Enter your e-mail to join other freedom seekers who choose to see the world as it really is... and get a free report that explains the big picture.

We respect your privacy,
plain and simple.

Some Truth About Hillary & The Hackers

hillarythe-hackers

I’ve been watching ridiculous stories on the “hacked” emails of Hillary, John Podesta, et al, and I think it’s time to insert a bit of reality to the discussion. So, if you have any interest in this, here are some points to consider:

1. Anyone could have hacked Hillary.

People ask me, “Do you think it was the Russians who hacked Hillary?” I tell them that I have no idea who did it, but, “Yeah, sure, it could have been the Russians. Given the lack of security on her server, however, it could also have been the teenager down the street.”

Hillary’s server was more or less wide open. Given enough motivation and a bit of time, any reasonably technical person could have stolen those emails. In the words of one specialist, Hillary’s server was “total amateur hour.” How that happens for a Secretary of State (or a President) is a rather serious question.

Bear in mind that this would be the right setup for purposely leaking information while still being able to claim ignorance, or at least incompetence. I have no idea whether that’s true or not, but I do have to wonder.

2. No one broke into Podesta’s computer.

John Podesta, by all available information, wasn’t hacked, as most people envision hacking. Instead, he fell for a phishing scheme. Someone pretending to be Google suckered him into giving them his password. (You didn’t really think the elite were smarter than the rest of us, did you?)

Once the phishers had Podesta’s password, the rest was simply a vacuuming operation. Then came some kind of handoff to Wikileaks, and the rest was history. And there will be fallout from this for a long time, whether or not media sellouts allow it to be reported. Lots of people are insulted and exposed in those emails.

3. Google has plenty of it.

John Podesta, if you’ve noticed, used a gmail address, meaning that Google sucked his messages up as they were being written – all of them. They also had a ton of Hillary’s “lost” emails. Google literally owned every email from these addresses and dozens of others involved:

john.podesta@gmail.com, cheryl.mills@gmail.com, brianefallon@gmail.com, lauren.elena.smith@gmail.com

And perhaps more importantly, they have everything from bigcampaign@googlegroups.com.

Please understand that Google processed those messages for profitable information immediately. If you have any doubt on this point, consider this: How long does it take them to show you ads for ski resorts after you search for ski boots?

Please don’t imagine that they don’t look at political things; those are far more valuable than your skiing habits, and Google survives by mining information. (In other words, they grab everything they can… which you agreed to in their terms of service.) Google doesn’t charge for your searches, do they? And yet they bring in billions of dollars per month.

This is a useful question: What might you do with tens of thousands of emails to and from insiders and acres of computers to sort them all? Well, that’s about what Google’s doing.

4. NSA has it all.

The NSA has almost everything. We’ve known for a decade or more that they were simply copying everything that went through AT&T facilities. Their data center in Utah was built to store and search all those communications.

William Binney, formerly a senior official at NSA, says that it was probably an intelligence worker behind the DNC leaks, and he might be right – they have it all.

The NSA, put simply, is the largest hacker collective on the planet. They can take over more or less what they want, when they want.

5. Other people have the emails.

All those “lost” emails had recipients, didn’t they? Sure they did, and all those people – and their email servers – have or had copies of everything. And yet I’m not aware of any effort to gather them all up.

This guy says hackers used his servers and that he has records… and that no one from the FBI has bothered to call him.

6. Julian Assange is a front man.

Another good thing to understand is that Julian Assange is the face of Wikileaks, but he doesn’t do all the work himself, and he’s not manning the switches. Lots of other people are doing the daily work. Julian just volunteered to stand in front. And given what’s been happening to him over the past six years or so, you have to say that he’s one seriously brave and tough guy.

One thing Julian gets solo credit for is exposing the Google-State Department connection. (Or perhaps partnership is a better term.) If you’d like the details, see this book by Assange. It’s pretty damning.

And, by the way, Google’s bosses have visited the Obama White House literally hundreds of times. And Eric Schmidt (Google’s big boss) is very close to the Hillary campaign.

* * * * *

Serious data protection requires a professional provider, not amateurs or hucksters. If you’re ready to be serious, Cryptohippie will let you try their service for free. One week, no credit card, no BS. Try it, then either buy or don’t. Use this link.

* * * * *

A book that generates comments like these, from actual readers, might be worth your time:

  • I just finished reading The Breaking Dawn and found it to be one of the most thought-provoking, amazing books I have ever read… It will be hard to read another book now that I’ve read this book… I want everyone to read it.

  • Such a tour de force, so many ideas. And I am amazed at the courage to write such a book, that challenges so many people’s conceptions.

  • There were so many points where it was hard to read, I was so choked up.

  • Holy moly! I was familiar with most of the themes presented in A Lodging of Wayfaring Men, but I am still trying to wrap my head around the concepts you presented at the end of this one.

Get it at Amazon ($18.95) or on Kindle: ($5.99)

TheBreakingDawn

* * * * *

Paul Rosenberg
www.freemansperspective.com

See the world as it really is and find freedom. Free updates.

We respect your privacy,
plain and simple.

Next Post:
Previous Post:
  • Stainless Steel Rat

    The hacks are one of the things I enjoy about this election.

    For decades, the government has said, “If you aren’t guilty, then what do you need to hide?” Now that the tables are turned, they’re singing a different tune.

    Privacy: Good for me, but not for thee.

    Yet another thing that makes it painfully obvious they truly think they are “our betters”.

  • URSULARICHES

    I read on my virtual travels that the UFO fanatics were perusing through Hillary and Podesta’s e-mails..>> UFO enthusiasts Hillary Podesta e-mails wikileaks << Yes I googled it and got a few results.

  • Gregory Cliveden

    Very revealing!
    The Conventioneers’ Guide To Cruzing Hillaryously Over Trump:
    Paperback at:
    https://www.createspace.com/6636864
    https://www.amazon.com/dp/1539464121
    Digital version for Kindle, Ipad, all other devices at:
    https://www.amazon.com/Conventioneers-Guide-Cruzing-Hillaryously-Trump-ebook/dp/B01MA4EYJM
    The Spring, Summer and Fall of The Donald, his devastation of his 16 Primary Opponents to the point that many of them–Died in the Wool Republicans and the so-called Establishment–will not support his Candidacy—Unprecedented!!!; his nomination at The Republican National Convention and the aftermath in his struggle for the Presidency with Hillary, the Media, self-anointed Pundits, and Wannabes trying to derail him by accusing him of being a White Supremist, a Racist, a Misogynist… ALSO, A PRIMER ON HOW TO USE OBAMA’S NATURAL BORN CITIZEN ISSUE AS AN AFFIRMATIVE DEFENSE IN CRIMINAL AND OTHER LITIGATION. All the while walking about Cleveland, the host site of The Q and The Republican National Convention held therein, and commenting critically on the Candidates and their campaigns.

  • tanstagcopc

    Why the Hillary campaign keeps saying “the Russians did it” makes no sense when you consider all the OTHER enemies they’ve managed to garner through the years.

    I wouldn’t be surprised if the real hackers weren’t hired by two women the world knows are angry at Billary over the way the Clintons have treated them: Juanita Broaddrick and Monica Lewinsky!

Read more:
nowhere
Nowhere to Run To; Nowhere to Thrive

It’s something of a truism in physics that closed systems tend toward entropy. In other words, building walls around a...

Close