Author Topic: Hillary Clinton’s emails were sent, potentially secretly, to a cryptically named Gmail address  (Read 1380 times)

0 Members and 1 Guest are viewing this topic.

Offline mrclose

  • Hero Member
  • *****
  • Posts: 3,233
(Had to chop up the ridiculously long title.)


Virtually every single one of Hillary Clinton’s emails were sent, potentially secretly, to a cryptically named Gmail address, according to a new Senate report.

The interesting part in all of this ... (besides the Clinton's criminality)... is this"

Quote
When an intel agent discovered the copying to a third-party account, he said Peter Strzok seemed uninterested.

The intel agency feared the email account could be a link to a foreign power, but the FBI refused to explain it to them.


Wasn’t that gmail address connected somehow to a Chinese controlled company?

Remind me again .. How much did the Chinese contribute to the Clinton's?


Quote
The finding, which has not been previously reported, means that Clinton’s emails, including classified ones and ones which were later deleted, likely existed on Google’s U.S.-based servers. The FBI said in the report that it knew this — and of the suspicious explanation for it — but did not alert other intelligence agencies or the public, according to the report.

The FBI says that the suspicious Gmail address was set up by an IT aide, Paul Combetta, who worked for a company that managed Clinton’s server. Combetta is the same IT aide who used BleachBit to permanently erase copies of Clinton’s emails after they were subpoenaed by the House, misled the FBI about it, and was given immunity from prosecution, all while asking for basic computing advice on Reddit.

https://dailycaller.com/2019/08/16/hillary-clinton-emails-cryptic-gmail/
« Last Edit: August 17, 2019, 11:18:31 pm by mrclose »
"Hell is empty, all the devil's are here!"
~ Self

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460
Quote from:  the article
    The finding, which has not been previously reported, means that Clinton’s emails, including classified ones and ones which were later deleted, likely existed on Google’s U.S.-based servers. The FBI said in the report that it knew this — and of the suspicious explanation for it — but did not alert other intelligence agencies or the public, according to the report.

    The FBI says that the suspicious Gmail address was set up by an IT aide, Paul Combetta, who worked for a company that managed Clinton’s server. Combetta is the same IT aide who used BleachBit to permanently erase copies of Clinton’s emails after they were subpoenaed by the House, misled the FBI about it, and was given immunity from prosecution, all while asking for basic computing advice on Reddit.


These two statements sound like hyperventilating, and throw a pall on the entire report - Either the author is operating from ignorance, or is purposefully ginning up suspicions.

On the first statement - I am tangentially familiar with BleachBit, preferring different software, but all software, like-in-kind, are standard procedure and an encouraged exercise in computing...

Deleted files are not really deleted on your machine - they are merely marked for deletion and thereafter hidden from the user by standard directory filtering... A file marked as deleted remains until it may be overwritten by a new incoming saved file, or other computer actions that may overwrite it, like automated caching or defragmenting...

What BleachBit, or others like it do, is to intentionally overwrite those already deleted files by overwriting all 'free space' on the drive... And 'wiping free space' is done all the time, as a responsible industry standard. My own defragmenting operations wipe free space as a matter of course.

That is not nefarious. That is good practice.

As to the second point, it is really not uncommon in IT for one expert to rely on the expertise of another in a different field - I am a service tech and a recovery specialist; and what I know is stuff that a network tech would be totally oblivious to (and quite likely the other way around)... And as good as I am at what I do, I was recently on a tech forum asking questions of graphics techs that I am sure were quite rudimentary to them, with respect to how GPU caches work.

Again, inquiry is not uncommon. Nor is it uncommon for one expert to be asking rather common questions of an expert in another field. computing and computer sciences are very broad fields.

Offline libertybele

  • Hero Member
  • *****
  • Posts: 58,577
  • Gender: Female
  • WE are NOT ok!
So what?  We should all realize by now that the Clintons will NEVER be held accountable.  Not going to happen.
I Believe in the United States of America as a Government of the people, by the people, for the people; whose just powers are derived from the consent of the governed; a democracy in a republic; a sovereign nation of many sovereign states; a perfect union one and inseparable; established upon those principles of freedom, equality, justice and humanity for which American patriots sacrificed their lives and fortunes.  I therefore believe it is my duty to my country to love it; to support its Constitution; to obey its laws to respect its flag; and to defend it against all enemies.

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460
So what?  We should all realize by now that the Clintons will NEVER be held accountable.  Not going to happen.

That's right.

Online Smokin Joe

  • Hero Member
  • *****
  • Posts: 57,370
  • I was a "conspiracy theorist". Now I'm just right.
So what?  We should all realize by now that the Clintons will NEVER be held accountable.  Not going to happen.
Well, not in this life. I believe they will ultimately be held accountable.
How God must weep at humans' folly! Stand fast! God knows what he is doing!
Seventeen Techniques for Truth Suppression

Of all tyrannies, a tyranny sincerely exercised for the good of its victims may be the most oppressive. It would be better to live under robber barons than under omnipotent moral busybodies. The robber baron's cruelty may sometimes sleep, his cupidity may at some point be satiated; but those who torment us for our own good will torment us without end for they do so with the approval of their own conscience.

C S Lewis

Offline corbe

  • Hero Member
  • *****
  • Posts: 38,715
Crowd chants ‘Lock her up’ and Trump tells them to ‘speak to Jeff Sessions’


Error 404 (Not Found)!!1


No government in the 12,000 years of modern mankind history has led its people into anything but the history books with a simple lesson, don't let this happen to you.

Offline Hoodat

  • Hero Member
  • *****
  • Posts: 37,696
Well, not in this life. I believe they will ultimately be held accountable.

Eternity is a very long time.

If a political party does not have its foundation in the determination to advance a cause that is right and that is moral, then it is not a political party; it is merely a conspiracy to seize power.     -Dwight Eisenhower-

"The [U.S.] Constitution is a limitation on the government, not on private individuals ... it does not prescribe the conduct of private individuals, only the conduct of the government ... it is not a charter for government power, but a charter of the citizen's protection against the government."     -Ayn Rand-

Offline corbe

  • Hero Member
  • *****
  • Posts: 38,715
   Depends, Is it Colorado?

No government in the 12,000 years of modern mankind history has led its people into anything but the history books with a simple lesson, don't let this happen to you.

Online Cyber Liberty

  • Coffee! Donuts! Kittens!
  • Administrator
  • ******
  • Posts: 80,731
  • Gender: Male
  • 🌵🌵🌵
My personal theory is Clinton was using the gmail account as a "drop box," so she could sent emails there to be picked up at the recipient's leisure.  This prevents the dangerous chore of actually shipping the data.

Just my theory.
For unvaccinated, we are looking at a winter of severe illness and death — if you’re unvaccinated — for themselves, their families, and the hospitals they’ll soon overwhelm. Sloe Joe Biteme 12/16
I will NOT comply.
 
Castillo del Cyber Autonomous Zone ~~~~~>                          :dontfeed:

Online Smokin Joe

  • Hero Member
  • *****
  • Posts: 57,370
  • I was a "conspiracy theorist". Now I'm just right.
My personal theory is Clinton was using the gmail account as a "drop box," so she could sent emails there to be picked up at the recipient's leisure.  This prevents the dangerous chore of actually shipping the data.

Just my theory.
I can retrieve files sent through g mail years later. Just saying. "drop box", cloud drive, whatever, I wonder what's still there?
How God must weep at humans' folly! Stand fast! God knows what he is doing!
Seventeen Techniques for Truth Suppression

Of all tyrannies, a tyranny sincerely exercised for the good of its victims may be the most oppressive. It would be better to live under robber barons than under omnipotent moral busybodies. The robber baron's cruelty may sometimes sleep, his cupidity may at some point be satiated; but those who torment us for our own good will torment us without end for they do so with the approval of their own conscience.

C S Lewis

Online Cyber Liberty

  • Coffee! Donuts! Kittens!
  • Administrator
  • ******
  • Posts: 80,731
  • Gender: Male
  • 🌵🌵🌵
I can retrieve files sent through g mail years later. Just saying. "drop box", cloud drive, whatever, I wonder what's still there?

By "drop box" I mean a repository for data that is meant to be opened by others.  My cloud drive is meant only for my eyes.

So somebody creates a gmail account and hands out the password to whomever wants the information I intend to share.
For unvaccinated, we are looking at a winter of severe illness and death — if you’re unvaccinated — for themselves, their families, and the hospitals they’ll soon overwhelm. Sloe Joe Biteme 12/16
I will NOT comply.
 
Castillo del Cyber Autonomous Zone ~~~~~>                          :dontfeed:

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460
My personal theory is Clinton was using the gmail account as a "drop box," so she could sent emails there to be picked up at the recipient's leisure.  This prevents the dangerous chore of actually shipping the data.

Just my theory.

That's a something...
But there are far more anonymous means of doing that...
And uploading a file to an email is the very same thing as uploading it anywhere else...
dunno.

Offline corbe

  • Hero Member
  • *****
  • Posts: 38,715


 You just know someone has always had them.
No government in the 12,000 years of modern mankind history has led its people into anything but the history books with a simple lesson, don't let this happen to you.

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460


 You just know someone has always had them.

That's right. They're gonna have everything.
The trick is doing it so they can't tell it's yours.

Offline DB

  • Hero Member
  • *****
  • Posts: 13,669
That's a something...
But there are far more anonymous means of doing that...
And uploading a file to an email is the very same thing as uploading it anywhere else...
dunno.

One scheme is to create a Web Email account, then write "draft" messages in that account that are never sent. Instead other people are given the password for the account where they can log in from anywhere and read the "draft" message that was never sent. There's no record of anyone sending anything or receiving anything...

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460
One scheme is to create a Web Email account, then write "draft" messages in that account that are never sent. Instead other people are given the password for the account where they can log in from anywhere and read the "draft" message that was never sent. There's no record of anyone sending anything or receiving anything...

Alright, but IPs and MacAddys are logged. and a warrant gets at the info... Not that it is hard to sniff an email pwd anyway...

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460
Hi @DB , btw...

Nice to see you.  :beer:

Offline DB

  • Hero Member
  • *****
  • Posts: 13,669
Alright, but IPs and MacAddys are logged. and a warrant gets at the info... Not that it is hard to sniff an email pwd anyway...

You have to know about it to get a warrant. Free Email accounts are widely available and cost nothing as burners. There's very little evidence of anything. There is no message being transported to capture at a router or network sniffer. MAC addresses are not passed on the Web, only IP addresses which can pass through one or more proxies. Who knows if short term draft messages that are only present minutes to hours and never sent or received are even archived to serve a warrant on. It isn't likely.

Online Cyber Liberty

  • Coffee! Donuts! Kittens!
  • Administrator
  • ******
  • Posts: 80,731
  • Gender: Male
  • 🌵🌵🌵
That's a something...
But there are far more anonymous means of doing that...
And uploading a file to an email is the very same thing as uploading it anywhere else...
dunno.

An email scheme would make it very simple (even transparent) to a computer illiterate like Hillary Clinton to distribute her secrets.
For unvaccinated, we are looking at a winter of severe illness and death — if you’re unvaccinated — for themselves, their families, and the hospitals they’ll soon overwhelm. Sloe Joe Biteme 12/16
I will NOT comply.
 
Castillo del Cyber Autonomous Zone ~~~~~>                          :dontfeed:

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460
You have to know about it to get a warrant. Free Email accounts are widely available and cost nothing as burners.

All big-corp, government loving, with AI reading everything...

Quote
There's very little evidence of anything. There is no message being transported to capture at a router or network sniffer.

The original draft was transported.

Quote
MAC addresses are not passed on the Web, only IP addresses which can pass through one or more proxies.

Right, but still detectable at the source, and many sources carry logs. MacAddys are unique to the card of device, and can be traced back to purchase.

As for proxies, I have had occasion to be doing something from a hotel parking lot... Through four proxies... and Charlie showed up at the hotel front door in 20 minutes. So proxies ain't all that if they are looking for it.

Quote
Who knows if short term draft messages that are only present minutes to hours and never sent or received are even archived to serve a warrant on. It isn't likely.

Thanks. But I prefer an alt device, randomly picked up used for cash. Linux, mac spoofer, no useable ID onboard... from a public or stumbled location. No track, No location, Encrypted chat, encrypted P2P...

I do alright.  :)

Like I said, far more elegant, far more anonymous.

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460
An email scheme would make it very simple (even transparent) to a computer illiterate like Hillary Clinton to distribute her secrets.

Yeah... with lots of recording...

Offline InHeavenThereIsNoBeer

  • Hero Member
  • *****
  • Posts: 4,127
All big-corp, government loving, with AI reading everything...

The original draft was transported.

Right, but still detectable at the source, and many sources carry logs. MacAddys are unique to the card of device, and can be traced back to purchase.

As for proxies, I have had occasion to be doing something from a hotel parking lot... Through four proxies... and Charlie showed up at the hotel front door in 20 minutes. So proxies ain't all that if they are looking for it.

Thanks. But I prefer an alt device, randomly picked up used for cash. Linux, mac spoofer, no useable ID onboard... from a public or stumbled location. No track, No location, Encrypted chat, encrypted P2P...

I do alright.  :)

Like I said, far more elegant, far more anonymous.

A MAC is not unique (if you don't want it to be) and is not visible outside a broadcast domain (level 2).  It's not available for anyone at level 3 to detect.  And even if it was unique, to trace it to the purchase is simply not realistic (it'd be a stretch to trace it to the retailer, but from there you're done).
My avatar shows the national debt in stacks of $100 bills.  If you look very closely under the crane you can see the Statue of Liberty.

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460
A MAC is not unique (if you don't want it to be) and is not visible outside a broadcast domain (level 2).  It's not available for anyone at level 3 to detect. 

Right - thus a mac addy spoofer. I am only concerned with the router at the source, where that mac addy is tied to an LAN IP live for the length of the lease, and may also be logged.

Quote
And even if it was unique, to trace it to the purchase is simply not realistic (it'd be a stretch to trace it to the retailer, but from there you're done).

No. You would be more right if it was a card, but since networking is onboard these days, it is part and parcel to the device - And if your name is on that device, if you paid with check or credit card, the buyer record is known by the retailer, and the machine is known by the manufacturer. They can put it together, and they do. RFID tagging at it's best.

Hackers get caught because they get lazy.

Online Cyber Liberty

  • Coffee! Donuts! Kittens!
  • Administrator
  • ******
  • Posts: 80,731
  • Gender: Male
  • 🌵🌵🌵
Yeah... with lots of recording...

Assuming somebody cared to look back then.  What's that recent story about the FBI vis Clinton IT data?  They ignored it.  Logs with all that tracking data are possibly long ago destroyed.
For unvaccinated, we are looking at a winter of severe illness and death — if you’re unvaccinated — for themselves, their families, and the hospitals they’ll soon overwhelm. Sloe Joe Biteme 12/16
I will NOT comply.
 
Castillo del Cyber Autonomous Zone ~~~~~>                          :dontfeed:

Online roamer_1

  • Hero Member
  • *****
  • Posts: 44,460
Assuming somebody cared to look back then.  What's that recent story about the FBI vis Clinton IT data?  They ignored it.  Logs with all that tracking data are possibly long ago destroyed.

In this case perhaps, but I know ISPs save data for 7 years, and I suspect everybody else providing service does too.