Chicago Boyz

                 
 
 
 
What Are Chicago Boyz Readers Reading?
 

Recommended Photo Store
 
Buy Through Our Amazon Link or Banner to Support This Blog
 
 
 
  •   Enter your email to be notified of new posts:
  •   Problem? Question?
  •   Contact Authors:

  • CB Twitter Feed
  • Lex's Tweets
  • Jonathan's Tweets
  • Blog Posts (RSS 2.0)
  • Blog Posts (Atom 0.3)
  • Incoming Links
  • Recent Comments

    • Loading...
  • Authors

  • Notable Discussions

  • Recent Posts

  • Blogroll

  • Categories

  • Archives

  • Hillary & FBI Director Comey’s Cyber-Security “Broken Window”

    Posted by Trent Telenko on August 1st, 2016 (All posts by )

    When FBI Director Comey publicly took a dive and sold out the rule of law in refusing to prosecute Hillary Clinton’s Cyber-security crimes.  He began a new chapter in providing evidence of the validity of “Broken Window Policing”  in the field of cyber-security. For which, see the following definition:

    The broken windows model of policing…focuses on the importance of disorder (e.g., broken windows) in generating and sustaining more serious crime. Disorder is not directly linked to serious crime; instead, disorder leads to increased fear and withdrawal from residents, which then allows more serious crime to move in because of decreased levels of informal social control.

    Hillary and the FBI Director Comey have advertised both outrageous cyber-security weakness and more importantly the breakdown of social mores of “the rule of law” in Federal Government cyber-security.  If you advertise you are weak, stupid and capricious in enforcing cyber-security, it is blood in the water for cyber-criminals of all sorts.

    Consider this not exhaustive list busted e-mail security associated with Hillary Clinton and her Democratic Party surrogates.

    1) Hillary’s email system on Bill Clinton’s server.
    .
    2) The Hillary Controlled Democrat National Committee email server.
    .
    3) The Democrat Congressional Candidates Committee server.
    .
    4) Hillary’s election campaign server.
    .
    5) Hillary’s several different illicit off-site email servers when she was Secretary of State.

    This is a very small fraction of the “Broken Window theory” as applied to cyber-crime.  What we see related to Hillary.  The problem here is that this sort of political corruption cannot be centralized.  If Hillary can do it and get away with it.  Exactly how many other illicit off-site e-mail accounts filled with Federal secrets are there now?  And how many more will there be between now and Jan 2017?

    Lois Lerner at IRS and the EPA director are both known to be using non-Federal government secured public e-mail systems as early as 2010.

    Exactly how many other officials at the State Department, Defense Department, Interior Department (Can you say Secret Service?), other non-departmental American intelligence bureaucracies, and the Federal Reserves are there?

    That is the real cyber-security “broken window” Hillary and FBI Director Comey have opened. And this is the cyber-security nightmare that will be with America for decades, barring a massive and systematic purge of everyone high and low associated with such behavior by a new President or after another — likely nuclear — Pearl Harbor.

    I’ll close with the following Sept 12, 2008 Obama campaign statement that applies in 2016:

    “Our economy wouldn’t survive without the Internet, and cyber-security continues to represent one our most serious national security threats,”  “It’s extraordinary that someone who wants to be our president and our commander in chief doesn’t know how to send an e-mail.”

    — Obama for President 2008 campaign spokesman Dan Pfeiffer.

     

     

    8 Responses to “Hillary & FBI Director Comey’s Cyber-Security “Broken Window””

    1. Will Says:

      I’m going to go out on a limb and predict that the entire federal system has been “Richard Windsorized” under this administration. The EPA, IRS, Hillary Inc. just the very tip of the iceberg. She set that network up for a very good reason(s).

      “Obama” may indeed not know how to send an email, particularly if that person doesn’t exist.

    2. dearieme Says:

      A good point well made, TT.

      I’m getting on a bit; perhaps it is too late to take up hacking as a hobby? I must consider my options.

    3. dearieme Says:

      When GCHQ reads all those secret US e-mails, how does it hide the fact from its US collaborators? What does it do with them? Do the lads and lassies declaim them to each other in the pub at Friday lunchtime, giggling inanely?

      There was photo in the papers recently of David Cameron sitting in an armchair, reading some official document, while stroking his cat. Very Bond-villain, he looked. Was he reading Hellary’s most entertaining efforts? I think we should be told. I’ll bet the Kremlin boys found them a barrel of laughs.

    4. Brian Says:

      Wikileaks could publish an e-mail showing Hillary shot someone in the middle of Fifth Avenue and her poll numbers would go up.

    5. Andrew Garland Says:

      It doesn’t matter how corrupt your communications show you to be, as long as you have a private email server.

      It doesn’t matter that you break the law as long as your friends enforce the law.

      It doesn’t matter what the vote is as long as your friends count the vote.

      My appologies to Stalin.

    6. Subotai Bahadur Says:

      Andrew Garland Says:
      August 1st, 2016 at 2:44 pm

      And eventually people figure out that obeying the law is only mandatory when the government can apply coercive force to you. And the answer to coercive force is not law, but superior coercive force.

      At that point, everybody’s dance card gets full.

    7. Trent Telenko Says:

      It is not “very likely” there are more like EPA Administrator Lisa Jackson playing “Richard Windsor.”

      It is certain.

      And a whole host of cyber-criminals — be they foreign agents, hackers for hire or simple fraud artists — are all acting like piranha around the blood filled water Comey & Clinton left behind.

    8. Marty Says:

      Beyond all this, 3 thoughts:

      1. All these breaches evidence a lack of concern for basic security precautions–cyber- and otherwise. DNC had a security audit of its systems and then didn’t follow up on the recommendations. Ditto the Clinton campaign, I believe. These are the people who have been in charge for 7+ years and we saw the immense Office of Personnel Management breach, and who knows what else that has either been covered up or not even discovered? Why on Earth would we want such people in charge of our national security?

      2. The government’s failure to take action in response to Clinton’s negligence or worse regarding her SecState emails has told all our allies that they should not share intelligence with us, as we cannot protect it and therefore if they share they will place their sources and methods at risk. This damage is already done, cannot be undone, and we will bear the cost for many years.

      3. As has been noted elsewhere, everyone now accused of placing electronic records or information at risk will now invoke the “Hillary Defense.” Comey tried to make a distinction between administrative sanctions, to which he said Hillary would have been subject were she still a govt employee, and criminal prosecution, but the threat of a reprimand letter or 30 days without pay, even termination, is hardly adequate compared to the threat of imprisonment and massive fines.

      Not even to mention the possibility of blackmail by foreign powers or corporations, or even our own intelligence community (anyone think NSA doesn’t have all her emails? How naive you are.).

      This is where Clinton-style corruption crosses the line into national security.