Bitcoin Forum
October 14, 2024, 03:32:08 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 [201] 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 ... 562 »
4001  Other / Politics & Society / Re: Is Hillary Clinton Trustworthy? on: September 02, 2015, 02:50:28 PM



MSNBC: Hillary's Secret E-Mails Were 'Defensive' Reaction to Enemies





Atlantic magazine editor Steve Clemons spun Hillary Clinton's use of a private, unsecured e-mail server as the natural, "defensive" reaction to being "under political assault" by people like Ken Starr. On Tuesday's Andrea Mitchell Reports, the MSNBC contributor exonerated, "We don't know exactly what the rationale is, but there was a certain defensiveness that makes a lot of sense when you look back at how under assault the Clintons have been."

Clemons allowed, "This is a family, you know, a franchise, if you will, that has been under political assault for a very long time." The journalist insisted that in the wake of the Clintons's battle with Ken Starr, with Whitewater and the "constant conspiratorial atmosphere around them," using a separate e-mail server "was an act of defensiveness to try and protect some bit of their terrain from enemies that I think they feel are embedded all around them."


Mitchell began the discussion by reading an involved series of exchanges between Clinton and aide Huma Abedin. Government tech officials were confused as to what Clinton's actual e-mail address was. Making an actually salient point, the Andrea Mitchell Reports anchor opined, "So, Steve, her original explanation was this was convenient. This hardly seems convenient."

Further justifying, Clemons insisted that the then-Secretary of State was "dealing with lots of people who had come just out of the Bush administration."

A transcript of the exchange is below:


12:03

ANDREA MITCHELL: Now, Huma Abedin, the closest aide of course and long time assistant and moving up the ranks with Hillary Clinton. At one point, she's e-mailing with Clinton, "do you know what this is?" And Abedin, says, "your e-mail must be back up. What happened is Judith sent you an e-mail. It bounced back. She called the e-mail help desk at State, I guess assuming you had State e-mail and told them that. They had no idea it was you, just some random address. So they e-mailed. Sorry about that. But, regardless, means your e-mail must be back. Are you getting other messages?"  So, Steve, her original explanation was this was convenient. This hardly seems convenient.

STEVE CLEMONS (MSNBC contributor): This is a family, you know, a franchise, if you will, that has been under political assault for a very long time. And after things like Ken Starr and his investigation, Whitewater and the constant conspiratorial atmosphere around them, this was an act of defensiveness to try and protect some bit of their terrain from enemies that I think they feel are embedded all around them.

MITCHELL: The enemies being --

CLEMONS: You never know.

MITCHELL: Congress, the press?

CLEMONS: It could be someone who could tear her down. It could be people working in the government. When you're working in a State Department, you're dealing with lots of people who had come just out of the Bush administration. We saw the politicization of appointments and what not there. You know, we don't know exactly what the rational is, but there was a certain defensiveness that makes a lot of sense when you look back at how under assault the Clintons have been.


http://newsbusters.org/blogs/nb/scott-whitlock/2015/09/01/msnbc-hillarys-secret-e-mails-were-defensive-reaction-enemies-all


--------------------------------------------
 Grin Cheesy Grin


4002  Other / Politics & Society / Re: OLDEST KORAN ‘DESTABILISES’ ISLAMIC HISTORY, SCIENTISTS SAY IT PRE-DATES MOHAMED on: September 02, 2015, 02:14:38 PM
Of course I am not a muslim and maybe there are 1000's variations of the koran...?
There are probably thousands of variations of the Qur'an, but in accordance with Islamic beliefs there is only one true Qur'an. That is why there has been many disputes about whether or not a translated Qur'an is the true Qur'an.


Was that koran found a true koran or not?


4003  Other / Politics & Society / Re: What's your opinion of gun control? on: September 02, 2015, 02:12:45 PM



New anti-gun strategy: “swatting” open carry permit holders


Here’s a new trend which can only end badly. Having lost one battle after another in the courts, anti-Second Amendment groups have begun pushing some “extra-legal” means to intimidate legal gun owners in the public square. Unfortunately, the method of choice is probably going to wind up getting somebody killed. You may be familiar with the term “SWATting” which rose to prominence when hackers began making phony calls to 9-1-1 claiming some sort of life threatening emergency at the homes of their targets (political or otherwise) in the hopes of sending armed officers to invade the home. That dangerous ploy obviously seems like a great idea to some prominent anti-gun groups and they are encouraging their supporters to do the same to people who are observed carrying in public. (Fox News)

As more states relax rules about open-carrying of guns, the Coalition to Stop Gun Violence has taken to social media to urge the public to assume gun-toters are trouble, and to call the cops on anyone they feel may be a threat.

“If you see someone carrying a firearm in public—openly or concealed—and have ANY doubts about their intent, call 911 immediately and ask police to come to the scene,” the group wrote on its widely followed Facebook page. “Never put your safety, or the safety of your loved ones, at the mercy of weak gun laws that arm individuals in public with little or no criminal and/or mental health screening.”

That approach, according to a blog post by Ohio-based Buckeye Firearms Association, could give rise to needless, tense confrontations between police and gun owners. The association and other similar groups liken the tactic to “swatting,” or the act of tricking an emergency service into dispatching responders based on a false report.



While this is a bad idea (and a criminal one) under any circumstances, it’s a particularly cynical and hypocritical move on the part of the gun grabbers. They tend to be almost exclusively liberal and have a large crossover with the same groups who are constantly complaining about violent encounters between the police and suspects. The atmosphere around the nation is particularly tense for law enforcement officers as more and more of them are murdered and criminals become more brazen. Sending the cops out on a call where they have been falsely informed that someone is “acting suspicious” and is clearly armed just puts everyone on a hair trigger… literally.

Granted, in the vast majority of cases, a well trained gun owner is going to calmly respond to any police who approach him, not make any motions which look like they are going to draw their weapon and simply ask the officer what’s going on. At that point the police can ask about a permit (if in a state where one is required) and ascertain the situation. But there are always exceptions to the rule and if this goes wrong you could easily see a tragedy where there was no problem at all. And even if things work out in a completely peaceful fashion, you’ve just wasted the time of the cops who could have been out chasing down actual criminals. This is a disgusting tactic, and people found to be phoning in such bogus reports should be held accountable for abusing the emergency response system and put in jail. As the FBI notes, this has already happened.

Since we first warned about this phone hacking phenomenon in 2008, the FBI has arrested numerous individuals on federal charges stemming from swatting incidents, and some are currently in prison (see sidebar). Today, although most swatting cases are handled by local and state law enforcement agencies, the Bureau often provides resources and guidance in these investigations.

“The FBI looks at these crimes as a public safety issue,” said Kevin Kolbye, an assistant special agent in charge in our Dallas Division. “It’s only a matter of time before somebody gets seriously injured as a result of one of these incidents.”


Perhaps the Coalition to Stop Gun Violence and their related ilk should stick to more traditional methods of trying to undermine the Second Amendment. One of the most popular is trying to twist poll results to make people think that gun rights aren’t as popular and cherished by Americans as they actually are. (For a great example of this, see this Mark Berman explainer in the WaPo.) It’s dishonest as the day is long, but at least it’s not directly getting anyone killed.


http://hotair.com/archives/2015/09/02/new-anti-gun-strategy-swatting-open-carry-permit-holders/


4004  Other / Politics & Society / Re: What's your opinion of gun control? on: September 02, 2015, 02:09:54 PM
The world will be better place if there's no guns/wars. My point of view about guns/wars is this. We use natural resources wrong way.

I would agree with you on both points.  Our allocation of resources is terrible; I don't think there's any questioning that.

So the issue with guns/war is that they already exist and are in the hands of millions of people.  Most of those people are responsible folks not looking to use guns offensively towards another person.  Some use it for defense, sport, hunting, protection from wild animals, etc.  The issue is the small % of mentally ill or violent people.  I would assume that most of them would acquire guns illegally from the black market, to the point that they bypass any safety training or testing that the rest have to go through.

If there is any possibility of acquiring a gun illegally, then the entire gun control conversation doesn't address the issue.  Right now I'd say it can be acquired without too much difficulty, and all you need is cash.


Our allocation of resources is not terrible. It is the law of Evolution. Those wanting to put more chances to have their genes move along generations went near places with resources. Salt. Most big european cities started near a salt mine. We all know this is how the roman empire was paying his soldiers. We still use that word today, with the same latin root: salary.

That is why humans move around: more resources, a better place away from wars or be killed. Never the opposite (unless isis)

 Cool

4005  Other / Politics & Society / Re: CEO who raised workers’ minimum pay to $70K hits predictable problems on: September 02, 2015, 01:55:55 PM

I don't think that character cares. That's class 101 on forum etiquette...


I’m deeply sorry for misquoting you; I screw up when I was editing the post, I corrected my post and again I apologize for my mistake.




Thank you



4006  Other / Politics & Society / Re: Is Hillary Clinton Trustworthy? on: September 02, 2015, 01:51:19 PM
Why is she still even trying..

The polls are going down on her and it is clear that many don't find her trustworthy


She beats the clock by making it last, then she becomes president, then she uses presidential pardon on herself. Her plan maybe...


4007  Other / Politics & Society / Re: OLDEST KORAN ‘DESTABILISES’ ISLAMIC HISTORY, SCIENTISTS SAY IT PRE-DATES MOHAMED on: September 02, 2015, 01:48:20 PM
I think that such an important document should be thoroughly checked and analyzed by leading experts.
There have already been examples of recent religious books take over some elements of the old religious books.
Koran also took some stories from Bible and probably it is possible that Koran used some customs and traditions (even religious stories) of the area where Islam originated.
In this way, perhaps Muhammad wanted to find easier way to reach new followers.
This is potentially a very explosive material and should be left to experts to verify its authenticity, and not to allow religious and political leaders to take advantage of this discovery for their own purpose.



The Bible is 66 books tied together. The koran is one book. That is the truth of the koran. You cannot find any element found prior to this event. The angel gabriel would not have wasted its time and would have just told mohamed what books to read...

https://en.wikipedia.org/wiki/Muhammad%27s_first_revelation

So it is impossible to have a half written koran before the koran...

Of course I am not a muslim and maybe there are 1000's variations of the koran...?


4008  Other / Politics & Society / Re: “God bless Planned Parenthood” – PP Uses Abortions to Sell Baby Parts on: September 02, 2015, 01:39:29 PM
I want to know what these fetal body parts are being used for. If they are going to be used to find ways to help people live healthy and pain-free lives this does not bother me in the least.

they are being used in Medicine,soup etc.. it disgusting specially if you saw the photos. I'm going to say where it's from but many people know where. And I bet you guess where its from. Just thinking about it makes my stomach turn. I should have never red this thread and those articles.


The light at the end of a dark tunnel may be painful to your eyes at first, but then your turn back and look at where you were. Knowledge is a good thing. Knowledge should be shared.

Be glad you know the truth. Seek and help those still in the tunnel, by sharing what you've learn in this thread.


4009  Other / Politics & Society / Re: Up Like Trump on: September 02, 2015, 01:33:12 PM



Donald Trump billboard getting attention near Grand Junction





ORCHARD MESA, Colo. - A Donald Trump billboard on the Western Slope is getting a lot of attention.

The billboard depicts Donald Trump in an armor suit fighting a dragon that says, "PC Muslim Marxist Media."

Trump's suit says "Make American Great Again."

The billboard is 10 feet high and 20 feet wide and is attached to a building just south of the US 50 bridge over the Colorado River on route to Orchard Mesa, near Grand Junction.

The billboard owner, Arvid Mosnes, told KJCT-TV that the depiction highlights how the heavily influenced media has ruined this country.

"Freedom of speech is everything, and that's why I really put the media in there, it’s politically correct Muslim Marxist influence media," Mosnes told the TV station.


http://www.thedenverchannel.com/news/western-slope/donald-trump-billboard-getting-attention-near-grand-junction


4010  Other / Politics & Society / Re: Teen coaxed friend to commit suicide, then tweeted how much she missed him on: September 02, 2015, 01:30:46 PM
http://q13fox.com/2015/02/27/investigators-say-teen-coaxed-friend-to-commit-suicide-then-tweeted-how-much-she-missed-him/

I am absolutely disgusted by this. This woman believes that men are nothing but disposable tools meant to end their lives in order to provide her with sympathy and attention from her peers. Michelle Carter should kill herself.


"Days prior to Roy’s suicide, Carter was allegedly telling her friends “it’s her fault that Conrad is dead, even though he was still alive and speaking and texting with her regularly,” police said.

South Coast Today reported that on July 11, 2014, Carter texted a friend saying she couldn’t locate Roy and was “a mess,” then an hour later texted Roy and allegedly said, “Let me know when you’re gonna do it.” "
I've red about this online.
I feel bad about the guy but girl needs help to.
Because if no helps her she'll do it again maybe this time she'll do the  killing.


After his death, Carter became a self-proclaimed advocate for mental health.

She organized a fundraising tournament in Roy’s memory and posted on Facebook and Twitter about her attempts to save her boyfriend’s life.

“Even though I could not save my boyfriend’s life, I want to put myself out here to try to save as many other lives as possible,” she wrote on Facebook.



-------------------------------------
She needs to go and get help while securely away from society.


4011  Other / Politics & Society / The race for the unbreakable password is almost over on: September 02, 2015, 02:59:57 AM





What Ashley Madison needed was quantum cryptography.

The same could be said for the U.S. Office of Professional Management, Home Depot and Anthem Health Insurance, and any number of hacker targets in recent years…even PBS.

Quantum cryptography is the use of physics, specifically quantum mechanics, to build secret codes. It is so secure, so difficult to intercept, some call it unhackable. Banking, medical, business and government records around the world could be made secure from outside intruders.

As the name suggests, the idea is based on quantum mechanics — a branch of physics that explains the peculiar behavior of atomic and subatomic particles. Theoretical physicist Richard Feynman once said, “It is safe to say that nobody understands quantum mechanics.” We’re going to take a stab in this article at explaining it. But before we dive into its murky principles, let’s tackle why quantum cryptography is needed in the first place.

Even though encryption has existed since the age of Caesar, it’s only in the last five to 10 years that the topic has moved from being small-scale — an attack on a home computer or a single company — to multi-level attacks that can impact millions of people at a time, said Richard Moulds, a data security, cryptography expert and vice president at Whitewood Encryption Systems. Think eBay, JP Morgan Chase or the federal Office of Personnel Management. The stakes have always been high: Codebreakers led to the execution of Mary Queen of Scots in 1587 and helped defeat the Axis powers in World War II. But modern data breaches implicate the personal information — home addresses, phone numbers, credit cards — of whole swaths of society, and the cost of dealing with these hacks are huge.

Data breaches cost U.S. companies $6.5 million on average in 2014, according to The Ponemon Institute. If your company lost over 500,000 records, this number jumped to $11.9 million.

Naturally, these costs get passed onto the consumer, and since 2005, the annual cost per capita for data breaches has risen from $138 to $217. That means you are losing 200 bucks each year due to data breaches. (For a cool visual of the world’s biggest hacks in recent years, check out Information is Beautiful.)



[...]
Hacking With Light

Hackers or codebreakers have become increasingly adept at breaking the modern security that safeguards digital information. That’s because at the end of day, most types of computer encryption and passwords are based on a random number, and hackers are getting better at guessing or stealing those numbers.

Take, for example, RSA encryption, which is the foundation for most Internet security today. RSA uses math to conceal data with two randomly selected prime numbers.

“Getting a [traditional] computer program to generate a random number is almost an oxymoron because computer programs do the same thing over and over and over again. They do what they’re programmed to do, and they don’t do things randomly,” Moulds said. “As the bad guys’ computers get better, faster and stronger, then in principle, those random numbers get easier to guess.”

Such was the case of last year’s hack of Sony Pictures. Infiltrators used an advanced computer program with enough brute force to guess the company’s passwords. Once inside, the hackers alleged to have collected sensitive data for nearly a year, before they started wiping many of the computers and tried to publicly damage the company’s reputation.

But if the Sony hack seemed bad, it pales in comparison with what could have happened, had the bad guys used a quantum computer.

The pursuit to build the first quantum computer mirrors the Cold War-era space race or the WWII-era hunt for a nuclear weapon. Such a computer would use the quantum physics of photons — light particles — to outmatch any traditional computer or digital security system that has ever been created.


Unlike classic computers that use electricity to represent information in binary bits (1s and 0s), quantum computers use photons to represent information as 1s, 0s or both values simultaneously. That’s because at the quantum level, photons can exist in more than one state at once. (Remember, quantum mechanics doesn’t make sense). As such, a quantum computer can make more than one calculation at once, significantly cutting the time it takes to process information. For instance, a quantum computer could guess the random numbers that reinforce most passwords and data encryption in a matter of minutes.

Last week, the National Security Agency issued a bulletin that warned companies to prepare for the emergence of a quantum computers.

“Our ultimate goal is to provide cost effective security against a potential quantum computer,” the statement reads.

The advisory, wrote Dan Goodin wrote for Ars Technica, signals the growing recognition that quantum computing “could soon represent a practical threat on U.S. national security. Until now, the lack of consensus about how long it will take for scientists to build a working quantum computer has kept the NSA from making such concrete recommendations.”

As Goodin points out, it could take 10 to 50 years before a quantum computer is ready to replace our PCs, but the components for such a device exist. On August 14, physicists at Bristol University in the UK announced that they had engineered a 4-inch by 1.5 inch optical chip that can serve as a quantum central processing unit (CPU).

“It can implement all the basic gates [or circuits] required for quantum computing,” said University of Bristol physicist Anthony Laing, who led the project. His group teamed with Nippon Telegraph and Telephone (NTT), a major telecommunications company, and their invention was reported in the journal Science.


[...]
The Antidote: An unbreakable quantum password

Quantum computers are knocking on humanity’s door. Google wants one. IBM wants one. The NSA wants one. The devices could solve complex math problems, create new drugs or speed up your Google searches, but when used nefariously, they could tap your encrypted messages. In fact, computer scientist Lov Grover and MIT mathematician Peter Shor conceived the “quantum software” for the job around 20 years ago.

So what can everyone else do to protect their digital messages and data from the potential of quantum hackers?

Simple. “You send the messages in a quantum state,” said Boston University quantum physicist Alexander Sergienko.

Quantum cryptography uses photons to send secret messages between two people. Think of it as a tin-can telephone, wherein a nylon string transmits two people’s voices via tin cans. With quantum cryptography, the string is replaced by a stream of photons — the basic unit of rays of light. So rather than sending email as electronic bits (1s and 0s), the two people send quantum messages using photons with two different physical states.

Due to the foundations of quantum — namely the Heisenberg Uncertainty Principle — it’s impossible to copy or intercept these photons without altering them and alerting the message recipient. To return to the tin-can telephone analogy, it’s impossible for an eavesdropper to intercept a quantum message without cutting the string.

“It would be the niche of absolutely secure communication. It means no one could break it. It’ll stay secure for 10, 20, 30 years down the road, unlike many conventional encryption technologies,” Sergienko said. As long as the equipment isn’t flawed, that is.

In 2003 and 2004, Sergienko teamed with scientists at Harvard University and BBN Technologies to build a three-node, 18-mile network for sending quantum encrypted messages along fiber optic cables in Boston. Since then, groups in Europe and Japan have demoed citywide networks. China plans to build a 1,200-mile quantum connection between Beijing and Shanghai, while the Ohio-based research and development company is constructing a quantum network that stretches from Boston to Georgia to California.

However, distance is a major impediment to quantum messages, as photons tend to be absorbed or disturbed the further that they travel through a fiber optic cable.

“Several papers show an upper limits of 124 to 186 miles. Also, the longer that you go, the lower the rate. The question is how useful is sending data 186 miles at one bit per second, when everything in modern telecommunications goes at megabits and gigabits per second?” said Sergienko.

This bandwidth issue could take years to fix. Scientists at Los Alamos National Laboratory in New Mexico are not only working on ways around it, but on how to reinforce our current data security with quantum mechanics. Last autumn, Los Alamos struck the biggest deal in its history with Richard Moulds’ parent company Allied Minds to commercialize these products.

Earlier this month, it unveiled a quantum-based generator that creates random numbers — the same random numbers that fuel passwords and other current forms of digital security. The quantum number generator — dubbed The Entropy Engine — looks like a regular computer board that you would slide into a server. Unlike passwords made by conventional computers, these quantum passcodes (or keys) would be difficult to guess by brute force, thus, impeding brute force attacks like the Sony Picture hack.

“Eventually, random number generators like the Entropy Engine would be placed in data centers to continuously generate passwords and data encryption. Most people would be consuming it as a security service from their email, Internet or cloud provider, rather than buying hardware. The cost might run between $5,000 and $10,000,” Moulds said.

Quantum random number generator churns out encrypted passcodes/keys so fast that it could make life harder for hackers like the ones that struck Ashley Madison or Home Depot, where an insider possibly revealed the passwords or weakened security systems so hackers could access an internal network.

“Our quantum random number generator generates entropy so rapidly that one could create new cryptographic keys very rapidly and not need to reuse keys,” said Los Alamos physicist and leader of the quantum communications team Raymond Newell. “As an analogy, if you only have one key, you’ll need to build all your locks to match it, and anyone who steals your key can open all your locks. But if you have many many keys, you can build a different lock for each [door], and anyone who steals a key can open only one lock.”

Moulds points out that another issue with the Ashley Madison hack “was that they only bothered to encrypt some of their data.”

“The attacker wasn’t interested in accessing accounts, he or she was focused on attacking and discrediting Ashley Madison as an organization. Therefore being able to steal large quantities of non-encrypted personal information was exactly what the attacker was looking for – details about sexual preferences is much more sensational than passwords,” Moulds said. “What this shows, is that for organizations that acknowledge that they might suffer a data breach (which really should be everyone) then they should encrypt all data that might be interesting to anyone. To encrypt only a subset of your data is like locking the front door but leaving the windows open.”

The next stage is beefing up security that involves moving quantum keys, which would involve a quantum network. Los Alamos ran its secure communications on a secret quantum Internet for two years and has since put that technology into a package called QkarD.


http://www.pbs.org/newshour/updates/unbreakable-quantum-password/




4012  Other / Politics & Society / Re: Is Hillary Clinton Trustworthy? on: September 02, 2015, 12:45:24 AM



Hillary Clinton Repeatedly Originated And Distributed Highly Classified Information


A review of recently released e-mails shows that former Secretary of State Hillary Clinton repeatedly originated and distributed highly classified national security information. Clinton’s classified e-mail missives were not constrained to State Department staff, either. She also sent classified information to Sidney Blumenthal, a former Clinton White House operative banned by the Obama White House.

An analysis by The Federalist of e-mails released by the State Department late Monday shows that scores of e-mails sent by Clinton contained highly confidential national security information from the beginning, even if they weren’t marked by a classification authority until later.

The original date of classification of Hillary’s e-mails can be discerned by noting the declassification dates noted next to redactions in the e-mails. Under a 2009 executive order signed by President Barack Obama, classified material in most circumstances is to be automatically declassified after 10 years. In some instances, that duration may be extended up to 25 years. In certain circumstances, classification authorities may adjust the classification duration based on the nature of the underlying information.

In this July 2010 e-mail, for example, the entirety of Hillary Clinton’s message was redacted prior to its public release under the federal FOIA law. The redactions of the material were provided pursuant to a provision of law protecting national security information. The printed redaction code “1.4(D),” cited next to the redaction and at the top of the document next to the official classification date, pertains to information on “[f]oreign relations or foreign activities of the United States, including confidential sources[.]” At the top of the document, a declassification date of July 1, 2025 is clearly noted:





That declassification date is highly significant because it is precisely 15 years after the date on which the e-mail was sent, rather than the date on which it was marked.

That is because under federal law, information is classified by nature, not by marking. As a result, federal classification authorities deemed that the information was classified the very second it originated, even if it was not marked as such until August 27, 2015. Also worthy of note is the fact that Hillary’s message is the only content in the entire document that is redacted and marked as classified. This means that she was not merely a helpless, passive recipient of classified national security information; she was the originator. And not only did she intentionally originate the classified information, she intentionally disseminated it via an unsecured, unsanctioned private e-mail server.

The e-mail was classified as “confidential.” According to the 2009 Obama executive order, the “confidential” classification level “shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security.”

Hillary Clinton’s campaign team has repeatedly tried to dodge responsibility for her distribution of classified information by claiming the information was not marked at the time. However, the nature of Hillary’s secret, off-books private e-mail scheme made it impossible for government authorities to mark as classified any information that originated on Hillary’s private server, since they had no access to it. In fact, one of the newly released e-mails shows that the agency’s IT department had no knowledge of her private e-mail address and server scheme.

In this May 2010 e-mail from Hillary Clinton, another large chunk of her message is redacted under the same 1.4(D) code and may not be declassified until 10 years have passed from the day Clinton sent the e-mail, rather than the date on which it was marked as classified. Once again, this declassification date shows that the information Clinton originated and disseminated was classified from the very beginning, even if it was not marked as such.





The same thing happened in 2009 in an e-mail exchange about Egypt. Once again, Hillary Clinton originated classified information and sent it over an unsecured, unclassified system. Because of its classified nature, the entirety of her e-mail was redacted for national security purposes. The declassification date of November 25, 2024 — precisely 15 years after the classified information originated in Hillary’s e-mail — shows that the information was considered to be classified at birth.




Hillary’s classified missives weren’t sent to just State Department personnel. She also disseminated highly classified information to private citizens who did not have security clearances. In this 2009 e-mail exchange, for example, Clinton sent confidential classified national security information to Sidney Blumenthal, a shady former Clinton White House operative who the Obama White House banned from federal employment:




The bulk of Hillary Clinton’s message to Blumenthal was redacted, under codes 1.4(D) and 1.4(B) because classification authorities determined it contained classified information “which reasonably could be expected to cause damage to the national security[.]” As was the case with other e-mails where Clinton originated classified information, authorities determined that the information was classified at birth and did not allow declassification until November of 2024 — 15 years after the e-mail was written and sent by Hillary, rather than 15 years after the information was marked.

The 2009 executive order signed by Obama states that U.S. officials who negligently disclose classified information to unauthorized individuals are subject to any and all federal sanctions provided for by law.



http://thefederalist.com/2015/09/01/breaking-hillary-intentionally-originated-and-distributed-highly-classified-information/



--------------------------------------------------
The smoking gun? Finally? One thing's for sure: hillary is confident if she falls, she won't go down alone...


4013  Other / Politics & Society / Re: Real Time Socialist Train Wreck (again) Happening Now in Venezuela on: September 02, 2015, 12:26:25 AM



Livid over crime, some Venezuelans resort to mob justice


VALENCIA/CARACAS (Reuters) - When a man they believed to be a thief sneaked into their parking lot in the Venezuelan city of Valencia, angry residents caught him, stripped him and beat him with fists, sticks and stones.

They tied him up and doused him in gasoline, according to witnesses, in one of what rights groups and media reports say are an increasing number of mob beatings and lynchings in a country ravaged by crime.

That August night, as locals say is common, three people had sneaked into Valencia's Kerdell residential block. In past such break-ins, thieves have made off with car tires, batteries and radios.

But this time, one resident spotted the trespassers and alerted other neighbors, according to the witnesses.

"'Kill him, give it to him,' they shouted," recounted Trina Castro, 82, in this once middle-class and peaceful area that is now plagued with garbage and graffiti. One reads: "Get ready, thief, here we burn you. Regards, Kerdell."

"I tried to stop the mob but the level of violence endangered anyone who opposed them," said another witness, asking to remain anonymous for fear of retaliation.

The unconscious man, who was not torched, was evacuated and is now in the local hospital's trauma ward, according to witnesses and Valencia's police. The police said they had no further details and did not identify the man.

A source at the Interior Ministry, who asked to remain anonymous because the minister is the only person authorized to speak on the record, said it does not usually comment on cases under investigation. Venezuela's state prosecutor's office said it had not issued a statement on the incident.

The Venezuelan Observatory of Violence (OVV), a non-governmental organization, estimates there were 40 cases in 2014 of lynchings, usually defined as extrajudicial killings by mobs.

The Observatory does not yet have figures for 2015, but a Reuters tally of media reports shows that in the last month alone there have been over a dozen mob-led beatings or lynchings.

There is no official public data on mob justice in once industry-rich Valencia or across a country that is in economic crisis. President Nicolas Maduro's administration often blames violence on political rivals seeking to sabotage the socialist government. Authorities have also accused foreign media of exaggerating crime in Venezuela.

'COLLECTIVE CATHARSIS'

The OVV and other rights groups say mob justice is rising as a response to perceived helplessness in the face of crime.

"Lynching is a collective catharsis. Everyone is guilty and no one is guilty," said Roberto Briceno of the OVV.

Venezuela has the world's second highest homicide rate, at 53.7 per 100,000 people in 2012, according to the United Nations, and weapons are easily available.

Courts are slow, judges are sometimes on the take and criminals are frequently released right after arrest, according to non-profit groups.

"The police can arrest criminals, but then the courts free them. As long as there's no response from the state, lynchings will increase," said Elisio Guzman, the head of state police in the state of Miranda.

Venezuela, a major oil exporter, is also mired in a deep economic crisis, hurt by currency controls and falling oil prices.

The International Monetary Fund expects a contraction of 7 percent to the economy this year and private economists calculate annual inflation has topped 100 percent. Shortages fuel a lucrative black market for car batteries and food, increasing incentives for theft.

'HIT THEM HARD'

While lynchings used to be primarily in low-income areas and in response to murders or rapes, monitoring groups say, there have been attacks recently in wealthier areas on common thieves.

Last month, two men were chased and badly beaten for stealing a purse in Caracas' affluent Los Palos Grandes neighborhood. Residents shouted "hit them hard" from their windows before police arrived and stopped the thrashing, witnesses said.

"The thieves are always after us. I don't agree with lynchings, but what other options do we have?" said witness Raquel Brito, 54.

A 20 year-old died in a middle-class area of Caracas in August after being punched, shot and burned for suspected robbery, media reported. Reuters could not independently confirm the case.

In Valencia, the Kerdell complex sits a block from a branch of the country's CICPC investigative police. But some residents here, as in much of Venezuela, say they tend to view security forces as overworked and corrupt.

Officers, in turn, frequently complain of poor pay and equipment.

Some Venezuelans are deeply shocked by the mob justice. Others fear violent citizens' response to crime will only breed more violence.

"Now we're all scared that retaliation could be in store," said retired mathematics and physics teacher Maria Perez, 66, who has lived in Kerdell for 30 years but is now thinking of moving out.


http://news.yahoo.com/livid-over-crime-venezuelans-resort-mob-justice-181843197.html


4014  Other / Politics & Society / Re: Up Like Trump on: September 02, 2015, 12:10:17 AM



Poll: 80% American Voters Consider Illegal Immigration A “Serious” Problem…



(Rasmussen) – Voters remain seriously worried about illegal immigration and still think stricter border control is the best way to stop it. But slightly fewer voters believe providing a pathway to citizenship will encourage more illegal immigrants to come.

A new Rasmussen Reports national telephone survey finds that 80% of Likely U.S. Voters regard illegal immigration as a serious problem in America today, with 50% who describe it as a Very Serious one. Twenty percent (20%) don’t consider illegal immigration a serious problem, but that includes only five percent (5%) who say it’s Not At All Serious. These attitudes have changed little since the first of the year.

By comparison, 63% say global warming is a serious problem, with 35% who view it as Very Serious.

When it comes to immigration reform, 58% of voters continue to think gaining control of the border is more important than legalizing the status of undocumented workers already living in the United States. That’s down from April’s recent high of 63%  but generally in line with surveys over the past three years. Thirty-five percent (35%) say it’s more important to grant legal status to those already living here, up five points from April.


http://www.rasmussenreports.com/public_content/politics/current_events/immigration/immigration_update


4015  Other / Politics & Society / Re: Reddit’s science forum banned climate deniers. on: September 01, 2015, 11:55:55 PM










http://www.weaselzippers.us/233150-obama-monday-melting-glaciers-caused-by-global-warming-losing-75-billion-tons-of-ice-each-year-obama-tuesday-we-need-new-heavy-duty-icebreaking-ships-for-arctic/


4016  Other / Politics & Society / Re: Up Like Trump on: September 01, 2015, 11:45:44 PM





4017  Other / Politics & Society / Re: Up Like Trump on: September 01, 2015, 11:32:54 PM

























4018  Other / Politics & Society / Re: Is Hillary Clinton Trustworthy? on: September 01, 2015, 11:11:06 PM



HIDDEN CAM: Hillary's National Marketing Director Illegally Accepting Foreign Contribution




4019  Other / Politics & Society / Re: So much for trying to bring philosophy to the public on: September 01, 2015, 11:09:50 PM
I'm sorry but... wat  Cheesy
Abstract reasoning? Where?? This is the kind of speech I imagine was trending back in 60's and 70's when the world was all pink and Shrek. Don't get me wrong, his 'piece' has a purpose, it may be a very crude attempt at 'harmonic reinforcement' but it is still in line with the big picture. I'm not at all surprised that they refused to publish it, his text is way too naive and blunt, even for philosophy.


EDIT - "After inquiring about its status after a period of silence..." Sorry couldn't resist, this cracked me up so bad  Cheesy


I must have missed that world...


4020  Other / Politics & Society / Re: OLDEST KORAN ‘DESTABILISES’ ISLAMIC HISTORY, SCIENTISTS SAY IT PRE-DATES MOHAMED on: September 01, 2015, 11:05:05 PM
Religions must not be subjected to discuss.People can believe into whatever they want.It can be a cow, Jesus, Mohommed or David.The only interesting for me is historical facts.If Koran was written before Mohammed, the history will be changed.On the otherhand the paper can be manufactured and kept till Koran can be written on it.Why?Because paper was a valuable and rare asset (not material) at that time.Paper can be manufactured long before Koran was written on it.The test to be applied to the ink will enlighten the facts.

Even if the ink itself proved to be earlier then Mohammed's birth, we must be respectful to the Muslims.That is what they believe and it does not disturb me unless they are fanatics threatening my safety and liberity.


True regarding the paper and the ink. The voynish manuscript is a good example. If more than one koran, as old as this one, are discovered, then it will be proof.

http://phys.org/news/2011-02-experts-age.html


Pages: « 1 ... 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 [201] 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 ... 562 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!