[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

The Truth About This Piece Of Sh*t

Breaking: 18,000 Epstein emails just dropped.

Memphis: FOUR CHILDREN shot inside a home (National Guard Inbound)

Elon Musk gives CHILLING WARNING after Charlie Kirk's DEATH...

ActBlue Lawyers Subpoenaed As House GOP Investigation Into Donor Fraud Intensifies

Cash Jordan: Gangs EMPTY Chicago Plaza... as Mayor's "LET THEM LOOT" Plan IMPLODES

Trump to send troops to Memphis

Who really commands China’s military? (Xi Jinping on his way out)

Ghee: Is It Better Than Butter?

What Is Butyric Acid? 6 Benefits (Dr Horse says eat butter, not margarine!)

Illegal Alien Released by Biden Admin Beheads Motel Manager In Dallas,

Israel Wants to Unite Itself by Breaking the World -

Leavitt Castigates Journalists To Their Faces Over Lack Of Iryna Zarutska Killing Coverage

Aussie Students Spend The Most Time In School, Polish Kids The Least

Tyler Robinson, 22, Named As Suspect In Charlie Kirk Assassination

How They Control the World and Their Secret Weapon

Newmont Pulls Out of Canada, Delists TSX

Eva Vlaardingerbroek's Warning: Elites Plan to Make Humans Immortal in the Cloud

The $7.9 Trillion Company You've Never Heard Of

CCP's motivation for (the Korean) war was to grow its military: US-China-Russia relations

Here is What REALLY Happened on 9/11

US Deficit Explodes In August Despite Rising Tariff Revenues As Government Spending Soars

Adolf Hitler had 'some good ideas', a fifth of Gen Z Americans believe according to Daily Mail poll

New 4um Site Software Ready For Review

"Calling Me Names Is NOT Gonna Stop Me!" Tucker Carlson on Ted Cruz, Trump, Israel & 9/11

Vietnam Erases 86 Million Bank Accounts – (NWO) Great Reset in Motion

Vietnam Erases 86 Million Bank Accounts – (NWO) Great Reset in Motion

Rifle Ammo In Kirk Assassination Engraved With 'Transtifa' Ideology: Law Enforcement Memo

Time for MASSIVE change in America (Black Crime and the Media))

How Much Are Teachers Paid Around The World?


(s)Elections
See other (s)Elections Articles

Title: Did the Russians Hack Hillary?
Source: [None]
URL Source: http://original.antiwar.com/andrew- ... 6/12/14/russians-hack-hillary/
Published: Dec 15, 2016
Author: Andrew P. Napolitano
Post Date: 2016-12-15 09:19:38 by Ada
Keywords: None
Views: 1174
Comments: 5

Earlier this week, leaders of the Democratic National Committee and former officials of Hillary Clinton’s presidential campaign made the startling allegation that the Russian government hacked into Clinton’s colleagues’ email accounts to tilt the presidential election toward Donald Trump. They even pointed to statements made by CIA officials backing their allegations.

President-elect Trump has characterized these claims as "ridiculous" and just an "excuse" to justify the Clinton defeat, saying they’re also intended to undermine the legitimacy of his election. He pointed to FBI conclusions that the CIA is wrong. Who’s right?

Here is the back story.

The American intelligence community rarely speaks with one voice. The members of its 17 publicly known intelligence agencies – God only knows the number of secret agencies – have the same biases, prejudices, jealousies, intellectual shortcomings and ideological underpinnings as the public at large.

The raw data these agencies examine is the same. Today America’s spies rarely do their own spying; rather, they rely on the work done by the National Security Agency. We know that from the Edward Snowden revelations. We also know from Snowden that the NSA can monitor and identify all digital communications within the United States, coming into the United States and leaving the United States. Hence, it would be foolhardy and wasteful to duplicate that work. There is quite simply no fiber-optic cable anywhere in the country transmitting digital data to which the NSA does not have full-time and unfettered access.

I have often argued that this is profoundly unconstitutional because the Fourth Amendment requires a judicially issued search warrant specifically describing the place to be searched or the thing to be seized before the government may lawfully invade privacy, and these warrants must be based on probable cause of criminal behavior on the part of the person whose privacy the government seeks to invade.

Instead of these probable cause-based, judicially issued search warrants, the government obtains what the Fourth Amendment was written to prohibit – general warrants. General warrants are not based on evidence of probable cause of criminal behavior; rather, they are based on government "need." This is an unconstitutional and absurd standard because the government will always claim that what it wants, it needs.

General warrants do not specifically describe the place to be searched or the thing to be seized; rather, they authorize the bearer to search where he wishes and seize whatever he finds. This is the mindset of the NSA – search everyone, all the time, everywhere – whose data forms the basis for analysis by the other agencies in the intelligence community.

In the case at hand, the CIA and the FBI looked at the same NSA-generated raw data and came to opposite conclusions. Needless to say, I have not seen this data, but I have spoken to those who have, and they are of the view that though there is evidence of leaking, there is no evidence whatsoever of hacking.

Leaking is the theft of private data and its revelation to those not entitled or intended to see it. Hacking is remotely accessing an operational system and altering its contents – for example, removing money from a bank account or contact information from an address book or vote totals from a candidate’s tally. When Trump characterized the CIA claim that the Russians hacked the DNC and Clinton campaign emails intending to affect the outcome of the election as ridiculous, this is what he meant: There is no evidence of anyone’s altering the contents of operational systems, but there is evidence – plenty of it – of leaking.

If hackers wanted to affect the outcome of the election, they would have needed to alter the operational systems of those who register voters and count votes, not those who seek votes.

During the final five weeks of the presidential campaign, WikiLeaks released tens of thousands of DNC and Clinton campaign emails to the public. WikiLeaks denies that its source was the Russian government, yet for the purposes of the DNC and Clinton campaign claims, that is irrelevant because whoever accessed these emails did not alter the operational systems of any of the targets; the accessor just exposed what was found.

We do not know what data the president-elect examined. Yet in six weeks, he will be the chief intelligence officer of the U.S., and he’ll be able to assimilate data as he wishes and reveal what he wants. He should be given the benefit of the doubt because constitutionally, the intelligence community works for him – not for Congress or the American people.

Who did the leaking to WikiLeaks? Who had an incentive to defeat Clinton? Whose agents’ safety and lives did she jeopardize when she was extremely careless – as the FBI stated – with many state secrets, including the identity and whereabouts of U.S. intelligence agents and resources?

The answer is obvious: It was the same intelligence community that cannot agree on the meaning of the raw data it has analyzed.

Someone leaked the Democrats’ and the Clinton campaign’s private work, and the government has a duty to find the person or entity that did so, even if it was one of the government’s own. Though the truthful revelation of private facts may have altered some voters’ attitudes, there is no evidence that it altered ballot totals. The law guarantees fair elections, not perfect ones.

Did the Russians hack Hillary Clinton? No. No one did. But some American intelligence agents helped WikiLeaks to expose much dirty laundry.

Andrew P. Napolitano, a former judge of the Superior Court of New Jersey, is the senior judicial analyst at Fox News Channel. Judge Napolitano has written seven books on the US Constitution. The most recent is Suicide Pact: The Radical Expansion of Presidential Powers and the Lethal Threat to American Liberty. To find out more about Judge Napolitano and to read features by other Creators Syndicate writers and cartoonists, visit www.creators.com.

COPYRIGHT 2016 ANDREW P. NAPOLITANO – DISTRIBUTED BY CREATORS.COM

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: Ada (#0)

Probably not. She can't even seem to figure out how to send emails by herself,so there was no need to hack her. It was right there for anyone to see that wanted to look.

sneakypete  posted on  2016-12-15   18:30:27 ET  Reply   Trace   Private Reply  


#2. To: sneakypete (#1)

Apparently there were foreign IP addresses peaking at her emails, some of which were classified. If she were so inclined (and KIM this is Hillary) she could have been selling classified material via her low-security server.

Ada  posted on  2016-12-15   21:53:06 ET  Reply   Trace   Private Reply  


#3. To: Ada (#2)

Apparently there were foreign IP addresses peaking at her emails, some of which were classified. If she were so inclined (and KIM this is Hillary) she could have been selling classified material via her low-security server.

I have no doubt at all that she would do it for fun. The profit is the icing on the cake. Once again,this means there was no real reason to hack her.

sneakypete  posted on  2016-12-15   22:20:34 ET  Reply   Trace   Private Reply  


#4. To: Ada (#0) (Edited)

There is quite simply no fiber-optic cable anywhere in the country transmitting digital data to which the NSA does not have full-time and unfettered access.

I have often argued that this is profoundly unconstitutional because the Fourth Amendment requires a judicially issued search warrant specifically describing the place to be searched or the thing to be seized before the government may lawfully invade privacy, and these warrants must be based on probable cause of criminal behavior on the part of the person whose privacy the government seeks to invade.

Instead of these probable cause-based, judicially issued search warrants, the government obtains what the Fourth Amendment was written to prohibit – general warrants. General warrants are not based on evidence of probable cause of criminal behavior; rather, they are based on government "need." This is an unconstitutional and absurd standard because the government will always claim that what it wants, it needs.

General warrants do not specifically describe the place to be searched or the thing to be seized; rather, they authorize the bearer to search where he wishes and seize whatever he finds. This is the mindset of the NSA – search everyone, all the time, everywhere – whose data forms the basis for analysis by the other agencies in the intelligence community.

More on those FISA "Court" issues:

Former Surveillance Court Judge Disputes Charge of Coordination With NSA - thenewamerican.com; Excerpts:

Tuesday, 02 July 2013

Written by Joe Wolverton, II, J.D.

FISA court (officially the Foreign Intelligence Surveillance Court [Note: not "Domestic Surveillance Court"])

Unlike traditional hearings, at the FISA court, a representative of the Justice Department presents the federal government’s case, arguing for permission to begin surveillance of an identified target. That target, however, is not afforded the same opportunity for representation. In terms of due process, that means that the person being targeted by the NSA or other government agency is not allowed to challenge the surveillance or the evidence of the government’s compelling interest in his data or the content of his electronic communication.

In a criminal court, an accused person is guaranteed substantive and procedural due process. These safeguards are designed to protect the innocent and to require that the government have convincing evidence of the commission of some crime on the part of the accused.

This essential guard against despotism is eliminated in the FISA court. The accused are denied even cursory due process. This chilling fact of FISA court procedure is made even worse when one considers that nearly every request made by the federal snoops is approved by these “judges.”

In the letter addressed to Senator Harry Reid (D-Nev.), the Justice Department reported that in 2012, of the 1,789 requests made by the government to monitor the electronic communications of citizens, not a single one was rejected.

The court, established specifically to judge the merits of applications by the government to spy on citizens, gave a green light to every government request for surveillance.

Not content to be a mere formality for electronic surveillance, the FISA court also held the coats of the FBI while that agency carried out the searches and seizures set out in 212 applications.

Perhaps the most disturbing effect of these FISA court figures is the fact that the government considers the protections of the Fourth Amendment to be nothing more than a “parchment barrier” that is easily torn through. Now that the Constitution is regarded by the federal government as advisory at best, there is nothing standing between the citizens of this nation and the construction of a 21st century panopticon [Wikipedia Ref.].

In this country, then, every citizen is now a suspect and the scope of the surveillance is being expanded to place every word, every movement, every text, every conversation, every e-mail, and every social media post under the never-blinking eye of the federal domestic spying apparatus. [4um Ref. - Third Amendment]

The hour is now late if this Republic is to remain a land under the rule of law. To that end, it is critical that Americans recognize that the FISA court’s rubber stamping of the exercise of such sweeping surveillance programs is in direct, open, and hostile violation of the Constitution. The Fourth Amendment to the Constitution clearly states:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

The way the FISA court works sounds very similar to the Star Chamber, an English court of the 14th to 17th centuries that met in secret, with no record of indictments, no identification of witnesses, and no transcript of the proceedings.

Eventually this court was used as a political weapon, a way for the king and the Parliament to persecute their enemies and keep the dirty details hidden from the public.

The analogy of the FISA court’s absolute approval of requests by the government to monitor citizens’ electronic communication to the decisions of the Star Chamber is apt and accurate on many points.

FBI director nominee Comey defends FISA court, surveillance in Senate hearing - The Washington Times; Excerpts:

By Jerry Seper - Tuesday, July 9, 2013

[Comey] dismissed arguments that the court was a “rubber stamp.” “Anyone who knows federal judges and has appeared before federal judges knows that calling them a rubber stamp shows you don’t have experience,” Mr. Comey told the Senate Judiciary Committee during his confirmation hearing. ... “That combination of judicial involvement, congressional oversight, [inspector general] oversight, results in a very effective regime,” he said,

4um Ref. for a 2014 movie by Dinesh D'Souza. Five minute Surveillance and FISA segment starts at 1:07:28 to 1:12:12. Transcription below starting at 1:09:06.

Allan Dershowitz, Attorney: "The FISA Court should not be allowed to use the term 'court'. It is not a court. A court by definition means an institution that hears both sides of a case and controversy."

U.S. Senator Rand Paul (R-Kentucky): "Due Process is in open court -- adversarial process on both sides of it -- but it's not in a secret court, FISA, with nobody to advocate for the individual that's being spied upon."

Allan Dershowitz, Attorney: "[Those] 'judges' should not be allowed to wear robes. They shouldn't be allowed to use the word 'judge'. They shouldn't be allowed to use the word 'court' and it's misleading the public."

-------

"They're on our left, they're on our right, they're in front of us, they're behind us...they can't get away this time." -- Col. Puller, USMC

GreyLmist  posted on  2016-12-28   9:39:32 ET  Reply   Trace   Private Reply  


#5. To: All (#4) (Edited)

FISA court (officially the Foreign Intelligence Surveillance Court [Note: not "Domestic Surveillance Court"])

Theory at a businessinsider.com article Jun. 7, 2013. Excerpt:

having a foreign contractor bug the telecom grid would mean that the NSA gained access to most of the domestic traffic flowing through the U.S. without technically doing it themselves.

This would provide the NSA, whose official mission is to spy on foreign communications, with plausible deniability regarding domestic snooping.

-------

"They're on our left, they're on our right, they're in front of us, they're behind us...they can't get away this time." -- Col. Puller, USMC

GreyLmist  posted on  2016-12-28   10:04:45 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]