mikey mikey
Active Member
so a no then
Can you provide any reason why I should dismiss Craig Murray and/or believe the CIA?
so a no then
from whence does he derive his information?Can you provide any reason why I should dismiss Craig Murray and/or believe the CIA?
As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking.
so you don't knowHow about you read the article?
i can't think offhand of any soviet invasion in the last 36 years. 37 years - but then that's before yer man would have predicted invasions in't it"36-year NSA veteran widely regarded as a “legend” within the agency and the NSA’s best-ever analyst and code-breaker, who mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened"
either
a) Unamed yet obviously identifiable if he/she exists, 36 year NSA veteran has just ensured he will spend the rest of his days in an orange jumpsuit and never reap the benefits of his/her fat state pension for some act of unfathomable randomness
or
b) This is toss
c4u"36-year NSA veteran widely regarded as a “legend” within the agency and the NSA’s best-ever analyst and code-breaker, who mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened"
either
a) Unamed yet obviously identifiable if he/she exists, 36 year NSA veteran has just ensured he will spend the rest of his days in an orange jumpsuit and never reap the benefits of his/her fat state pension for some act of unfathomable randomness
or
b) This is toss
Julian Assange and Craig Murray haven't done much for their credibility on this issue by suggesting Seth Rich was the leaker and he was murdered by the Clintons.
what soviet invasions can you name between 1980 and 1991?Did either of them make a statment suggesting that the Clintons were guilty of his murder?
I would appreciate any link you could provide.
If you set up the super surveillance state, hoovering up all the internet traffic of pretty well everybody, that is not just going to affect the ordinary people whom the elite despise. There is also going to be an awful lot of traffic intercepted from sleazy members of the elite connected to even the most senior politicians, revealing all their corruption and idiosyncracies. From people like John Podesta, to take an entirely random example. And once the super surveillance state has intercepted and stored all that highly incriminating material, you never know if some decent human being, some genuine patriot, from within the security services is going to feel compelled to turn whistleblower.
I presume his use of Podesta's name is a sneaky reference to that Pizzagate nonsense?I liked the bit they quoted from Mr. Murray.
I didn't find that wan...I mean...wanting at all.
I presume his use of Podesta's name is a sneaky reference to that Pizzagate nonsense?
I presume his use of Podesta's name is a sneaky reference to that Pizzagate nonsense?
yeh. we're assessing the reliability of this information about the nsa legend who doesn't appear to have predicted any invasions. and it is found wanting.Are we playing Jeopardy?
If it is a genuine question then try this site: Military occupations by the Soviet Union - Wikipedia
If it bears any relevance to the discussion however, don't be shy now.
The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking:
Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did.
Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.
All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient.
In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.
p@ssw0rd
p1s5p00rThis was Podesta's email password
John Podesta. The campaign manager.
no one would have read them and at the end of the line a cleaner would have stuffed them all into bin bagsIn a sense it doesn't really matter whether it was the Russians or not. He might as well have just printed out all the e-mails and left them laying around on seats on the New York Subway.
So the Clinton campaign couldn't be bothered to hire people who would use adequate security (passwords or anything else), but they could be bothered to have those who Crossed Them rubbed out?Julian Assange and Craig Murray haven't done much for their credibility on this issue by suggesting Seth Rich was the leaker and he was murdered by the Clintons.