It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
For me, it was not like the Hillary Clinton server, it was like an email server she and others were using with political voting stuff," Guccifer said.
originally posted by: UnBreakable
And you can be sure Bill has 'doodled' a lot more women other than Hill.
originally posted by: UKTruth
originally posted by: UnBreakable
And you can be sure Bill has 'doodled' a lot more women other than Hill.
...and that Hill has doodled a few women with Bill too
My dialogue with my sources left me with no doubt Tuesday night (Oct. 30) that Hillary’s made passes at women and that Muslim Huma Abedin is Hillary’s most likely source of romantic and sexual love.
originally posted by: introvert
a reply to: NoCorruptionAllowed
Could you be more full of crap? I've never lied about Hillary.
Yes you did. You said she was "a woman of such renowned criminality".
She has never been convicted of a crime.
It is also irrelevant that no convictions have happened. Why? Because we all know she is guilty of lots of crimes.
Not only is that a logical fallacy, specifically an alleged certainty fallacy, she has not been convicted of a crime. A conviction is necessary.
Having no convictions doesn't mean she isn't guilty of committing crimes, and it also doesn't mean anyone should support her just because no convictions. Some rapists have got off Scott free, so because they weren't convicted, then you will support them too?
Support is irrelevant. I would still not call them a criminal unless they were convicted.
Get a dose of reality sonny.. Your arguments have no value.
I'm sure it doesn't have any value to someone that will lie about people and use logical fallacies, which have no place in a logical debate. But we all know (yes, i used your own logical fallacy) logic is rare round these parts.
Clinton has sworn up and down that her controversial, home-brewed email server was safe, secure and legal. She’s said there’s no proof at all that foreign hackers were able to break into it and peek at her top-secret emails containing critical national security data.
But Clinton’s biggest lie may have just been exposed in the most unlikely way possible: In a series of doodles drawn by husband Bill Clinton.
A shocking new revelation connects a hacker’s release of Bill Clinton’s silly White House drawings to what may be one of the biggest national security breaches in the nation’s history — one that comes with a 10-year jail sentence.
new evidence indicates that the stolen doodles came from the hacking into the former president’s personal server — the same server that was also being used to house wife Hillary’s emails.
Deception Experts: Guccifer Telling Truth About Hacking Clinton’s Email Server
Phil Houston is CEO of QVerity, a training and consulting company specializing in detecting deception by employing a model he developed while at the Central Intelligence Agency. He has conducted thousands of interviews and interrogations for the CIA and other federal agencies. His colleague Don Tennant contributed to this report.
When Romanian hacker Marcel Lehel Lazar, also known as Guccifer, told NBC News senior investigative correspondent Cynthia McFadden that he had gained access to Hillary Clinton’s private email server, viewers worldwide were left to wonder whether his claim was true. Our analysis of Guccifer’s behavior in the interview left little doubt in our minds that—unfortunately—it was.
Let us be clear that in this case, the behavior available for analysis is quite minimal. Having said that, based on the lack of deceptive indicators exhibited by Guccifer in response to McFadden’s questions, we have concluded with a high degree of confidence that Guccifer was very likely successful in penetrating Clinton’s email server, as he claimed.
What remains unclear, however, is exactly what information resident in the server might have been compromised.
Guccifer told McFadden that Clinton had lied when she claimed her email server was absolutely safe—he stated categorically, “It’s not safe at all.” While we have concluded that that statement is likely truthful, and that Guccifer likely ascertained that himself, what we are unable to assess is whether or not he was able to access any classified information on the server. It’s equally unclear whether Guccifer was capable of identifying classified information, vs. unclassified information.
Our sense, based on Guccifer’s responses, is that there were some limitations to the access he was able to gain. We expect that as this story unfolds, and the investigation into Guccifer’s claims intensifies, U.S. authorities will identify those limitations—and exactly what vulnerabilities in the security of Clinton’s email server were identified by the Romanian hacker.
An intriguing Security Council (SC) report circulating in the Kremlin today suggests that a “war of words” has broken out between the Director of the Federal Security Service (FSB) Alexander Bortnikov and Chairwoman of the Council of Federation Valentina Matviyenko over the issue of releasing to the Western media tens-of-thousands of top secret and classified emails obtained by the Foreign Intelligence Service (SVR) from the private, but unsecured, computer (email server) belonging to former US Secretary of State, and present American presidential candidate, Hillary Clinton.
According to this report, beginning in 2011, SVR intelligence analysts began “serious/concerning” monitoring of a Romanian computer hacker named Marcel Lazăr Lehel (aka Guccifer) after he attempted, unsuccessfully, to break into the computer system of the Federation funded RT television network.
Following SVR procedures for the monitoring of international computer hackers, this report continues, Guccifer’s activities were followed and recorded (both physically and electronically) allowing these intelligence analysts, in 2013, to not only detect his breaking into the private computer of Secretary Clinton, but allowing the SVR to copy all of its contents too.