Where’s The Media? A BOMBSHELL Is Being Ignored!

| |

lies

So you want to talk to Mark Cuban on the latest Hillary email thing eh?

You ought to try someone with a bit of credibility. You see, Mark Cuban is not ignorant and his appearance this morning on CNBC did not contain “mistakes.”

He was lying.

This “newly discovered” laptop is very likely to be literal nuclear waste for Hillary and everyone around her, including the Clinton Foundation and all of Hillary’s “advisers” such as Podesta.

Mark Cuban said that Huma used Outlook and IMAP (for Yahoo and similar.) True.

But then he said this was unlikely to lead to “new” evidence in the form of the emails.

That’s a lie.

It’s a lie because Cuban knows he’s full of crap; he knows enough about the technologies involved to be fully aware that he was peddling nonsense.

IMAP and Exchange are email protocols. (So is POP3, but that’s pretty much deprecated everywhere for good reason.) Exchange, when available, is often preferred by business people because it syncs not just email but also calendars and contact lists, which can (and does) include both phone numbers and email addresses.

IMAP is typically used by clients like Thunderbird because it doesn’t know to speak Exchange. There’s a plug-in for calendars using the davical protocol and another (the SoGo connector) for contacts, but no integrated Exchange support.

Outlook can use IMAP, but where the server supports it (like Clinton’s “homebrewed” email server) Exchange would normally be used instead as a preferred choice. It both does more and also does a far better job of threading conversations (which is very convenient) and thus is almost-always preferred when it is available.

Here’s the problem for the Clintons: Both of these protocols will sync any folder they are told to monitor and can be told to pull local copies of emails. By default both will typically do so on a desktop or laptop environment because WiFi is usually available and it has enough bandwidth to make that efficient. Mobile devices sometimes are configured to only grab email headers by default but increasingly, with 4g service, they’re set up to get full messages too, sometimes including all attachments.

The reason to do this is that it is a lot faster to search messages locally than over the wire, and it’s convenient to be able to search messages. In addition pulling full copies (including attachments) allows you to work offline (when there’s no WiFi or other network available), and then re-sync when you get back in range.

Here’s the problem for Hillary — when the server had emails deleted and then was “Bleached” it had already been taken offline and was never returned to service. As such the laptop client would have been unable to connect back to it and thus it would never be told to remove anything.

Without that machine (Weiner’s laptop) being under remote administration such as Domain Policy control (which we can reasonably assume it was not as Huma claims “she didn’t know about it” and it was allegedly a private laptop) there is no remote capability to wipe or otherwise get into said computer and remove the emails either. In fact there’s a decent chance it’s running an operating system edition (if Windows) that lacks domain control capability entirely.

This means that the odds are extremely high that all of the deleted emails to which Huma was a participant are on that computer.

Every.
Single.
One.

If that examination shows that work product, or worse, classified information was sent and/or received and the evidence intentionally destroyed via the “Bleachbit” process then everyone involved is cooked. Remember, the claim was that the emails deleted were nothing more than yoga chat and similar; all “personal” content that the government had no right to and implicated no national security interest. Further, Huma claimed twice (once during her exit from State, and again under oath when questioned) that she had turned over all devices that might or did have US Government work product on them and had retained no copies.

If that is proved to be a lie, or worse, proof of felony conduct such as influence peddling or (God forbid for them) something like the rumored link to Epstein’s Lolita Express is found in those archives then a whole bunch of people are going straight to prison not only on the original acts evidenced in the emails themselves but also on felony obstruction of justice and perjury charges.

Yes, folks, this is a very big deal because it is the first discovery of a computer that appears to have been sync’d against the Clinton server but was neither tampered with or destroyed, and thus it likely contains all of the pertinent evidence to which Huma was a part.

I argue that the media is lying and soliciting others to lie. Mark Cuban knows all of this as he’s well-aware of how email works on the Internet. I’m aware of it too, having run an ISP during the early 1990s, having run corporate, personal and ISP-level email servers both before and since up to and including the present day, and I can confidently state that unless someone took affirmative action to alter the record the odds are extremely high that every single email chain Huma participated in is likely on that laptop, whether Hillary and her friends tried to delete it or not.

I’m a subject matter expert in this regard folks.

Yeah, CNBC, I’m not your biggest fan. But you (and the rest of the media) know damn well I can get to a studio in about an hour and a half and if you call I will be happy to don a suit (ok, at least the top half that the camera can see) and scoot on over to correct the record from a technical level on exactly what has been found and what is likely now in both the FBI’s and the NY State Police/NYPD’s hands. 

Consider this an open invite to any of the MSM folks to do exactly that; you folks all still have my phone number and I can only conclude it hasn’t rung because you are not interested in the truth from someone who has the technical competence to explain it to your viewers.

Report the news, media wonks, instead of trying to shape it.

Delivered by The Daily Sheeple

We encourage you to share and republish our reports, analyses, breaking news and videos (Click for details).


Contributed by Karl Denninger of Market Ticker.

Karl Denninger - LeverageKarl Denninger is the author of Leverage: How Cheap Money Will Destroy the World. You can follow his daily commentary on capital markets at The Market Ticker and his weekly Ticker Guy Blog Talk Radio broadcasts.

Wake The Flock Up! Please Share With Sheeple Far & Wide:
  • Funny stuff! The media just can’t play it straight. https://waitforthedownfall.wordpress.com/truth-in-media/

  • Sovereign_Citizen

    There is so much wrong with the above article I am not even sure where to begin. Let’s start with some basic definitions:

    IMAP – The Internet Message Access Protocol (IMAP) is a mail protocol used
    for accessing email on a remote web server from a local client. IMAP and
    POP3 are the two most commonly used Internet mail protocols for retrieving emails. Both protocols are supported by all modern email clients and web servers.

    While the POP3 protocol assumes that your email is being accessed only from
    one application, IMAP allows simultaneous access by multiple clients.
    This is why IMAP is more suitable for you if you’re going to access your
    email from different locations or if your messages are managed by
    multiple users.

    By default, the IMAP protocol works on two ports:

    Port 143 – this is the default IMAP non-encrypted port

    Port 993 – this is the port you need to use if you want to connect using IMAP securely

    POP(3) – Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline. Note, that when you use POP3 to connect to your email
    account, messages are downloaded locally and removed from the servers.
    This means that if you access your account from multiple locations, that
    may not be the best option for you. On the other hand, if you use POP3,
    your messages are stored on your local computer, which reduces the
    space your email account uses on your web server.

    By default, the POP3 protocol works on two ports:

    Port 110 – this is the default POP3 non-encrypted port

    Port 995 – this is the port you need to use if you want to connect using POP3 securely

    SMTP – Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails across the Internet.

    By default, the SMTP protocol works on three ports:

    Port 25 – this is the default SMTP non-encrypted port

    Port 2525 – this port is opened on all SiteGround servers in case port 25 is
    filtered (by your ISP for example) and you want to send non-encrypted
    emails with SMTP

    Port 465 – this is the port used, if you want to send messages using SMTP securely

    https://www.siteground.com/tutorials/email/pop3-imap-smtp-ports.htm

    EXCHANGE – Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It runs exclusively on Windows Server operating systems.

    Exchange Server was initially Microsoft’s internal mail server. The first version of Exchange Server to be published outside Microsoft was Exchange Server 4.0. Exchange initially used the X.400 directory service but switched to Active Directory later. Versions 4.0 and 5.0 came bundled with an email client called Microsoft Exchange Client. It was discontinued in favor of Microsoft Outlook.

    Exchange Server uses a proprietary protocol called MAPI. Over time, however, it added support for POP3, IMAP, SMTP, and EAS.

    Exchange Server is licensed both in the forms of on-premises software and software as a service. In the on-premises form, customer purchase client access licenses (CALs). In the software as a service form, Microsoft receives a monthly service fee instead (see Microsoft Office 365).I have stopped here because if you have read the article above and then this far then you know that the author:

    Karl Denninger

    is full of shit:)

    The argument that because they used a Homebrew server blahblahblah, is ludicrous…this is like saying homemade soup doesn’t have chicken in it. Some does and some doesn’t. I do not see anywhere what kind of server for email Hillary was using, however, they all have as many differences in them as cars on the road. In other words they all act very similiar and behave quite similar and are maintained and function very similar. Yes there are difference but let’s not get carried away.

    • jim_robert

      Your post doesn’t make sense. Yes we all know what POP, IMAP, etc are. The point is, what did the “homebrew server” use, and were the emails replicated. To use your trope, did the homebrew server “have chicken in it or not?” Well, apparently it must have, as otherwise there would be no announcement from Comey. .

      I don’t know how Hilary’s server was set up, and neither do you. So, if you care to tell us how you know there was no replication to the Huma/Weiner laptop, we’d all love to hear. For me, I do NOT know, but I can extrapolate from the basic fact that Comey announced they do, in fact, have something.

      • Sovereign_Citizen

        Really? Everyone knows what those protocols are? I disagree. The author doesn’t.

        Here is what I think. None of your petty little attack proves otherwise. As a matter of fact, it goes even further to prove that some of us know what we are talking about and all other people can do is sit on the sidelines and tell everyone they are confused.

        I could explain further and show everyone you as well have no idea what you are talking about but I am in a generous mood right now and you have already made yourself look like an idiot so I will spare you.

        Don’t get your panties in such a twist when you see yourself pointed out in comment sections. Author didn’t know what he was talking about and got called out on it. I take it you have a horse in this race…get over it. When you defend people who don’t know what they are doing or talking about you tell people you are the same way.

        We see that from you a lot and we understand. Now, go take a nap, you act like a child.

      • juskom95

        It was probably a copy/past from a wiki, it looks like one. There is NO substance in the post.

    • juskom95

      Um . . . you actually did not prove anything. If you work in IT ( and did not just copy/past the above) then you know that a local client (like Outlook) can retain emails in an archive and its local storage.

      Office365 has absolutely no bearing on this, due to the date of the server.

      I think you just copy/pasted the above to sound smart.

      • Sovereign_Citizen

        You are correct my point though is that what the author says on how it works and he is using that as the basis for the article is wrong. Completely wrong.

    • JenB

      The POP3 and IMAP protocol definitions don’t matter in what the author of this article is trying to say.

      His point was that Cuban lied saying that use of IMAP & Yahoo meant that it was unlikely anything new would be discovered. This is not necessarily true and not considering other information about the server and her Outlook setup that we don’t know. Cuban knows this, at least he should know this. We don’t know what else was pulling into her Outlook. She could have 10 email accounts using IMAP, POP3 AND an Exchange account. The definitions of the protocols don’t change this. We don’t know what is on that Outlook. My Outlook right now connects to an Exchange server, and three IMAP email accounts. You could ignore the Exchange when theorizing to confuse people who don’t know, but that does not negate that Exchange may very well be on that laptop in her Outlook and may have had settings that pulled the whole mailbox to her laptop.

      Using Exchange and Outlook as the example, if Chached Exchange Mode had been enabled, a copy of the Mailbox at the time it was last logged in would remain on the laptop in offline mode. If the laptop had not connected to the Exchange server to sync, all emails deleted from the Exchange server would not have been removed from the laptop, as it had not connected and synced.

      • Sovereign_Citizen

        His point is that his knowledge of IT somehow makes him qualified to have a conversation he knows nothing about. He is completely wrong on the basics so how could he know anything else?

      • Sovereign_Citizen

        You are 100% correct. You just said it better than I could.

        However, the guy doing the article has no idea what he is talking about.

  • ExecutorOffice

    How much longer do we have to see this satanic meat puppet and its fellow demon possessed fools? Toss the IMF whores in with Swarmy Kilpatrick and let them quote Title 18 USC 241 and 241 and 1001 and 1201 etc to each other

  • Buck’O

    Sweet Jebus. Consult a technical expert before opening your traps. IMAP and POP3 are email protocols. As is SMTP. Exchange is a Microsoft product. It’s their email and groupware server.

    • juskom95

      MAPI is often refereed to as Exchange; MAPI is a protocol. The protocol which Exchange servers use to communicate.

      • Buck’O

        No. MAPI is not exchange, nor is it a protocol. It is an application programming interface used by Microsoft Outlook in order to provide a native client/server connection. MAPI stands for Messaging Application Programming Interface. It’s an MS proprietary interface that is a part of Exchange much like ActiveSync is, but it is not a protocol or by itself Exchange.

        • juskom95

          Exchange uses MAPI to communicate.

          Here is the wiki, since you seem to not have a clue:

          https://en.wikipedia.org/wiki/MAPI

          There is more than IMAP and POP3. I have a feeling you are a troll, who just wants to jump and scream “I KNOW MORE AND YOU ARE WRONG!!!!” without actually reading the article.

          So . . . troll away

          • Buck’O

            And you refer to wikipedia as a source of truth whilst calling someone a troll. I’ve been programming with these technologies for over 25 years son. Put that in your pipe and puff.

  • Mike

    Nuke the biotch.

  • jim_robert

    So what? Hilary lied, perjured herself, committed felonies, is a massive sleazeball and fraud. So what? That shouldn’t change any of the votes of the ignorant fascist leftists I know, and it wouldn’t change the vile, lying leftist lamestream media’s shilling for this vile, corrupt, evil, felonious, disgusting, power-hungry – oh, and did I say vile already – woman.

    She can literally do ANYTHING she wants, and I mean ANYTHING, and the idiot left, the banksters and Goldmun Sucks, the elite, etc. will all still support her.

    • ahuxley

      So, tell us, what do ya think about BroomHillary…?

  • Kathleen Carter
  • glacialhills

    Any bets as to how long it takes for this laptop, and or the said email contents contained on it, to mysteriously come up missing or somehow are erased or destroyed?

    Anyone?

    I give it a month or two at most. And darn, wouldn’t ya know, right before public release.

  • news1st2015

    Forget the E-Mails, America has already been fucked.

    The Shame of U.S. Based Journalism …is
    February 5, 2015
    by Tracy Mapes

    SACRAMENTO,California -in fact that many of the Current On-Air-Talent was culled for the unlikely source of Prisoners and Street Prostitutes, many of which came from the Sacramento Area of California.

    The Prostitution aspect along with the use of such Narcotics as Heroin appears to be being utilized as a “Mind Control” Feature along with the Degradational Effects of “Hazing” these people into “Compliance” by setting firm examples of what their lives could consist of without complete compliance and cooperation of their “Handlers”.

    These People that I have purposely Identified to show a Pattern of Incident and Distribution has remained unchallenged for over 4 Years.
    It includes the Names of Two Presidents of the United States, a First Lady, the Duchess of York, a Republican Vice Presidential hopeful of 2008, and an as yet unlisted Justice of the Supreme Court.

    The Disturbing Pattern not only points to a significant Influence of American Politic across the board, but lends itself toward Criminal Racketeering in the effort to Disenfranchise the Entire American Political Process and the Free Press as these people are used to supply “The Advantaged” with sexual favors and escort services.

    These Illegal Actions, Infiltrations and Subversion of the Free Press and Government cannot be allowed to Stand, as Its Danger to the Public Good is All to Clear.

    See: President and the Press Speech of April 27, 1961 by President John F. Kennedy.

    Here are the Lists I have compiled on American Journalists so far:

    Media Subversion List 2010
    https://c1.staticflickr.com/9/8752/17349971918_448bebfd3b_o.jpg

    Media Subversion List 2012
    https://c1.staticflickr.com/9/8784/16917477423_f2ffa45990_o.jpg

    Media Subversion Map of Sacramento and Hub Distribution United States
    https://c2.staticflickr.com/6/5645/21680612191_09752b180c_k.jpg

    You can also find Court Records from Sacramento County Superior Court for approximately 20
    Subjects Listed in regard to the participation in PC 647b activity related to prostitution, at this
    Address: https://www.facebook.com/notes/tracy-mapes/presidents-media-and-the-war-against-the-people-of-the-united-states/10152301796448280

    Take Care,

    -Tracy Mapes

    —————————–

    James Comey is also out of Sacramento

    …Before installing personnel in government or media, they seem to have a few things in common.

    by Tracy Mapes

    SACRAMENTO, California–They die a horrible or publicly reported death, they are a missing or presumed dead person, or they have been sent to prison for extremely extensive terms for some widely reported crime or homicide.

    So if you’ve seen them in the paper? Seen them on TV? They will be coming back.

    In the case of James Comey, he was the partner/owner of Sacramento Valley Construction, another Vinyl Siding outfit doing exterior home improvements.

    In or about 1991-92, the era of Bill Clinton’s rise to national prominence, Comey was supposedly killed by a Sacramento County Sheriff’s deputy in Rancho Cordova, Ca, a smaller suburb of the Sacramento area while under the influence of methamphetamine.

    In the reported incident, he was supposed to be carrying around a large rock inside his shirt, and refused to stand down as ordered by the deputy.

    Comey then made an advancing gesture toward the deputy, and the deputy fell over backwards in response to Comey’s intimidating large 6′ 8″ frame, and fired three rounds from his service pistol into Comey’s chest, killing him.

    If you have access to Sacramento Bee newspaper records, you should be able to trace this information down.

    I work for James Comey in or about 1991-92 as Vinyl Siding installer, and his business partner was Michael Bright.

    In Comey’s pre-reported death, he wore a full beard and mustache.

    The entity, Sacramento Valley Construction, was broken into two separate entities over a financial and operations dispute before the formation of two companies claiming the same namesake.

    The first incarnation of Sacramento Valley Construction was the proprietorship of Michael Bright and Don Mann.

    Mann may have ties to both Sacramento Sheriff’s Department, and the CIA.

    Michael Bright was also rumored to be involved in meth distribution at the stated time period.

    During my employment, Comey always seemed very professional, and showed no signs of meth abuse, and I was quite shocked by the report of drug use and his death.

    They are some really fucked up things that have been going on in Sacramento, Ca for the last 30 years, and they generally point back to FBI, DEA, and CIA involvement with the Sacramento County Sheriff’s Department in conjunction with local Media.

    The whole rest of the United States as individual States, should be totally pissed and demanding investigations in the corruption and undue influence Sacramento exerts against the American People in regard the the governance and media in this country.

    Tracy Mapes has lived in the Sacramento area since 1987, and had also previously attended Bella Vista High School, in Fair Oaks, California.

    He has been employed as a vinyl sider, construction worker, and mechanic along with a stint as a freelance newsman between the years of 1995-2005 in the Sacramento Valley.

  • Freespirit

    An even BIGGER Bombshell has just started :

    The “March” on Washington ,which I have advocated for a few years now, has
    finally begun: http://www.infowars.com/internal-coup-against-hillary-clinton-has-begun-red-alert/

    And yes I am concerned about a few of the people involved due to their Talmudic
    and Evangelical belief system. We will need to watch them carefully because their
    overriding “PRINCIPLE”, motivated by “feelings’ of their SUPREMACY, is
    DOMINATION .

    THOSE could make this worse than what we have now – much worse.

    Time will tell, but “it is on”, nevertheless..

  • Maddog

    Who cares there’s baseball to watch. Election shmecsion. Obama’s not going anywhere.