[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

The Empire Has Accidentally Caused The Rebirth Of Real Counterculture In The West

Workers install 'Alligator Alcatraz' sign for Florida immigration detention center

The Biggest Financial Collapse in China’s History Is Here, More Terrifying Than Evergrande!

Lightning

Cash Jordan NYC Courthouse EMPTIED... ICE Deports 'Entire Building

Trump Sparks Domestic Labor Renaissance: Native-Born Workers Surge To Record High As Foreign-Born Plunge

Mister Roberts (1965)

WE BROKE HIM!! [Early weekend BS/nonsense thread]

I'm going to send DOGE after Elon." -Trump

This is the America I grew up in. We need to bring it back

MD State Employee may get Arrested by Sheriff for reporting an Illegal Alien to ICE

RFK Jr: DTaP vaccine was found to have link to Autism

FBI Agents found that the Chinese manufactured fake driver’s licenses and shipped them to the U.S. to help Biden...

Love & Real Estate: China’s new romance scam

Huge Democrat shift against Israel stuns CNN

McCarthy Was Right. They Lied About Everything.

How Romans Built Domes

My 7 day suspension on X was lifted today.

They Just Revealed EVERYTHING... [Project 2029]

Trump ACCUSED Of MASS EXECUTING Illegals By DUMPING Them In The Ocean

The Siege (1998)

Trump Admin To BAN Pride Rainbow Crosswalks, DoT Orders ALL Distractions REMOVED

Elon Musk Backing Thomas Massie Against Trump-AIPAC Challenger

Skateboarding Dog

Israel's Plans for Jordan

Daily Vitamin D Supplementation Slows Cellular Aging:

Hepatitis E Virus in Pork

Hospital Executives Arrested After Nurse Convicted of Killing Seven Newborns, Trying to Kill Eight More

The Explosion of Jewish Fatigue Syndrome

Tucker Carlson: RFK Jr's Mission to End Skyrocketing Autism, Declassifying Kennedy Files


(s)Elections
See other (s)Elections Articles

Title: Did the Russians Hack Hillary?
Source: [None]
URL Source: http://original.antiwar.com/andrew- ... 6/12/14/russians-hack-hillary/
Published: Dec 15, 2016
Author: Andrew P. Napolitano
Post Date: 2016-12-15 09:19:38 by Ada
Keywords: None
Views: 1121
Comments: 5

Earlier this week, leaders of the Democratic National Committee and former officials of Hillary Clinton’s presidential campaign made the startling allegation that the Russian government hacked into Clinton’s colleagues’ email accounts to tilt the presidential election toward Donald Trump. They even pointed to statements made by CIA officials backing their allegations.

President-elect Trump has characterized these claims as "ridiculous" and just an "excuse" to justify the Clinton defeat, saying they’re also intended to undermine the legitimacy of his election. He pointed to FBI conclusions that the CIA is wrong. Who’s right?

Here is the back story.

The American intelligence community rarely speaks with one voice. The members of its 17 publicly known intelligence agencies – God only knows the number of secret agencies – have the same biases, prejudices, jealousies, intellectual shortcomings and ideological underpinnings as the public at large.

The raw data these agencies examine is the same. Today America’s spies rarely do their own spying; rather, they rely on the work done by the National Security Agency. We know that from the Edward Snowden revelations. We also know from Snowden that the NSA can monitor and identify all digital communications within the United States, coming into the United States and leaving the United States. Hence, it would be foolhardy and wasteful to duplicate that work. There is quite simply no fiber-optic cable anywhere in the country transmitting digital data to which the NSA does not have full-time and unfettered access.

I have often argued that this is profoundly unconstitutional because the Fourth Amendment requires a judicially issued search warrant specifically describing the place to be searched or the thing to be seized before the government may lawfully invade privacy, and these warrants must be based on probable cause of criminal behavior on the part of the person whose privacy the government seeks to invade.

Instead of these probable cause-based, judicially issued search warrants, the government obtains what the Fourth Amendment was written to prohibit – general warrants. General warrants are not based on evidence of probable cause of criminal behavior; rather, they are based on government "need." This is an unconstitutional and absurd standard because the government will always claim that what it wants, it needs.

General warrants do not specifically describe the place to be searched or the thing to be seized; rather, they authorize the bearer to search where he wishes and seize whatever he finds. This is the mindset of the NSA – search everyone, all the time, everywhere – whose data forms the basis for analysis by the other agencies in the intelligence community.

In the case at hand, the CIA and the FBI looked at the same NSA-generated raw data and came to opposite conclusions. Needless to say, I have not seen this data, but I have spoken to those who have, and they are of the view that though there is evidence of leaking, there is no evidence whatsoever of hacking.

Leaking is the theft of private data and its revelation to those not entitled or intended to see it. Hacking is remotely accessing an operational system and altering its contents – for example, removing money from a bank account or contact information from an address book or vote totals from a candidate’s tally. When Trump characterized the CIA claim that the Russians hacked the DNC and Clinton campaign emails intending to affect the outcome of the election as ridiculous, this is what he meant: There is no evidence of anyone’s altering the contents of operational systems, but there is evidence – plenty of it – of leaking.

If hackers wanted to affect the outcome of the election, they would have needed to alter the operational systems of those who register voters and count votes, not those who seek votes.

During the final five weeks of the presidential campaign, WikiLeaks released tens of thousands of DNC and Clinton campaign emails to the public. WikiLeaks denies that its source was the Russian government, yet for the purposes of the DNC and Clinton campaign claims, that is irrelevant because whoever accessed these emails did not alter the operational systems of any of the targets; the accessor just exposed what was found.

We do not know what data the president-elect examined. Yet in six weeks, he will be the chief intelligence officer of the U.S., and he’ll be able to assimilate data as he wishes and reveal what he wants. He should be given the benefit of the doubt because constitutionally, the intelligence community works for him – not for Congress or the American people.

Who did the leaking to WikiLeaks? Who had an incentive to defeat Clinton? Whose agents’ safety and lives did she jeopardize when she was extremely careless – as the FBI stated – with many state secrets, including the identity and whereabouts of U.S. intelligence agents and resources?

The answer is obvious: It was the same intelligence community that cannot agree on the meaning of the raw data it has analyzed.

Someone leaked the Democrats’ and the Clinton campaign’s private work, and the government has a duty to find the person or entity that did so, even if it was one of the government’s own. Though the truthful revelation of private facts may have altered some voters’ attitudes, there is no evidence that it altered ballot totals. The law guarantees fair elections, not perfect ones.

Did the Russians hack Hillary Clinton? No. No one did. But some American intelligence agents helped WikiLeaks to expose much dirty laundry.

Andrew P. Napolitano, a former judge of the Superior Court of New Jersey, is the senior judicial analyst at Fox News Channel. Judge Napolitano has written seven books on the US Constitution. The most recent is Suicide Pact: The Radical Expansion of Presidential Powers and the Lethal Threat to American Liberty. To find out more about Judge Napolitano and to read features by other Creators Syndicate writers and cartoonists, visit www.creators.com.

COPYRIGHT 2016 ANDREW P. NAPOLITANO – DISTRIBUTED BY CREATORS.COM

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: Ada (#0)

Probably not. She can't even seem to figure out how to send emails by herself,so there was no need to hack her. It was right there for anyone to see that wanted to look.

sneakypete  posted on  2016-12-15   18:30:27 ET  Reply   Trace   Private Reply  


#2. To: sneakypete (#1)

Apparently there were foreign IP addresses peaking at her emails, some of which were classified. If she were so inclined (and KIM this is Hillary) she could have been selling classified material via her low-security server.

Ada  posted on  2016-12-15   21:53:06 ET  Reply   Trace   Private Reply  


#3. To: Ada (#2)

Apparently there were foreign IP addresses peaking at her emails, some of which were classified. If she were so inclined (and KIM this is Hillary) she could have been selling classified material via her low-security server.

I have no doubt at all that she would do it for fun. The profit is the icing on the cake. Once again,this means there was no real reason to hack her.

sneakypete  posted on  2016-12-15   22:20:34 ET  Reply   Trace   Private Reply  


#4. To: Ada (#0) (Edited)

There is quite simply no fiber-optic cable anywhere in the country transmitting digital data to which the NSA does not have full-time and unfettered access.

I have often argued that this is profoundly unconstitutional because the Fourth Amendment requires a judicially issued search warrant specifically describing the place to be searched or the thing to be seized before the government may lawfully invade privacy, and these warrants must be based on probable cause of criminal behavior on the part of the person whose privacy the government seeks to invade.

Instead of these probable cause-based, judicially issued search warrants, the government obtains what the Fourth Amendment was written to prohibit – general warrants. General warrants are not based on evidence of probable cause of criminal behavior; rather, they are based on government "need." This is an unconstitutional and absurd standard because the government will always claim that what it wants, it needs.

General warrants do not specifically describe the place to be searched or the thing to be seized; rather, they authorize the bearer to search where he wishes and seize whatever he finds. This is the mindset of the NSA – search everyone, all the time, everywhere – whose data forms the basis for analysis by the other agencies in the intelligence community.

More on those FISA "Court" issues:

Former Surveillance Court Judge Disputes Charge of Coordination With NSA - thenewamerican.com; Excerpts:

Tuesday, 02 July 2013

Written by Joe Wolverton, II, J.D.

FISA court (officially the Foreign Intelligence Surveillance Court [Note: not "Domestic Surveillance Court"])

Unlike traditional hearings, at the FISA court, a representative of the Justice Department presents the federal government’s case, arguing for permission to begin surveillance of an identified target. That target, however, is not afforded the same opportunity for representation. In terms of due process, that means that the person being targeted by the NSA or other government agency is not allowed to challenge the surveillance or the evidence of the government’s compelling interest in his data or the content of his electronic communication.

In a criminal court, an accused person is guaranteed substantive and procedural due process. These safeguards are designed to protect the innocent and to require that the government have convincing evidence of the commission of some crime on the part of the accused.

This essential guard against despotism is eliminated in the FISA court. The accused are denied even cursory due process. This chilling fact of FISA court procedure is made even worse when one considers that nearly every request made by the federal snoops is approved by these “judges.”

In the letter addressed to Senator Harry Reid (D-Nev.), the Justice Department reported that in 2012, of the 1,789 requests made by the government to monitor the electronic communications of citizens, not a single one was rejected.

The court, established specifically to judge the merits of applications by the government to spy on citizens, gave a green light to every government request for surveillance.

Not content to be a mere formality for electronic surveillance, the FISA court also held the coats of the FBI while that agency carried out the searches and seizures set out in 212 applications.

Perhaps the most disturbing effect of these FISA court figures is the fact that the government considers the protections of the Fourth Amendment to be nothing more than a “parchment barrier” that is easily torn through. Now that the Constitution is regarded by the federal government as advisory at best, there is nothing standing between the citizens of this nation and the construction of a 21st century panopticon [Wikipedia Ref.].

In this country, then, every citizen is now a suspect and the scope of the surveillance is being expanded to place every word, every movement, every text, every conversation, every e-mail, and every social media post under the never-blinking eye of the federal domestic spying apparatus. [4um Ref. - Third Amendment]

The hour is now late if this Republic is to remain a land under the rule of law. To that end, it is critical that Americans recognize that the FISA court’s rubber stamping of the exercise of such sweeping surveillance programs is in direct, open, and hostile violation of the Constitution. The Fourth Amendment to the Constitution clearly states:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

The way the FISA court works sounds very similar to the Star Chamber, an English court of the 14th to 17th centuries that met in secret, with no record of indictments, no identification of witnesses, and no transcript of the proceedings.

Eventually this court was used as a political weapon, a way for the king and the Parliament to persecute their enemies and keep the dirty details hidden from the public.

The analogy of the FISA court’s absolute approval of requests by the government to monitor citizens’ electronic communication to the decisions of the Star Chamber is apt and accurate on many points.

FBI director nominee Comey defends FISA court, surveillance in Senate hearing - The Washington Times; Excerpts:

By Jerry Seper - Tuesday, July 9, 2013

[Comey] dismissed arguments that the court was a “rubber stamp.” “Anyone who knows federal judges and has appeared before federal judges knows that calling them a rubber stamp shows you don’t have experience,” Mr. Comey told the Senate Judiciary Committee during his confirmation hearing. ... “That combination of judicial involvement, congressional oversight, [inspector general] oversight, results in a very effective regime,” he said,

4um Ref. for a 2014 movie by Dinesh D'Souza. Five minute Surveillance and FISA segment starts at 1:07:28 to 1:12:12. Transcription below starting at 1:09:06.

Allan Dershowitz, Attorney: "The FISA Court should not be allowed to use the term 'court'. It is not a court. A court by definition means an institution that hears both sides of a case and controversy."

U.S. Senator Rand Paul (R-Kentucky): "Due Process is in open court -- adversarial process on both sides of it -- but it's not in a secret court, FISA, with nobody to advocate for the individual that's being spied upon."

Allan Dershowitz, Attorney: "[Those] 'judges' should not be allowed to wear robes. They shouldn't be allowed to use the word 'judge'. They shouldn't be allowed to use the word 'court' and it's misleading the public."

-------

"They're on our left, they're on our right, they're in front of us, they're behind us...they can't get away this time." -- Col. Puller, USMC

GreyLmist  posted on  2016-12-28   9:39:32 ET  Reply   Trace   Private Reply  


#5. To: All (#4) (Edited)

FISA court (officially the Foreign Intelligence Surveillance Court [Note: not "Domestic Surveillance Court"])

Theory at a businessinsider.com article Jun. 7, 2013. Excerpt:

having a foreign contractor bug the telecom grid would mean that the NSA gained access to most of the domestic traffic flowing through the U.S. without technically doing it themselves.

This would provide the NSA, whose official mission is to spy on foreign communications, with plausible deniability regarding domestic snooping.

-------

"They're on our left, they're on our right, they're in front of us, they're behind us...they can't get away this time." -- Col. Puller, USMC

GreyLmist  posted on  2016-12-28   10:04:45 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]