{"id":110885,"date":"2017-11-30T13:02:00","date_gmt":"2017-11-30T13:02:00","guid":{"rendered":""},"modified":"2023-01-08T11:04:55","modified_gmt":"2023-01-08T11:04:55","slug":"selective-outrage-cyber-edition","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/11\/30\/selective-outrage-cyber-edition\/","title":{"rendered":"Selective Outrage (Cyber Edition)"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><h3 class=\"post-title entry-title\" itemprop=\"name\"><\/h3>\n<div class=\"post-header\"> <\/div>\n<p>It&#8217;s always fun to watch politicians and their flunkies try to spin a  bad situation, and those tactics were clearly on display during Hillary  Clinton&#8217;s e-mail scandal.&nbsp; Before receiving that &#8220;Stay Out of Jail&#8221; card  from the FBI and Obama&#8217;s Justice Department, Mrs. Clinton and her  minions tried various arguments to excuse her illegal behavior, without  too much success.&nbsp; From the &#8220;grooveyard of forgotten favorites,&#8221; as El  Rushbo might say:<\/p>\n<p><i>&#8220;Other secretaries of state did it (used private e-mail accounts for government business).&#8221;<\/i>&nbsp;  There&#8217;s a kernal of truth to that, with some important qualifiers:  first, none ever utilized a private account on the industrial scale  pioneered by Mrs. Clinton.&nbsp; Additionally, her predecessors never sent  the nation&#8217;s most closely-guarded secrets on a personal system that  lacked even basic security features, and none ever plotted to evade  public disclosure and archiving laws by creating their own domain and  server network.<\/p>\n<p><i>&#8220;I never sent or received classified information.&#8221;&nbsp;<\/i> This is  another howler, since the defense is largely based on claims that  information in the e-mails lacked classification markings.&nbsp; Never mind  that the lack of classification headers and paragraph markings is not an  excuse for mishandling classified data or transmitting it  improperly&#8211;or that Mrs. Clinton (in one message) directed aides to  remove classification markings so sensitive material could be sent over  an unclassified fax machine.&nbsp; Hillary and her senior aides clearly chose  to ignore (read: violate) security requirements, and the hits just keep  on coming.&nbsp; Friday, <a href=\"https:\/\/news.vice.com\/article\/exclusive-hillary-clinton-exchanged-classified-emails-on-private-server-with-three-aides\">Vice News disclosed that Mrs. Clinton sent at least 22 Top Secret e-mails to senior aides in 2011 and 2012.<\/a>&nbsp;  The messages are among those withheld from public release by the State  Department, since they contain information that would cause  &#8220;exceptionally grave damage to national security.&#8221; <\/p>\n<p>But not to worry, we were told.&nbsp; There was no firm evidence that enemy  hackers accessed her server system, and might have collected all the  information stored there&#8211;including &#8220;missing&#8221; e-mails that were deleted  by Clinton&#8217;s aides and members of her legal team.&nbsp; That claim has been  refuted by a number of IT and counter-intelligence professionals, who  note that foreign intel services are quite capable of accessing a  system, collecting whatever they want and exiting&#8211;all without leaving a  trace.<\/p>\n<p>After down-playing the &#8220;foreign hacker&#8221; threat for months, the Democrats  are now doing a 180, after Wikileaks began publishing thousands of  e-mails pilfered from the DNC archives.&nbsp; The first dump came on the eve  of this week&#8217;s Democratic National Convention in Philadelphia and it  revealed a number of interesting nuggets, including unassailable proof  that party leaders worked actively to deny Bernie Sanders their  presidential nomination.&nbsp; That revelation forced party chairwoman Debbie  Wasserman-Schultz to resign in disgrace, as e-mails detailed  suggestions by Democrat officials to use anti-Semitic tactics against  the Vermont Senator.<\/p>\n<p>There were also messages that revealed collusion between the DNC and the  mainstream media.&nbsp; One e-mail described a private meeting with a senior  executive at NBC News and in another message, Ms. Wasserman Schultz  told network anchor Chuck Todd that a critical line of coverage &#8220;had to  stop.&#8221;&nbsp; Wikileaks also published an e-mail from a CNN producer who vowed  to keep the focus on the Democrats and another from a Politico  reporter, who sent his story to the DNC for review before submitting it  to his editor. <\/p>\n<p>To deflect attention away from the messages&#8211;and their damning  content&#8211;the Democrats are playing the victim card (as only they can)  and focusing on the hack.&nbsp; Almost immediately, party officials blamed  the Russians and there may be some evidence to support that accusation.&nbsp;  While Wikileaks denies any connection with Putin&#8217;s intelligence  services, many current and former western intel officials <a href=\"https:\/\/20committee.com\/2015\/08\/31\/wikileaks-is-a-front-for-russian-intelligence\/\">have long believed that the organization and its founder, Julian Assange, are little more than Russian cut-outs<\/a>.&nbsp;  As John Schindler recently noted in the New York Observer, it&#8217;s rather  curious that Mr. Assange, currently holded up in the Ecuadorian embassy  in London (to avoid rape charges in Sweden) has requested protection  from the Russian FSB.&nbsp;&nbsp; Assange also counseled American turncoat Edward  Snowden to flee to Moscow after he released thousands of classified NSA  documents.&nbsp; Snowden remains in Russia to this day, with round-the-clock  security from an FSB protective detail. <\/p>\n<p>At this point, the Democrats&#8217; collective pucker factor must be at an  all-time high.&nbsp; If hackers tied to Russian intelligence made off with  all of the DNC&#8217;s secrets, it&#8217;s a fair bet they have all of Hillary&#8217;s  e-mails as well.&nbsp; Holding all the high cards, Mr. Putin has the luxury  of choosing his options.&nbsp; He can sanction the continued release of  Democratic party e-mails and start adding missing messages from HRC&#8217;s  server as well, inflicting an ultimately fatal blow to her campaign.&nbsp;  Or, the Russian leader can offer to turn off the tap, in exchange for  whatever he wants on the world stage.&nbsp; Given Mrs. Clinton&#8217;s past  pliability in dealing with Moscow, it&#8217;s easy to see her caving to any  blackmail demands from the Kremlin.&nbsp; Our allies in places like the  Ukraine, Poland, the Baltics and elsewhere should be very, very nervous.<\/p>\n<p>The notion of Mr. Putin using spycraft to influence our presidential  election should be disquieting to all Americans, regardless of their  political affiliation.&nbsp; And, it&#8217;s absolutely mind-boggling that GOP  nominee Donald Trump is calling on the Russians to &#8220;locate&#8221; Hillary&#8217;s  missing e-mails and publish those as well.&nbsp; While Mr. Trump has chummy  relations with the Russian leader, he might also be concerned about what  the GRU&#8217;s 6th Directorate has retrieved from his computer networks.&nbsp;  Putin can easily use the same tactics against Trump, if the situation  dictates. <\/p>\n<p>It&#8217;s also important to view the current hubbub through the lens of  politics.&nbsp; Fact is, the Democrats weren&#8217;t overly concerned when  Wikileaks was publishing secrets that made George W. Bush look bad, and  they down-played serious security breaches at OMB (and other federal  agencies) during Obama&#8217;s time in office.&nbsp; But now that their party&#8211;and  presidential nominee&#8211;have been targeted, the Democrats are demanding an  all-hands-on-deck effort to pinpoint the source of the hack and punish  the offenders.&nbsp; Good luck with that; the odds of us actually getting our  hands on the hackers is pretty much non-existent. I&#8217;m sure Putin and  his cronies are getting a good laugh out of spoiling Mrs. Clinton&#8217;s  coronation in Philadelphia, with the promise of more &#8220;fun&#8221; in the weeks  ahead. <\/p>\n<p>And one final thought, before giving too much sympathy to Hillary or the  Democrats.&nbsp; Lest we forget, the party&#8217;s cyber woes began with HRC&#8217;s  attempts to circumvent the law (and potential scrutiny) with her  infamous home-brew server network and e-mail domain.&nbsp; It&#8217;s quite  possible the alleged Russian foray began penetration of her servers and  led them on to the DNC.&nbsp; Apparently, Ms. Wasserman-Schultz was presiding  over a network that was only marginally more secure than Mrs.  Clinton&#8217;s.&nbsp; Yet, she allowed staffers to conspire against Sanders in  terms that are vile at best, racist at worst.&nbsp; Of course, she never  believed any of those e-mails would enter the public domain&#8211;just as  Hillary thought she could get away with her on-line crimes. <\/p>\n<p>Both were woefully mistaken.&nbsp; And the worst is yet to come.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s always fun to watch politicians and their flunkies try to spin a bad situation, and those tactics were clearly on display during Hillary Clinton&#8217;s e-mail scandal.&nbsp; Before receiving that &#8220;Stay Out of Jail&#8221; card from the FBI and Obama&#8217;s Justice Department, Mrs. Clinton and her minions tried various arguments to excuse her illegal behavior, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110885"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=110885"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110885\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=110885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=110885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=110885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}