[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

[FULL VIDEO] Police release bodycam footage of Monroe County District Attorney Sandra Doorley traffi

Police clash with pro-Palestine protesters on Ohio State University campus

Joe Rogan Experience #2138 - Tucker Carlson

Police Dispersing Student Protesters at USC - Breaking News Coverage (College Protests)

What Passover Means For The New Testament Believer

Are We Closer Than Ever To The Next Pandemic?

War in Ukraine Turns on Russia

what happened during total solar eclipse

Israel Attacks Iran, Report Says - LIVE Breaking News Coverage

Earth is Scorched with Heat

Antiwar Activists Chant ‘Death to America’ at Event Featuring Chicago Alderman

Vibe Shift

A stream that makes the pleasant Rain sound.

Older Men - Keep One Foot In The Dark Ages

When You Really Want to Meet the Diversity Requirements

CERN to test world's most powerful particle accelerator during April's solar eclipse

Utopian Visionaries Who Won’t Leave People Alone

No - no - no Ain'T going To get away with iT

Pete Buttplug's Butt Plugger Trying to Turn Kids into Faggots

Mark Levin: I'm sick and tired of these attacks

Questioning the Big Bang

James Webb Data Contradicts the Big Bang

Pssst! Don't tell the creationists, but scientists don't have a clue how life began

A fine romance: how humans and chimps just couldn't let go

Early humans had sex with chimps

O’Keefe dons bulletproof vest to extract undercover journalist from NGO camp.

Biblical Contradictions (Alleged)

Catholic Church Praising Lucifer

Raising the Knife

One Of The HARDEST Videos I Had To Make..

Houthi rebels' attack severely damages a Belize-flagged ship in key strait leading to the Red Sea (British Ship)

Chinese Illegal Alien. I'm here for the moneuy

Red Tides Plague Gulf Beaches

Tucker Carlson calls out Nikki Haley, Ben Shapiro, and every other person calling for war:

{Are there 7 Deadly Sins?} I’ve heard people refer to the “7 Deadly Sins,” but I haven’t been able to find that sort of list in Scripture.

Abomination of Desolation | THEORY, BIBLE STUDY

Bible Help

Libertysflame Database Updated

Crush EVERYONE with the Alien Gambit!

Vladimir Putin tells Tucker Carlson US should stop arming Ukraine to end war

Putin hints Moscow and Washington in back-channel talks in revealing Tucker Carlson interview

Trump accuses Fulton County DA Fani Willis of lying in court response to Roman's motion

Mandatory anti-white racism at Disney.

Iceland Volcano Erupts For Third Time In 2 Months, State Of Emergency Declared

Tucker Carlson Interview with Vladamir Putin

How will Ar Mageddon / WW III End?

What on EARTH is going on in Acts 16:11? New Discovery!

2023 Hottest in over 120 Million Years

2024 and beyond in prophecy

Questions


Status: Not Logged In; Sign In

United States News
See other United States News Articles

Title: Where's The Media? A BOMBSHELL Is Being Ignored!
Source: market-ticker,org
URL Source: https://market-ticker.org/akcs-www?post=231606
Published: Nov 2, 2016
Author: Karl Denninger
Post Date: 2016-11-02 16:38:44 by nolu chan
Keywords: None
Views: 353
Comments: 3

https://market-ticker.org/akcs-www?post=231606

Where's The Media? A BOMBSHELL Is Being Ignored!

2016-11-01 11:33
by Karl Denninger
in Editorial

So you want to talk to Mark Cuban on the latest Hillary email thing eh?

You ought to try someone with a bit of credibility. You see, Mark Cuban is not ignorant and his appearance this morning on CNBC did not contain "mistakes."

He was lying.

This "newly discovered" laptop is very likely to be literal nuclear waste for Hillary and everyone around her, including the Clinton Foundation and all of Hillary's "advisers" such as Podesta.

Mark Cuban said that Huma used Outlook and IMAP (for Yahoo and similar.) True.

But then he said this was unlikely to lead to "new" evidence in the form of the emails.

That's a lie.

It's a lie because Cuban knows he's full of crap; he knows enough about the technologies involved to be fully aware that he was peddling nonsense.

IMAP and Exchange are email protocols. (So is POP3, but that's pretty much deprecated everywhere for good reason.) Exchange, when available, is often preferred by business people because it syncs not just email but also calendars and contact lists, which can (and does) include both phone numbers and email addresses.

IMAP is typically used by clients like Thunderbird because it doesn't know to speak Exchange. There's a plug-in for calendars using the davical protocol and another (the SoGo connector) for contacts, but no integrated Exchange support.

Outlook can use IMAP, but where the server supports it (like Clinton's "homebrewed" email server) Exchange would normally be used instead as a preferred choice. It both does more and also does a far better job of threading conversations (which is very convenient) and thus is almost-always preferred when it is available.

Here's the problem for the Clintons: Both of these protocols will sync any folder they are told to monitor and can be told to pull local copies of emails. By default both will typically do so on a desktop or laptop environment because WiFi is usually available and it has enough bandwidth to make that efficient. Mobile devices sometimes are configured to only grab email headers by default but increasingly, with 4g service, they're set up to get full messages too, sometimes including all attachments.

The reason to do this is that it is a lot faster to search messages locally than over the wire, and it's convenient to be able to search messages. In addition pulling full copies (including attachments) allows you to work offline (when there's no WiFi or other network available), and then re-sync when you get back in range.

Here's the problem for Hillary -- when the server had emails deleted and then was "Bleached" it had already been taken offline and was never returned to service. As such the laptop client would have been unable to connect back to it and thus it would never be told to remove anything.

Without that machine (Weiner's laptop) being under remote administration such as Domain Policy control (which we can reasonably assume it was not as Huma claims "she didn't know about it" and it was allegedly a private laptop) there is no remote capability to wipe or otherwise get into said computer and remove the emails either. In fact there's a decent chance it's running an operating system edition (if Windows) that lacks domain control capability entirely.

This means that the odds are extremely high that all of the deleted emails to which Huma was a participant are on that computer.

Every.
Single.
One.

If that examination shows that work product, or worse, classified information was sent and/or received and the evidence intentionally destroyed via the "Bleachbit" process then everyone involved is cooked. Remember, the claim was that the emails deleted were nothing more than yoga chat and similar; all "personal" content that the government had no right to and implicated no national security interest. Further, Huma claimed twice (once during her exit from State, and again under oath when questioned) that she had turned over all devices that might or did have US Government work product on them and had retained no copies.

If that is proved to be a lie, or worse, proof of felony conduct such as influence peddling or (God forbid for them) something like the rumored link to Epstein's Lolita Express is found in those archives then a whole bunch of people are going straight to prison not only on the original acts evidenced in the emails themselves but also on felony obstruction of justice and perjury charges.

Yes, folks, this is a very big deal because it is the first discovery of a computer that appears to have been sync'd against the Clinton server but was neither tampered with or destroyed, and thus it likely contains all of the pertinent evidence to which Huma was a part.

I argue that the media is lying and soliciting others to lie. Mark Cuban knows all of this as he's well-aware of how email works on the Internet. I'm aware of it too, having run an ISP during the early 1990s, having run corporate, personal and ISP-level email servers both before and since up to and including the present day, and I can confidently state that unless someone took affirmative action to alter the record the odds are extremely high that every single email chain Huma participated in is likely on that laptop, whether Hillary and her friends tried to delete it or not.

I'm a subject matter expert in this regard folks.

Yeah, CNBC, I'm not your biggest fan. But you (and the rest of the media) know damn well I can get to a studio in about an hour and a half and if you call I will be happy to don a suit (ok, at least the top half that the camera can see) and scoot on over to correct the record from a technical level on exactly what has been found and what is likely now in both the FBI's and the NY State Police/NYPD's hands.

Consider this an open invite to any of the MSM folks to do exactly that; you folks all still have my phone number and I can only conclude it hasn't rung because you are not interested in the truth from someone who has the technical competence to explain it to your viewers.

Report the news, media wonks, instead of trying to shape it.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 1.

#1. To: All (#0)

https://market-ticker.org/akcs-www?singlepost=3412501

Where's The Media? A BOMBSHELL Is Being Ignored!;

entered at 2016-11-01 12:26:12
Mtdm

I agree 1000% with all your conclusions, nothing I'm about to say changes any of that.

One observation, however, which is in part a cautionary tale for others who use Exchange/Activesync connections, and in part serves to reinforce (ever so slightly) your present story:

Quote:

Without that machine (Weiner's laptop) being under remote administration such as Domain Policy control (which we can reasonably assume it was not as Huma claims "she didn't know about it" and it was allegedly a private laptop) there is no remote capability to wipe or otherwise get into said computer and remove the emails either. In fact there's a decent chance it's running an operating system edition (if Windows) that lacks domain control capability entirely.

Suprisingly, (and disturbingly, in a BYOD world,) it turns out that modern Exchange clients, even non-Microsoft ones, do include significant backdoor MDM. For example: you may be aware that connecting an iOS device using the Apple Mail app to an Activesync connection provides the ability for the Exchange server to specify some device restrictions, such as minimum passcode length, maximum passcode age before passcode must be changed, etc. However what is less obvious, is that by the mere act of connecting your Apple Mail app to an Exchange server in this way, you have given away sufficient privilege to that server that it can now instruct a full wipe of your *entire device*, not just the local copy of the emails in that email account. (There is no pop-up to inform/warn you of this when configuring the Mail client, etc.)

Now, this is of course entirely moot on a going-forward basis in the current circumstance, because of either/both: (i) the laptop is offline and FBI already have forensic copies of the evidence without such a wipe having been instructed (self-evidently); (ii) assuming, as seems to be the case, that the Exchange server has indeed been completely torn down and is not able to be resurrected without raising a ton of red flags, they no longer have any easy way to instruct such a wipe on any other devices which may still exist out there, even if such a device were still online and attempting to connect to it.

So why am I mentioning all this? Well, it lends further credence to the notion that: the IT staff involved here were all a bunch of amateurs AND/OR were rushing to completion and sacrificing quality for speed (which clearly points to an intent to tamper/destroy/defraud before "it's too late") AND/OR perhaps, for whatever reason, they knew/intended that there would be copies left lying around. If a reasonably competent person were tasked with cleaning up that server, and purging some or all of the content, (and assuming they intended to do so, competently,) I put it to you that one of the very first and most important steps which they would have taken would be to use all available logging to identify the set of devices which had been connecting to the server and might have retained copies, so that those devices could be addressed comprehensively, with any and all of the tools at their disposal.

In sum, it is indeed hard to countenance any other explanation for this whole mess, than that many people were involved in a massive conspiracy to hide or destroy evidence.

I look forward to some honesty and plain speaking from any element of the MSM in this regard, but have no confidence that this will happen.

2016-11-01 12:26:12
Comment by Mtdm

nolu chan  posted on  2016-11-02   16:39:30 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 1.

        There are no replies to Comment # 1.


End Trace Mode for Comment # 1.

TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com