• This is a political forum that is non-biased/non-partisan and treats every person's position on topics equally. This debate forum is not aligned to any political party. In today's politics, many ideas are split between and even within all the political parties. Often we find ourselves agreeing on one platform but some topics break our mold. We are here to discuss them in a civil political debate. If this is your first visit to our political forums, be sure to check out the RULES. Registering for debate politics is necessary before posting. Register today to participate - it's free!

Russian hackers read Obama's unclassified emails last year: NYT......

Seems the phising and bait was going on at the State Dept from 2009 until now. Plus they know the Romanian Hacker left his signature. You did note how he got it from Blumenthal and then took whatever from Clinton.

None of this is intelligible or even remotely connected to how one would be able to hack State Dept servers.
 

JFC, why do you make your posts look like a ****ing Christmas Tree? It makes them hard to read. Anyway the article doesn't say he broke in to Hillary's server, so your implication that I got it wrong is bull****.
 
Do you recognize what this thread is about? It's about hacking a State Dept. server supposedly, somehow related to Hillary's weak security (as admitted by the OP) even though, one attack simply can't make the other possible.

You don't understand. Hillary gave Russia, Iran and China all the secrets on purpose. They've got all the information they need to hack everything forever no matter what we do. It's over. The bad guys got us. Take to the hills. Wolverines.
 

What do you think HB.....WH gets hacked, and thru State Dept Computers?
 
You don't understand. Hillary gave Russia, Iran and China all the secrets on purpose. They've got all the information they need to hack everything forever no matter what we do. It's over. The bad guys got us. Take to the hills. Wolverines.

It's absolutely insane what these people are proposing. We have a guy who doesn't understand that one thing can't make the other possible, debating that phishing, viruses and social engineering methods can be used to to hack into a State Dept. e-mail. That just boggles the mind.
 
Do you recognize what this thread is about? It's about hacking a State Dept. server supposedly, somehow related to Hillary's weak security (as admitted by the OP) even though, one attack simply can't make the other possible.

Anything can be compromised with enough sophistication and power.
 

You're missing the premise. Hillary, Obama et al. are EVIL. They are HELPING THE ENEMY - ON PURPOSE!

Once you grasp that, the rest makes (twisted and sad) sense.
 
What do you think HB.....WH gets hacked, and thru State Dept Computers?

Hard to say. There are many avenues from which an attack can be mounted against virtually any system. It's a brave new world. There are also attacks and infiltrations which are low level and designed to push information to other places. It's a pretty sophisticated game sometimes, and appearances can be deceiving. Sometimes the objective is just inconvenience and embarrassment.
 
Anything can be compromised with enough sophistication and power.

Sure enough, however social engineering, viruses and keyloggers will never get you into a State Dept's server. Neither will the information that they produce. There simply is no transmittable information contained in any e-mail that would allow somebody to get into a State Dept server because they're not facebook accounts. You don't simply get a password and an account and you're good to go which is what you've been inferring for some time. That's why the entire premise that the WH/State Dept were hacked through some bit of information contained in Hillary's account is laughable if not outright mythical. This isn't a movie.
 

When you're a state intelligence agency, the objective is never just to inconvenience and embarrass, especially not via a ****ing rolodex.
 
Just yoga routines is probably all they got.

They say stuff like yoga and that makes me think yoga pants and then I have to think Hillary in yoga pants and then it's
every time.
So knock it off.
 
You're missing the premise. Hillary, Obama et al. are EVIL. They are HELPING THE ENEMY - ON PURPOSE!

Once you grasp that, the rest makes (twisted and sad) sense.

This place keeps getting nuttier and nuttier. I miss the days where the most we had to deal with were 9/11 conspiracy theories and Obama's birth certificates.
 
This place keeps getting nuttier and nuttier. I miss the days where the most we had to deal with were 9/11 conspiracy theories and Obama's birth certificates.

These days we roll it all up into one big nutball. Then we roll it at people and see if it squashes them. As one can see, there are casualties.
 
It'd sound like something if there was a quote. But there's not. Know why? Because the only quotes they have would look stupid.

Hypothetically ... if Hillary was arranging Bill's speaking fee with a Foundation donor for whose business enterprise she was discussing details, would you consider that official or private?
 
These days we roll it all up into one big nutball. Then we roll it at people and see if it squashes them.

What do you need to hack into State Dept. servers? Just somebody's e-mail and password. It works like Facebook.
 
What do you need to hack into State Dept. servers? Just somebody's e-mail and password. It works like Facebook.

Hillary gave them the password so they can destroy America. Obama is the devil.




Wolverines
 
None of this is intelligible or even remotely connected to how one would be able to hack State Dept servers.

Whats not intelligible with my post to the one you posted up about Phishing and bait? What english words didn't you understand and are having so much trouble with? Do you think I need to know this limitation of yours or something? I do have to go by what you try to construct with your so called smart power.







Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.

While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president's schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies, U.S. officials say. The White House in October said it noticed suspicious activity in the unclassified network that serves the executive office of the president. The system has been shut down periodically to allow for security upgrades.

The FBI, Secret Service and U.S. intelligence agencies are all involved in investigating the breach, which they consider among the most sophisticated attacks ever launched against U.S. government systems. ​The intrusion was routed through computers around the world, as hackers often do to hide their tracks, but investigators found tell-tale codes and other markers that they believe point to hackers working for the Russian government. To get to the White House, the hackers first broke into the State Department, investigators believe.

How Russians hacked the White House - CNNPolitics.com


What do I think of the method used for Clinton? It's script kiddie stuff that wouldn't even make it past the State Dept's first line of defence. Do you know why? I'll give you a clue, it has something to do with SSL VPN. :lol:



What Happened Hatuey.....here you are saying this is script kiddie stuff and it wouldn't even make it past the State first line of defense. No one can get into the State Dept etc etc and here our people are calling whatever the Russians are doing.....that they are the most sophisticated attacks they have ever seen.

Now who do we believe......BO's own people, Heads of other depts, in government that all investigate this type of stuff.....or you a left leaning liberal who cant figure how how this is starting to point to Hillary and when she was breached and used for bait.

Note what they said also about how other Foreign Agencies Prize that info? Also how it includes schedules that aren't made public.
 
Last edited:
Hypothetically ... if Hillary was arranging Bill's speaking fee with a Foundation donor for whose business enterprise she was discussing details, would you consider that official or private?

"For whose business enterprise she was discussing details"

Why don't you just say she was pimping Bill and giving away government contracts? I would consider pimping an ex-pres and selling state stuff to be official.
 


Yeah it seems so check out what I just put up.....also don't forget they like to go tangential on other points when they can't get past their own construct. Its like half the time they don't even know what they are saying.

Maybe we should pull up a chair and discuss their alleged smart power and come to some conclusion upon it. :mrgreen:
 

None of it is intelligible because it has absolutely nothing to do with hacking a server. Do you not get that yet?


Nope, I said that the information gained from one would not make hacking the other possible. That doesn't mean State Dept. is unhackable. Not even in your wildest dreams. What it means is that one is not related to the other because the approach and information obtained from one, are irrelevant to the approach taken for the other. You seem to have a penchant for addressing arguments nobody has ever made. Why do you do that to yourself?


Lmao, Hillary is a starting point? For what?!?!?! I've asked you repeatedly how you hack a server or even an e-mail just by being aware of it. You don't know how. I've asked you how an e-mail address would allow you to hack a server, you don't know. I've pointed out that SD would not use Facebook level security on its computers, and you can't even seem to address that.

Note what they said also about how other Foreign Agencies Prize that info? Also how it includes schedules that aren't made public.

That's cute. They got Obama's PDA. I'm sure they'll be able... to... assassinate him? What? Send a commando after him? What exactly can they do? This is why your entire premise falls flat on its face. Not only does not lead anywhere, it's so obviously ignorant of what is possible with this information that it completely destroys itself under a little scrutiny.
 
Hillary gave them the password so they can destroy America. Obama is the devil.




Wolverines

This whole thing reminds me of little kids screaming that they can hack you just by knowing your IP. That's the level of discussion we're having here. One side is arguing that some guy in Russia hacked what is probably absurdly secure servers on the planet with information that Hillary would have no reason to discuss or even access to and techniques that have beaten AOL. The other is saying that this is definitely something which can be done, it just can't be done in the way they're saying.

Also, I'm going to Angola in August. Any tips?
 
Also, I'm going to Angola in August. Any tips?

I got a tip for you: Kenya gets most of its energy sustainably, has been a multiparty democracy since 2003 and has the most liberal constitution (adopted by public referendum 2011) in the world.
 
I got a tip for you: Kenya gets most of its energy sustainably, has been a multiparty democracy since 2003 and has the most liberal constitution (adopted by public referendum 2011) in the world.

Angola... not so much. Lingala and Bakongo sound like the names of vicious alien groups on Star Trek.
 
Angola... not so much. Lingala and Bakongo sound like the names of vicious alien groups on Star Trek.

Kenya has Mombasa and Embu, warm and inviting names.


Edit: oh, those are languages
 

As usual.....always thinking in one dimension when it comes to BO. You still cant comprehend that part about others overseas and their Non public schedules as well as others in the WH and their being hacked. Don't worry tho.....one day you will understand it. But it wont be as exciting as when you think of BO.
 
Cookies are required to use this site. You must accept them to continue using the site. Learn more…