Hillary Clinton

"
Raycheetah wrote:
"
Jojas wrote:
"
Raycheetah wrote:


So, you're saying that a demagogue is worse than a corrupt, incompetent politician who has directly jeopardized national security? =0[.]o=


Her level of corruption is debatable. After all the investigations what is still missing is some kind of smoking gun "quid pro quo". So how bad can it actually be?
Her level of incompetence is debatable too. It's always easy to criticize after the fact.
And did she really jeopardize national security? It's hard to imagine that the security of the US can be jeopardized by emails marked as "classified".

IMO, she is not more corrupt or incompetent than any other high profile politician. How she operates is how everybody operates in political circles. Not saying that it's fine as it is, but given the choice between her and a demagogue like Trump, I'd take her anytime.


Wow. Just, wow. "SMH," as the cool kids put it. =-[.]-=
He's not wrong.

All I've seen so far is "THE EMAILS PROVE IT!" But when you start getting granular with it, and looking at the individual emails, there's a lot of "please go through the proper channels", etc. People met with her after donating, yes. But plenty of people met with her, and got nothing from the ordeal.

I'd also challenge you to separate what she did from normal lobbying. This is literally what lobbying looks like. Got a problem with it? Change the system! But stop pretending that HRC is the singular harbinger of corruption for participating in a pretty well known and well established practice.

The email server thing is about all I can fault her with at this point... and even that is shaky. This is obviously some hindsight, but let's not pretend that doing things the proper way would have prevented some sort of hazardous security breach. Because as it turns out...
A comprehensive, easy on the eyes loot filter:
http://www.pathofexile.com/forum/view-thread/1245785

Need a chill group exiles to hang with? Join us:
http://www.pathofexile.com/forum/view-thread/1251403
Meanwhile...

Julian Assange: WikiLeaks Info On Trump No Worse Than What He Says Publicly

http://www.breitbart.com/tech/2016/08/27/wikileaks-info-donald-trump/

"
“We do have some information about the Republican campaign,” Assange said. “I mean, it’s from a point of view of an investigative journalist organization like WikiLeaks, the problem with the Trump campaign is it’s actually hard for us to publish much more controversial material than what comes out of Donald Trump’s mouth every second day, I mean, that’s a very strange reality for most of the media to be in.”


Trump simply doesn't have the skeletons in his closet that Hillary has (or that pretty much most major politicians do). If he had, they would've come out and gone "BOO!" during the Primary. =^[.]^=
=^[.]^= basic (happy/amused) cheetahmoticon: Whiskers/eye/tear-streak/nose/tear-streak/eye/
whiskers =@[.]@= boggled / =>[.]<= annoyed or angry / ='[.]'= concerned / =0[.]o= confuzzled /
=-[.]-= sad or sleepy / =*[.]*= dazzled / =^[.]~= wink / =~[.]^= naughty wink / =9[.]9= rolleyes #FourYearLie
Last edited by Raycheetah on Aug 27, 2016, 12:44:33 PM
"
Raycheetah wrote:
Meanwhile...

Julian Assange: WikiLeaks Info On Trump No Worse Than What He Says Publicly

http://www.breitbart.com/tech/2016/08/27/wikileaks-info-donald-trump/

"
“We do have some information about the Republican campaign,” Assange said. “I mean, it’s from a point of view of an investigative journalist organization like WikiLeaks, the problem with the Trump campaign is it’s actually hard for us to publish much more controversial material than what comes out of Donald Trump’s mouth every second day, I mean, that’s a very strange reality for most of the media to be in.”


Trump simply doesn't have the skeletons in his closet that Hillary has (or that pretty much most major politicians do). If he had, they would've come out and gone "BOO!" during the Primary. =^[.]^=
Shaky logic.

Hey Julian, got any information on the next Quentin Tarantino movie? No? Then clearly Tarantino is never making another movie ever again. (This may be, but is not necessarily, true.)
When Stephen Colbert was killed by HYDRA's Project Insight in 2014, the comedy world lost a hero. Since his life model decoy isn't up to the task, please do not mistake my performance as political discussion. I'm just doing what Steve would have wanted.
"
Raycheetah wrote:
Meanwhile...

Julian Assange: WikiLeaks Info On Trump No Worse Than What He Says Publicly

http://www.breitbart.com/tech/2016/08/27/wikileaks-info-donald-trump/

"
“We do have some information about the Republican campaign,” Assange said. “I mean, it’s from a point of view of an investigative journalist organization like WikiLeaks, the problem with the Trump campaign is it’s actually hard for us to publish much more controversial material than what comes out of Donald Trump’s mouth every second day, I mean, that’s a very strange reality for most of the media to be in.”


Trump simply doesn't have the skeletons in his closet that Hillary has (or that pretty much most major politicians do). If he had, they would've come out and gone "BOO!" during the Primary. =^[.]^=


You won't get no glory on that side of the hole.
"
Raycheetah wrote:
Julian Assange: WikiLeaks Info On Trump No Worse Than What He Says Publicly


Well, it's physically impossible to find worse info than what we know. Slow trainwreck.
Add a Forsaken Masters questline
https://www.pathofexile.com/forum/view-thread/2297942
Last edited by NeroNoah on Aug 27, 2016, 7:12:35 PM
"
Antnee wrote:


All I've seen so far is "THE EMAILS PROVE IT!" But when you start getting granular with it, and looking at the individual emails ...


If we were seeing the full slate of her emails, I'd agree that at worst, she is likely guilty of selling access for donations, and at best, making very bad judgement calls on how to conduct official business.

Being that she had her team intentionally wipe the emails - "with a cloth or something" what we are seeing is likely the least damaging material she had.

With the ease of spoofing MAC addresses and hard drive serial number/volume ID, we don't even know if the FBI has the original hard drives Hillary used.

If Hillary is smart enough to be president, you'd think she'd be smart enough to avail herself of good technical advisers who would make sure no one uncovered the things she wanted to stay hidden - whether for "personal email" reasons or otherwise.

Comparing her email use to Colin Powell's is a red herring and the people in the media doing so know it. Many of the secure policies and rules such as ICD 503 didn't exist when he took office, and the ones they had such as DCID 6/2 were newly in place and nowhere near as strict, because the level of concern, technology and the modern threat simply didn't exist yet.

Here's an example of how stark and dramatically different the rules were as threats became worse and policy changed:

For Powell
Spoiler
(this is DCID 6/3 which was implemented shortly after he took office ~May 2000)

"Compliance assessments should minimally include the following:
a. Check individual systems for configuration vulnerabilities; file ownership and
permissions, signs of hackers (e.g., sniffing, suspicious files), Trojan horse
programs; and for incorrect version or unauthorized modification of critical
system files.

b. Check network for default accounts and easy passwords (e.g., dictionary words,
passwords under eight characters); check for unprotected machines (e.g., print
servers), and for improperly configured and otherwise vulnerable services.


DCID 6/2 (which went into place in 1999, replacing DCID 1/22 and (NSDD) 145 was even more vague, the entire text of each is barely two pages long. The threats as we now know them, simply didn't exist to the same extent that they do now.



For Hillary

Spoiler
(This is the relevant section in IDC 503, which took effect in ~Sept 2008 replacing DCID 6/5 and DCID 6/9, before she took office)

UNCLASSIFIED

a. The principal goal of an IC element's information technology risk management
process shall be to protect the element's ability to perform its mission, not just its information
assets. Therefore, IC elements shall consider risk management an essential management
function, and shall ensure that it is tightly woven into the system development life cycle.

b. Because risk cannot be eliminated entirely, the risk management process must allow
decision makers to consider the operational and economic costs of protective measures weighed
against requirements for mission accomplishment. For example, a very high level of security
may reduce risk to a very low level, but can be extremely expensive, and may unacceptably
impede essential operations.

(1) In determining the level of acceptable risk associated with the operation of an
information technology system at a particular level of security, IC elements shall give
appropriate weight to the often competing equities of mission and security requirements, budget consequences, operational performance efficiencies, schedule requirements, counterintelligence concerns, civil liberties and privacy protection, and other relevant policy requirements.

(2) Elements of the IC shall weigh the potential costs of protective measures against
security benefits gained, ensuring that security measures adopted and applied allow mission
capabilities at acceptable risk levels.

(3) Elements of the IC shall consider information sharing and collaboration across
the IC and with appropriate foreign partners as essential mission capabilities.

c. Elements of the IC shall determine the level of security required for an information
system by considering the sensitivity of the information contained within the system, and by
evaluating the system's ability to permit information sharing and collaboration across the Ie.

d. Many IC information systems are interconnected. Therefore, the risk accepted by one
element is effectively accepted by all, just as security limitations imposed by one are effectively imposed upon all. To promote interoperability and efficiency across the IC information technology enterprise, and to provide a sound basis for trust and reciprocal acceptance of individual element certification and accreditation across the enterprise, IC elements shall apply common standards and follow a common process to manage risk for their systems.

e. Elements of the IC shall apply standards for information technology risk management
established, published, issued, and promulgated by the IC CIO. Information technology risk
management standards published, issued, and promulgated for the IC by the IC CIO may include
standards, policies and guidelines approved by either or both NIST and the Committee on
National Security Systems (CNSS).

2

UNCLASSIFIED

leD 503

2. Accreditation

a. Accreditation decisions are official management decisions that explicitly accept a
defined level of risk associated with the operation of an information technology system at a
particular level of security in a specific environment on behalf of an IC element.

b. By accrediting an information system, an IC element approves it for operation at a
particular level of security in a particular environment, and thus establishes the level of risk associated with operating the system and the associated implications for operations, assets, or individuals.

c. In determining the level of acceptable risk associated with the operation of an
information technology system, IC elements shall make decisions on accreditation in accordance with the policy for risk management described in this Directive and in any standards that may be subsequently issued pursuant to the authorities granted herein.

d. Accreditation by IC elements shall ensure that risk is mitigated to the extent possible,
commensurate with the sensitivity of the information in a system. Elements shall ensure that
accreditation of their systems permits IC-wide collaboration and information sharing sufficient to ensure both element and IC-wide mission accomplishment. In accrediting any system over which it has accreditation authority as described below, an element shall accept only the minimum degree of risk required to ensure that the information system effectively supports mission accomplishment while appropriately protecting the information in the system.

e. The head of each IC element may designate one or more Authorizing Officials to
make accreditation decisions on behalf of the element head. The element head shall retain
ultimate responsibility for all accreditation and associated risk management decisions made on his or her behalf.

(1) An Authorizing Official shall be accountable to the element head for the
accreditation and associated risk management decision, for which the element head is ultimately responsible and accountable.

(2) An Authorizing Official has inherent U.S. Government authority and, as such,
must be a government employee.

(3) An Authorizing Official shall have a broad and strategic understanding of the IC
and of his or her particular IC element and its place and role in the overall Ie. An Authorizing Official shall use this knowledge to assign appropriate weight to the often competing equities of mission and security requirements, budget consequences, operational performance efficiencies, schedule requirements, counterintelligence concerns, information sharing, civil liberties and privacy protection, and other relevant policy requirements. Then, in light of these factors, the Authorizing Official will determine the level of risk deemed acceptable for an accredited system.

(4) An Authorizing Official should normally be the agency or element CIO. For IC
elements without a CIO, an Authorizing Official shall be an executive of sufficient seniority to execute the decision-making and approval responsibilities described above on behalf of the element.

3
UNCLASSIFIED

ICD 503

(5) An IC element Authorizing Official shall accredit or reaccredit systems the
element funds, operates, or manages, as well as any operated by the element as an executive
agent on behalf of the Ie enterprise.

(6) An Authorizing Official's accreditation decision shall articulate the supporting
rationale for the decision, provide an explanation of any terms and conditions for the
authorization, and explain any limitations or restrictions imposed on the operation of the system and the reasons for those limitations or restrictions. An Authorizing Official shall state, in the accreditation decision documentation, whether the system is accredited, accredited with conditions, or not accredited.

f. An Authorizing Official may appoint one or more Delegated Authorizing Officials to
expedite accreditation approval of designated systems, and provide mission support.

(1) A Delegated Authorizing Official has inherent U.S. Government authority and, as
such, must be a government employee.

(2) Like an Authorizing Official, a Delegated Authorizing Official shall have a broad
and strategic understanding of the IC and of his or her particular IC element and its place and role in the overall IC. A Delegated Authorizing Official shall use this knowledge to assign appropriate weight to the often competing equities of mission and security requirements, budget consequences, operational performance efficiencies, schedule requirements, counterintelligence concerns, civil liberty and privacy protection, and other relevant policy requirements, and then in light of these factors, to detennine the level of risk deemed acceptable for an accredited system.

g. In detennining which particular information systems may be accredited by a
Delegated Authorizing Official, an Authorizing Official shall consider the potential impact on organizations or individuals should there be a breach of security of a particular system such that a loss of information confidentiality, integrity or availability results.

(1) Confidentiality means the preservation of authorized restrictions on information
access and disclosure, including means for protecting personal privacy, proprietary information, and classified information. A loss of confidentiality is the unauthorized disclosure of information.

(2) Integrity means the prevention of improper modification or destruction of
information and includes ensuring information non-repudiation and authenticity. A loss of
integrity is the unauthorized modification or destruction of information.

(3) Availability means ensuring timely and reliable access to and use of information.
A loss of availability is the disruption of access to or use of information in an information
system.

h. A Delegated Authorizing Official shall only accredit an information system if the
Authorizing Official determines that a breach of security of that information system would result in no more than a low to moderate potential impact on organizations or individuals. In no case shall a Delegated Authorizing Official make an accreditation decision for a system when an Authorizing Official deems a breach of security of that information system would result in a high potential impact on organizations or individuals.



Maybe that's why they have these secure facilities - which Hillary wanted special Blackberries so she could use them in there -






Here's what Colin Powell had to say about it:

"What I did when I entered the State Department, I found an antiquated system that had to be modernized and modernized quickly.

So we put in place new systems, bought 44,000 computers and put a new Internet capable computer on every single desk in every embassy, every office in the State Department. And then I connected it with software.

But in order to change the culture, to change the brainware, as I call it, I started using it in order to get everybody to use it, so we could be a 21st century institution and not a 19th century."


People claiming this was the same as Hillary's usage are as bad as Donald Trump is in trying to divert attention away from unpleasant subjects by laying false accusations.

What next, should we excuse Hillary because Abraham Lincoln used an unsecured pen?




PoE Origins - Piety's story http://www.pathofexile.com/forum/view-thread/2081910
Last edited by DalaiLama on Aug 28, 2016, 12:55:00 AM
Secretary Clinton Has No Scheduled Events Until Sept. 26th Debate – All Events are Surrogates…

https://theconservativetreehouse.com/2016/08/27/wheres-hillary-secretary-clinton-has-no-scheduled-events-until-sept-26th-debate-all-events-are-surrogates/#more-120779

"
Go check for yourself. Use the “Who Will Be There” filter, and you’ll see the only event Hillary Clinton is actually attending is the last one on September 26th, the debate.
It’s nice to know that Hillary Clinton at least plans to show up for the debate….. maybe.


https://www.willhillarywin.com/hillary-clintons-events/

=^[.]^=
=^[.]^= basic (happy/amused) cheetahmoticon: Whiskers/eye/tear-streak/nose/tear-streak/eye/
whiskers =@[.]@= boggled / =>[.]<= annoyed or angry / ='[.]'= concerned / =0[.]o= confuzzled /
=-[.]-= sad or sleepy / =*[.]*= dazzled / =^[.]~= wink / =~[.]^= naughty wink / =9[.]9= rolleyes #FourYearLie
"
Raycheetah wrote:
Secretary Clinton Has No Scheduled Events Until Sept. 26th Debate – All Events are Surrogates…

https://theconservativetreehouse.com/2016/08/27/wheres-hillary-secretary-clinton-has-no-scheduled-events-until-sept-26th-debate-all-events-are-surrogates/#more-120779

"
Go check for yourself. Use the “Who Will Be There” filter, and you’ll see the only event Hillary Clinton is actually attending is the last one on September 26th, the debate.
It’s nice to know that Hillary Clinton at least plans to show up for the debate….. maybe.


https://www.willhillarywin.com/hillary-clintons-events/

=^[.]^=


Short reminder that Hillary hasn't held a press conference for 266 days.
GGG banning all political discussion shortly after getting acquired by China is a weird coincidence.
"
Xavderion wrote:
"
Raycheetah wrote:
Secretary Clinton Has No Scheduled Events Until Sept. 26th Debate – All Events are Surrogates…

https://theconservativetreehouse.com/2016/08/27/wheres-hillary-secretary-clinton-has-no-scheduled-events-until-sept-26th-debate-all-events-are-surrogates/#more-120779

"
Go check for yourself. Use the “Who Will Be There” filter, and you’ll see the only event Hillary Clinton is actually attending is the last one on September 26th, the debate.
It’s nice to know that Hillary Clinton at least plans to show up for the debate….. maybe.


https://www.willhillarywin.com/hillary-clintons-events/

=^[.]^=


Short reminder that Hillary hasn't held a press conference for 266 days.


I honestly think Hillary is just hoping to limp across the finish line, with a complicit media's tailwind at her back, to become the "Historic First Vagina in the White House." She could drop dead after she lifts her hand from the (now scorched and burning) Bible at her inauguration, but she WANTS her legacy, can taste it.

I suspect she doesn't dare show her face in public for long simply because she might spazz out or even collapse. It'll be an Extra-Large Popcorn event to watch her debate Trump, but I expect she'll be granted all sorts of special considerations (being seated, frequent, long breaks, etc.) when that comes to pass. For now, her surrogates will churn the waters with chum for the faithful, and it will suffice. ='[.]'=
=^[.]^= basic (happy/amused) cheetahmoticon: Whiskers/eye/tear-streak/nose/tear-streak/eye/
whiskers =@[.]@= boggled / =>[.]<= annoyed or angry / ='[.]'= concerned / =0[.]o= confuzzled /
=-[.]-= sad or sleepy / =*[.]*= dazzled / =^[.]~= wink / =~[.]^= naughty wink / =9[.]9= rolleyes #FourYearLie
So, there's no Breitbart talking point that you aren't balls-deep into.

Exactly how often do you post on r/the-donald, and have they given you moderator status yet?
A comprehensive, easy on the eyes loot filter:
http://www.pathofexile.com/forum/view-thread/1245785

Need a chill group exiles to hang with? Join us:
http://www.pathofexile.com/forum/view-thread/1251403

Report Forum Post

Report Account:

Report Type

Additional Info