It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
For all of its successes, the Clinton Foundation had become a sprawling concern, supervised by a rotating board of old Clinton hands, vulnerable to distraction and threatened by conflicts of interest. It ran multimillion-dollar deficits for several years, despite vast amounts of money flowing in.
The NYT runs the scoop in its usual balanced, inoffensive way – but the problem jumps right off the page. The Clintons have never been able to separate the impulses to help others and to help themselves, turning noble philanthropic ventures into glitzy, costly promos for some future campaign (can you remember a time in human history when a Clinton wasn't running for office?). And their "Ain't I Great?!" ethos attracts the rich and powerful with such naked abandon that it ends up compromising whatever moral crusade they happen to have endorsed that month. That the Clinton Global Initiative is alleged to have bought Natalie Portman a first-class ticket for her and her dog to attend an event in 2009 is the tip of the iceberg. More troubling is that businessmen have been able to expand the profile of their companies by working generously alongside the Clinton Foundation. From the NYT:
She'd also enter the White House knowing how to manipulate the levers of power. Experience was part of the case she made for herself in 2008, and after Foggy Bottom, she has even more of it. In many ways, that's a good thing, but one needn't look very far back to see its dark side. Dick Cheney's familiarity with the levers of power enabled him to sneakily exercise too much of it. The problem wasn't just that he was vice president. Long experience taught him how to aggregate maximum power in the executive branch. Is that the sort of vice that would temp Hillary Clinton?
I rather think so. www.theatlantic.com...
Problem We're having a problem accessing email. You might not be able to see all your email messages. Aug 14 9:49 AM
Updates We're working on the problem and will provide an update by Aug 14 2:00 PM. Thank you for your patience. Aug 14 12:01 PM
Originally posted by ObjectZero
reply to post by drwill
So it might just be a mass outage right now. But odd that the site it down like that.
To recognize their past contributions and acknowledge their role in shaping the Foundation’s future, the Foundation was renamed the Bill, Hillary & Chelsea Clinton Foundation.
It is also being renamed the Bill, Hillary & Chelsea Clinton Foundation.
The Times reports that Hillary Clinton plans to move her staff into offices at the foundation's Manhattan headquarters in the coming weeks. The new digs will be just blocks from most major news organizations, including across the street from NBC News, which gave daughter Chelsea a job and is planning to run a controversial miniseries on Hillary Clinton's life.
www.foxnews.com...
Originally posted by Swills
reply to post by drwill
I just logged into my old Hotmail account and it's working. Edit: wait a minute, I can log in but then this appears,
Problem We're having a problem accessing email. You might not be able to see all your email messages. Aug 14 9:49 AM
Updates We're working on the problem and will provide an update by Aug 14 2:00 PM. Thank you for your patience. Aug 14 12:01 PM
Maybe the NSA is behind shutting down the NYT
edit on 14-8-2013 by Swills because: (no reason given)
Originally posted by burntheships
[...] afterall Bill is the adopted son of George Bush Sr.
Originally posted by ObjectZero
Looks like they're blaming a cyber attack for the reason for the outage. Who did the attack is unknown yet or why.
ireEye senior malware researcher Ned Moran told V3 the new attacks use evolved versions of the longstanding Aumlib and Ixeshe malwares, which have been used by criminals in targeted attacks for several years. He added that the upgraded tools are designed to help the criminals avoid detection, even from advanced systems designed to detect their previous tools, when hacking into their victim’s network.