of connecting your Apple Mail app to an Exchange server in this way, you have given away sufficient privilege to that server that it can now instruct a full wipe of your *entire device*, not just the local copy of the emails in that email account. (There is no pop-up to inform/warn you of this when configuring the Mail client, etc.) Now, this is of course entirely moot on a going-forward basis in the current circumstance, because of either/both: (i) the laptop is offline and FBI already have forensic copies of the evidence without such a wipe having been instructed (self-evidently); (ii) assuming, as seems to be the case, that the Exchange server has indeed been completely torn down and is not able to be resurrected without raising a ton of red flags, they no longer have any easy way to instruct such a wipe on any other devices which may still exist out there, even if such a device were still online and attempting to connect to it. So why am I mentioning all this? Well, it lends further credence to the notion that: the IT staff involved here were all a bunch of amateurs AND/OR were rushing to completion and sacrificing quality for speed (which clearly points to an intent to tamper/destroy/defraud before "it's too late") AND/OR perhaps, for whatever reason, they knew/intended that there would be copies left lying around. If a reasonably competent person were tasked with cleaning up that server, and purging some or all of the content, (and assuming they intended to do so, competently,) I put it to you that one of the very first and most important steps which they would have taken would be to use all available logging to identify the set of devices which had been connecting to the server and might have retained copies, so that those devices could be addressed comprehensively, with any and all of the tools at their disposal. In sum, it is indeed hard to countenance any other explanation for this whole mess, than that many people were involved in a massive conspiracy to hide or destroy evidence. I look forward to some honesty and plain speaking from any element of the MSM in this regard, but have no confidence that this will happen. 2016-11-01 12:26:12
There are no replies to Comment # 1. End Trace Mode for Comment # 1.
Top Page Up Full Thread Page Down Bottom/Latest |
[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Mail] [Sign-in] [Setup] [Help] [Register]
|