Scanlyze

The Online Journal of Insight, Satire, Desire, Wit and Observation

Hillary Clinton’s lack of accountability for security breaches at State

It is quite amazing and disturbing the way Clinton’s spin doctors and the neoliberal press have spun the story of Clinton’s illegal basement email server into a tale of “Russia is attacking the United States” with no accountability for Clinton for the shocking lack of computer security at State.

Why were emails not encrypted with PGP so if they were hacked or leaked there would still be an additional layer of protection?

Why were they using passwords instead of dual key encryption with passphrases and two or more factor authentication for access?

Why did she set up an insecure server at home and redirect her official emails to it? A server that reportedly did not support DKIM, so that to communicate with it, DKIM had to be turned off at State as well?

Why in the world when folks at State received phishing emails, and checked with their IT folks, they were told yes go ahead and click on them and put in your password?

Where was their intrusion detection system? Did nobody notice hey all of our emails are being downloaded to a compromised machine in Germany?

Why was TLS reportedly not set up correctly on HC’s basement server when it was set up?

Why was a server configuration program, probably cpanel, left open to the outside world on HC’s server? Given that it was set up by a moonlighting guy from State’s IT, Brian Pagliano, was this also true of severs at State?

Was tripwire running on any of these servers so folks could say hey there’s weird changes happening on our servers that shouldn’t ever happen such as log files getting smaller?

When Pagliano detected that Clinton’s home server had been breached and shut it down, why the fuck did they start it up again. Why was it not shut down for good at this point?

And where is the accountability for Clinton? All we are hearing is Putin, Putin, Putin.

I can’t categorically say that State, the DNC, Clinton’s email would not have been hacked if I was in charge, because there is no such thing as perfect security. But none of the specific things I mentioned above would have happened, that’s for sure.

Copyright © 2016 Henry Edward Hardy

scanlyze1

17 December, 2016 Posted by | Hillary Clinton, politics, scanlyze, State Department, USA | , , , , , , , , , , | Leave a comment

Response to “Why Wikileaks is Wrong”

Here is my response to “Why Wikileaks is Wrong” by Amy Bruckman:

Amy, your argument falls by the categorical imperative: if your argument was correct, then any government openness would be bad and all government information should be classified. You are opposing and undermining the very essence of democracy.

“The best weapon of a dictatorship is secrecy, but the best weapon of a democracy should be the weapon of openness.”

–Nils Bohr
quoted in Kantrowitz, “The Weapon of Openness,” in Crandall and Lewis, “Nanotechnology, Research and Perspectives,” 1992

Wikileaks has received the 2008 Economist Index on Censorship Freedom of Expression Award and the 2009 Amnesty International Human Rights Reporting Award (New Media).

Please reconsider your analysis in this light. Let’s talk about this.

You quote a five step test for when to whistleblow. Here are my responses regarding the war in Afghanistan and whether or not whistleblowing is justified in this context.

1 Do you believe the problem may result in ‘serious and considerable harm to the public’?

The war in Afghanistan has resulted in 1338 confirmed deaths of US personnel and tens of thousands of Afghan deaths, mostly civilians. The US has conducted and condoned assassinations, secret disappearances and kidnappings, torture and rape, all contrary to US and international law.

2 Have you told your manager your concerns about the potential harm?

In November, 2001 I attempted to bring a written resolution before the Washtenaw County Democratic Party opposing the War in Afghanistan. It was ruled out of order by the chair without being submitted to discussion or a vote.

I went to the Rules Committee to ask for a rule permitting debate on my resolution. I was told, “Henry you can stay but if you open your mouth, if you say one word, you will be arrested and removed by force if necessary.”

3 Have you tried every possible channel within the organization to resolve the problem?

Since 2001, I have attended public meetings, written extensively in my blog, written repeatedly to my congresspeople and spoken to several of them in person. I have stood on a street corner by the Ann Arbor Federal Building holding a sign on many cold winter days, often alone.

4 Have you documented evidence that would persuade a neutral outsider that your view is correct?

There is ample evidence that the war in Afghanistan is unwinnable, that it serves no strategic purpose, that it is an illegal war of aggression under US and “customary” international law (in particular, the Nuremberg Principles). And bin Laden is not there, he is in Pakistan, protected by our “ally”.

5 Are you reasonably sure that if you do bring this matter to public attention, something can be done to prevent the anticipated harm?”

I am not sure that what Wikileaks has done will prevent the anticipated harm. But I think it will help. I am sure that if nothing is done, the harms will continue and intensify.

Having said that, I myself would not access or release data in this manner, because I think it would be professionally unethical from the perspective of the System Administrator’s Code of Ethics.

Henry Edward Hardy
Cambridge, MA
https://scanlyze.wordpress.com/category/afghanistan/

Wikileaks
Why Wikileaks is Wrong

Copyright © 2010 Henry Edward Hardy

Submit to del.icio.usSubmit to BluedotSubmit to ConnoteaDigg it!Submit to FurlSubmit to newsvineSubmit to RedditSubmit to FurlSubmit to TechnoratiSocial Networking Icons Help

3 December, 2010 Posted by | Afghanistan, Amy Bruckman, bin Laden, civil disobedience, Crandall, Julian Assange, Kantrowitz, Lewis, Nils Bohr, openness, State Department, whistleblowing, wikileaks | , , , , , , , , , , , , , , , , | 3 Comments