Hillary Clinton
"He's not wrong. All I've seen so far is "THE EMAILS PROVE IT!" But when you start getting granular with it, and looking at the individual emails, there's a lot of "please go through the proper channels", etc. People met with her after donating, yes. But plenty of people met with her, and got nothing from the ordeal. I'd also challenge you to separate what she did from normal lobbying. This is literally what lobbying looks like. Got a problem with it? Change the system! But stop pretending that HRC is the singular harbinger of corruption for participating in a pretty well known and well established practice. The email server thing is about all I can fault her with at this point... and even that is shaky. This is obviously some hindsight, but let's not pretend that doing things the proper way would have prevented some sort of hazardous security breach. Because as it turns out... A comprehensive, easy on the eyes loot filter:
http://www.pathofexile.com/forum/view-thread/1245785 Need a chill group exiles to hang with? Join us: http://www.pathofexile.com/forum/view-thread/1251403 | |
Meanwhile...
Julian Assange: WikiLeaks Info On Trump No Worse Than What He Says Publicly http://www.breitbart.com/tech/2016/08/27/wikileaks-info-donald-trump/ " Trump simply doesn't have the skeletons in his closet that Hillary has (or that pretty much most major politicians do). If he had, they would've come out and gone "BOO!" during the Primary. =^[.]^= =^[.]^= basic (happy/amused) cheetahmoticon: Whiskers/eye/tear-streak/nose/tear-streak/eye/ whiskers =@[.]@= boggled / =>[.]<= annoyed or angry / ='[.]'= concerned / =0[.]o= confuzzled / =-[.]-= sad or sleepy / =*[.]*= dazzled / =^[.]~= wink / =~[.]^= naughty wink / =9[.]9= rolleyes #FourYearLie Last edited by Raycheetah on Aug 27, 2016, 12:44:33 PM
|
|
"Shaky logic. Hey Julian, got any information on the next Quentin Tarantino movie? No? Then clearly Tarantino is never making another movie ever again. (This may be, but is not necessarily, true.) When Stephen Colbert was killed by HYDRA's Project Insight in 2014, the comedy world lost a hero. Since his life model decoy isn't up to the task, please do not mistake my performance as political discussion. I'm just doing what Steve would have wanted.
|
|
" You won't get no glory on that side of the hole.
| |
" Well, it's physically impossible to find worse info than what we know. Slow trainwreck. Add a Forsaken Masters questline https://www.pathofexile.com/forum/view-thread/2297942 Last edited by NeroNoah on Aug 27, 2016, 7:12:35 PM
| |
" If we were seeing the full slate of her emails, I'd agree that at worst, she is likely guilty of selling access for donations, and at best, making very bad judgement calls on how to conduct official business. Being that she had her team intentionally wipe the emails - "with a cloth or something" what we are seeing is likely the least damaging material she had. With the ease of spoofing MAC addresses and hard drive serial number/volume ID, we don't even know if the FBI has the original hard drives Hillary used. If Hillary is smart enough to be president, you'd think she'd be smart enough to avail herself of good technical advisers who would make sure no one uncovered the things she wanted to stay hidden - whether for "personal email" reasons or otherwise. Comparing her email use to Colin Powell's is a red herring and the people in the media doing so know it. Many of the secure policies and rules such as ICD 503 didn't exist when he took office, and the ones they had such as DCID 6/2 were newly in place and nowhere near as strict, because the level of concern, technology and the modern threat simply didn't exist yet. Here's an example of how stark and dramatically different the rules were as threats became worse and policy changed: For Powell
Spoiler
(this is DCID 6/3 which was implemented shortly after he took office ~May 2000)
"Compliance assessments should minimally include the following: a. Check individual systems for configuration vulnerabilities; file ownership and permissions, signs of hackers (e.g., sniffing, suspicious files), Trojan horse programs; and for incorrect version or unauthorized modification of critical system files. b. Check network for default accounts and easy passwords (e.g., dictionary words, passwords under eight characters); check for unprotected machines (e.g., print servers), and for improperly configured and otherwise vulnerable services. DCID 6/2 (which went into place in 1999, replacing DCID 1/22 and (NSDD) 145 was even more vague, the entire text of each is barely two pages long. The threats as we now know them, simply didn't exist to the same extent that they do now. For Hillary
Spoiler
(This is the relevant section in IDC 503, which took effect in ~Sept 2008 replacing DCID 6/5 and DCID 6/9, before she took office)
UNCLASSIFIED a. The principal goal of an IC element's information technology risk management process shall be to protect the element's ability to perform its mission, not just its information assets. Therefore, IC elements shall consider risk management an essential management function, and shall ensure that it is tightly woven into the system development life cycle. b. Because risk cannot be eliminated entirely, the risk management process must allow decision makers to consider the operational and economic costs of protective measures weighed against requirements for mission accomplishment. For example, a very high level of security may reduce risk to a very low level, but can be extremely expensive, and may unacceptably impede essential operations. (1) In determining the level of acceptable risk associated with the operation of an information technology system at a particular level of security, IC elements shall give appropriate weight to the often competing equities of mission and security requirements, budget consequences, operational performance efficiencies, schedule requirements, counterintelligence concerns, civil liberties and privacy protection, and other relevant policy requirements. (2) Elements of the IC shall weigh the potential costs of protective measures against security benefits gained, ensuring that security measures adopted and applied allow mission capabilities at acceptable risk levels. (3) Elements of the IC shall consider information sharing and collaboration across the IC and with appropriate foreign partners as essential mission capabilities. c. Elements of the IC shall determine the level of security required for an information system by considering the sensitivity of the information contained within the system, and by evaluating the system's ability to permit information sharing and collaboration across the Ie. d. Many IC information systems are interconnected. Therefore, the risk accepted by one element is effectively accepted by all, just as security limitations imposed by one are effectively imposed upon all. To promote interoperability and efficiency across the IC information technology enterprise, and to provide a sound basis for trust and reciprocal acceptance of individual element certification and accreditation across the enterprise, IC elements shall apply common standards and follow a common process to manage risk for their systems. e. Elements of the IC shall apply standards for information technology risk management established, published, issued, and promulgated by the IC CIO. Information technology risk management standards published, issued, and promulgated for the IC by the IC CIO may include standards, policies and guidelines approved by either or both NIST and the Committee on National Security Systems (CNSS). 2 UNCLASSIFIED leD 503 2. Accreditation a. Accreditation decisions are official management decisions that explicitly accept a defined level of risk associated with the operation of an information technology system at a particular level of security in a specific environment on behalf of an IC element. b. By accrediting an information system, an IC element approves it for operation at a particular level of security in a particular environment, and thus establishes the level of risk associated with operating the system and the associated implications for operations, assets, or individuals. c. In determining the level of acceptable risk associated with the operation of an information technology system, IC elements shall make decisions on accreditation in accordance with the policy for risk management described in this Directive and in any standards that may be subsequently issued pursuant to the authorities granted herein. d. Accreditation by IC elements shall ensure that risk is mitigated to the extent possible, commensurate with the sensitivity of the information in a system. Elements shall ensure that accreditation of their systems permits IC-wide collaboration and information sharing sufficient to ensure both element and IC-wide mission accomplishment. In accrediting any system over which it has accreditation authority as described below, an element shall accept only the minimum degree of risk required to ensure that the information system effectively supports mission accomplishment while appropriately protecting the information in the system. e. The head of each IC element may designate one or more Authorizing Officials to make accreditation decisions on behalf of the element head. The element head shall retain ultimate responsibility for all accreditation and associated risk management decisions made on his or her behalf. (1) An Authorizing Official shall be accountable to the element head for the accreditation and associated risk management decision, for which the element head is ultimately responsible and accountable. (2) An Authorizing Official has inherent U.S. Government authority and, as such, must be a government employee. (3) An Authorizing Official shall have a broad and strategic understanding of the IC and of his or her particular IC element and its place and role in the overall Ie. An Authorizing Official shall use this knowledge to assign appropriate weight to the often competing equities of mission and security requirements, budget consequences, operational performance efficiencies, schedule requirements, counterintelligence concerns, information sharing, civil liberties and privacy protection, and other relevant policy requirements. Then, in light of these factors, the Authorizing Official will determine the level of risk deemed acceptable for an accredited system. (4) An Authorizing Official should normally be the agency or element CIO. For IC elements without a CIO, an Authorizing Official shall be an executive of sufficient seniority to execute the decision-making and approval responsibilities described above on behalf of the element. 3 UNCLASSIFIED ICD 503 (5) An IC element Authorizing Official shall accredit or reaccredit systems the element funds, operates, or manages, as well as any operated by the element as an executive agent on behalf of the Ie enterprise. (6) An Authorizing Official's accreditation decision shall articulate the supporting rationale for the decision, provide an explanation of any terms and conditions for the authorization, and explain any limitations or restrictions imposed on the operation of the system and the reasons for those limitations or restrictions. An Authorizing Official shall state, in the accreditation decision documentation, whether the system is accredited, accredited with conditions, or not accredited. f. An Authorizing Official may appoint one or more Delegated Authorizing Officials to expedite accreditation approval of designated systems, and provide mission support. (1) A Delegated Authorizing Official has inherent U.S. Government authority and, as such, must be a government employee. (2) Like an Authorizing Official, a Delegated Authorizing Official shall have a broad and strategic understanding of the IC and of his or her particular IC element and its place and role in the overall IC. A Delegated Authorizing Official shall use this knowledge to assign appropriate weight to the often competing equities of mission and security requirements, budget consequences, operational performance efficiencies, schedule requirements, counterintelligence concerns, civil liberty and privacy protection, and other relevant policy requirements, and then in light of these factors, to detennine the level of risk deemed acceptable for an accredited system. g. In detennining which particular information systems may be accredited by a Delegated Authorizing Official, an Authorizing Official shall consider the potential impact on organizations or individuals should there be a breach of security of a particular system such that a loss of information confidentiality, integrity or availability results. (1) Confidentiality means the preservation of authorized restrictions on information access and disclosure, including means for protecting personal privacy, proprietary information, and classified information. A loss of confidentiality is the unauthorized disclosure of information. (2) Integrity means the prevention of improper modification or destruction of information and includes ensuring information non-repudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information. (3) Availability means ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information in an information system. h. A Delegated Authorizing Official shall only accredit an information system if the Authorizing Official determines that a breach of security of that information system would result in no more than a low to moderate potential impact on organizations or individuals. In no case shall a Delegated Authorizing Official make an accreditation decision for a system when an Authorizing Official deems a breach of security of that information system would result in a high potential impact on organizations or individuals. Maybe that's why they have these secure facilities - which Hillary wanted special Blackberries so she could use them in there - Here's what Colin Powell had to say about it: "What I did when I entered the State Department, I found an antiquated system that had to be modernized and modernized quickly. So we put in place new systems, bought 44,000 computers and put a new Internet capable computer on every single desk in every embassy, every office in the State Department. And then I connected it with software. But in order to change the culture, to change the brainware, as I call it, I started using it in order to get everybody to use it, so we could be a 21st century institution and not a 19th century." People claiming this was the same as Hillary's usage are as bad as Donald Trump is in trying to divert attention away from unpleasant subjects by laying false accusations. What next, should we excuse Hillary because Abraham Lincoln used an unsecured pen? PoE Origins - Piety's story http://www.pathofexile.com/forum/view-thread/2081910 Last edited by DalaiLama on Aug 28, 2016, 12:55:00 AM
| |
Secretary Clinton Has No Scheduled Events Until Sept. 26th Debate – All Events are Surrogates…
https://theconservativetreehouse.com/2016/08/27/wheres-hillary-secretary-clinton-has-no-scheduled-events-until-sept-26th-debate-all-events-are-surrogates/#more-120779 " https://www.willhillarywin.com/hillary-clintons-events/ =^[.]^= =^[.]^= basic (happy/amused) cheetahmoticon: Whiskers/eye/tear-streak/nose/tear-streak/eye/
whiskers =@[.]@= boggled / =>[.]<= annoyed or angry / ='[.]'= concerned / =0[.]o= confuzzled / =-[.]-= sad or sleepy / =*[.]*= dazzled / =^[.]~= wink / =~[.]^= naughty wink / =9[.]9= rolleyes #FourYearLie |
|
" Short reminder that Hillary hasn't held a press conference for 266 days. GGG banning all political discussion shortly after getting acquired by China is a weird coincidence.
| |
" I honestly think Hillary is just hoping to limp across the finish line, with a complicit media's tailwind at her back, to become the "Historic First Vagina in the White House." She could drop dead after she lifts her hand from the (now scorched and burning) Bible at her inauguration, but she WANTS her legacy, can taste it. I suspect she doesn't dare show her face in public for long simply because she might spazz out or even collapse. It'll be an Extra-Large Popcorn event to watch her debate Trump, but I expect she'll be granted all sorts of special considerations (being seated, frequent, long breaks, etc.) when that comes to pass. For now, her surrogates will churn the waters with chum for the faithful, and it will suffice. ='[.]'= =^[.]^= basic (happy/amused) cheetahmoticon: Whiskers/eye/tear-streak/nose/tear-streak/eye/
whiskers =@[.]@= boggled / =>[.]<= annoyed or angry / ='[.]'= concerned / =0[.]o= confuzzled / =-[.]-= sad or sleepy / =*[.]*= dazzled / =^[.]~= wink / =~[.]^= naughty wink / =9[.]9= rolleyes #FourYearLie |
|
So, there's no Breitbart talking point that you aren't balls-deep into.
Exactly how often do you post on r/the-donald, and have they given you moderator status yet? A comprehensive, easy on the eyes loot filter:
http://www.pathofexile.com/forum/view-thread/1245785 Need a chill group exiles to hang with? Join us: http://www.pathofexile.com/forum/view-thread/1251403 |