Seems the phising and bait was going on at the State Dept from 2009 until now. Plus they know the Romanian Hacker left his signature. You did note how he got it from Blumenthal and then took whatever from Clinton.
Try again Pete.....note what it says the Romanian hacker did.
Hillary’s Secret Email Was a Cyberspy’s Dream Weapon.....
When a notorious online break-in artist got a hold of the Secretary of State’s now-infamous email address, he gave himself the power to use it to target the global elite. The private email address for Hillary Clinton, which became the talk of Washington this week and created her first major speed bump on her road to the White House, has actually been freely available on the Internet for a year, thanks to a colorful Romanian hacker known as Guccifer.
On March 14, 2013, Guccifer—his real name is Marcel-Lehel Lazar—broke into the AOL account of Sidney Blumenthal, a journalist, former White House aide to Bill Clinton, and personal confidante of Hillary Clinton. Lazar crowed about his exploits to journalists, disclosing a set of memos Blumenthal had written to Clinton in 2012, as well as the personal email address and domain she’s now known to have used exclusively for her personal and official correspondence. Few journalists noticed that at the time, and it caused no ruckus in Washington. But the fact that Clinton’s private email was now public means she was not just putting her own information at risk, but potentially those in the circle of people who knew her private address.
Her email account was the ultimate hacker’s lure. It’s a common technique to impersonate a trusted source via email, in order to persuade a recipient to download spyware hidden inside seemingly innocuous attachments. Indeed, Clinton’s own staff had been targeted with such highly targeted “spear phishing” emails as early as 2009, the year she took office. And according to U.S. authorities, Lazar, who’s now serving a seven-year prison sentence in Romania and is accused of hacking the accounts of other Washington notables like Colin Powell, did commandeer other people’s email accounts . Then he used them to send messages exposing the private correspondence of his other victims. Before Lazar exposed the email domain, it would have been known to people with whom Clinton was trading emails, as well as to a tight inner circle lucky enough to be given @clintonemail.com accounts. Those included Clinton’s daughter, Chelsea, and aide Huma Abedin, whom the former secretary treats like family. Maybe Clinton and her staff thought the relative anonymity of her email domain would have given her a measure of security. It’s hard to say, since they and State Department officials have consistently refused to answer journalists questions about what security measures Clinton took to protect her “homebrew” email system......
Hillary
Do you recognize what this thread is about? It's about hacking a State Dept. server supposedly, somehow related to Hillary's weak security (as admitted by the OP) even though, one attack simply can't make the other possible.
You're entirely missing the point. A hacker doesn't need access to State dept servers if they're interested in Hillary's, which had no security for a full three months. During that time a hacker could obtain enough information to allow continued access even after encryption was installed and a certificate obtained. That's no big technical feat at all.
You don't understand. Hillary gave Russia, Iran and China all the secrets on purpose. They've got all the information they need to hack everything forever no matter what we do. It's over. The bad guys got us. Take to the hills. Wolverines.
Do you recognize what this thread is about? It's about hacking a State Dept. server supposedly, somehow related to Hillary's weak security (as admitted by the OP) even though, one attack simply can't make the other possible.
It's absolutely insane what these people are proposing. We have a guy who doesn't understand that one thing can't make the other possible, debating that phishing, viruses and social engineering methods can be used to to hack into a State Dept. e-mail. That just boggles the mind.
What do you think HB.....WH gets hacked, and thru State Dept Computers?
Anything can be compromised with enough sophistication and power.
Hard to say. There are many avenues from which an attack can be mounted against virtually any system. It's a brave new world. There are also attacks and infiltrations which are low level and designed to push information to other places. It's a pretty sophisticated game sometimes, and appearances can be deceiving. Sometimes the objective is just inconvenience and embarrassment.
Just yoga routines is probably all they got.
You're missing the premise. Hillary, Obama et al. are EVIL. They are HELPING THE ENEMY - ON PURPOSE!
Once you grasp that, the rest makes (twisted and sad) sense.
This place keeps getting nuttier and nuttier. I miss the days where the most we had to deal with were 9/11 conspiracy theories and Obama's birth certificates.
It'd sound like something if there was a quote. But there's not. Know why? Because the only quotes they have would look stupid.
These days we roll it all up into one big nutball. Then we roll it at people and see if it squashes them.
What do you need to hack into State Dept. servers? Just somebody's e-mail and password. It works like Facebook.
None of this is intelligible or even remotely connected to how one would be able to hack State Dept servers.
What do I think of the method used for Clinton? It's script kiddie stuff that wouldn't even make it past the State Dept's first line of defence. Do you know why?I'll give you a clue, it has something to do with SSL VPN. :lol:
Hypothetically ... if Hillary was arranging Bill's speaking fee with a Foundation donor for whose business enterprise she was discussing details, would you consider that official or private?
Hard to say. There are many avenues from which an attack can be mounted against virtually any system. It's a brave new world. There are also attacks and infiltrations which are low level and designed to push information to other places. It's a pretty sophisticated game sometimes, and appearances can be deceiving. Sometimes the objective is just inconvenience and embarrassment.
Whats not intelligible with my post to the one you posted up about Phishing and bait? What english words didn't you understand and are having so much trouble with? Do you think I need to know this limitation of yours or something? I do have to go by what you try to construct with your so called smart power.
What Happened Hatuey.....here you are saying this is script kiddie stuff and it wouldn't even make it past the State first line of defense. No one can get into the State Dept etc etc and here our people are calling whatever the Russians are doing.....that they are the most sophisticated attacks they have ever seen.
Now who do we believe......BO's own people, Heads of other depts, in government that all investigate this type of stuff.....or you a left leaning liberal who cant figure how how this is starting to point to Hillary and when she was breached and used for bait.
Note what they said also about how other Foreign Agencies Prize that info? Also how it includes schedules that aren't made public.
Hillary gave them the password so they can destroy America. Obama is the devil.
Wolverines
Also, I'm going to Angola in August. Any tips?
I got a tip for you: Kenya gets most of its energy sustainably, has been a multiparty democracy since 2003 and has the most liberal constitution (adopted by public referendum 2011) in the world.
Angola... not so much. Lingala and Bakongo sound like the names of vicious alien groups on Star Trek.
None of it is intelligible because it has absolutely nothing to do with hacking a server. Do you not get that yet?
Oh, due to it not correlating to what you wanted it to.....you thought it was better to go with not understanding english words and what one said. To try and play it off like you can't understand and comprehend. I get it now. Yeah that's not another good tactic to try and play with.
Nope, I said that the information gained from one would not make hacking the other possible. That doesn't mean State Dept. is unhackable. Not even in your wildest dreams. What it means is that one is not related to the other because the approach and information obtained from one, are irrelevant to the approach taken for the other. You seem to have a penchant for addressing arguments nobody has ever made. Why do you do that to yourself?
What you also said it was trivial and didn't really mean much. But of course now that's been shown what the reality actually is. Which it was already mentioned about WH being hacked thru State.
Lmao, Hillary is a starting point? For what?!?!?! I've asked you repeatedly how you hack a server or even an e-mail just by being aware of it. You don't know how. I've asked you how an e-mail address would allow you to hack a server, you don't know. I've pointed out that SD would not use Facebook level security on its computers, and you can't even seem to address that.
Yeah Right, and then I showed one way it was done to get to others by using Hillary as bait. :lamo
Then he used them to send messages exposing the private correspondence of his other victims.....snip~
Plus with all that I have shown.....its like I said its Starting to look like Hillary breached more than National Security.
That's cute. They got Obama's PDA. I'm sure they'll be able... to... assassinate him? What? Send a commando after him? What exactly can they do? This is why your entire premise falls flat on its face. Not only does not lead anywhere, it's so obviously ignorant of what is possible with this information that it completely destroys itself under a little scrutiny.
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?