Phi Beta Iota: Steve Pieczenik was Deputy Assistant Secretary of State under Henry Kissinger, Cyrus Vance and James Baker. His expertise includes foreign policy, international crisis management and psychological warfare. He served the presidential administrations of Gerald Ford, Jimmy Carter, Ronald Reagan and George H.W. Bush in the capacity of deputy assistant secretary. As we constantly emphasize, 95% of those working for the US Government are good people trapped in a bad system. A tipping point appears to have been reached in which these good people are now saying to the corrupt political class: ENOUGH!
Media seems to be ignoring this potential bombshell. Put most succinctly: once the private email server was taken offline and bleached, all control was lost over all emails copied into handheld devices and from handheld devices into laptops. It is very possible that the laptop now being examined by the FBI contains EVERY email Huma Abedin was a party to. WARNING NOTICE: This information has not been vetted, it is provided for consideration without warranty.
Karl Denninger, The Market Ticker, 1 November 2016
Without that machine (Weiner's laptop) being under remote administration such as Domain Policy control (which we can reasonably assume it was not as Huma claims “she didn't know about it” and it was allegedly a private laptop) there is no remote capability to wipe or otherwise get into said computer and remove the emails either. In fact there's a decent chance it's running an operating system edition (if Windows) that lacks domain control capability entirely. This means that the odds are extremely high that all of the deleted emails to which Huma was a participant are on that computer. EVERY SINGLE ONE. Read full post.
Phi Beta Iota: Karl Denninger is the brilliant and deeply ethical author of Leverage: How Cheap Money Will Destroy the World, and was a co-founder of the original Tea Party movement. We note in passing that the FBI has never been serious about going after real traitors — Saudi and Israeli spies and “agents of influence” are “off limits” to the FBI, as are massive fraud schemes and influence peddling done by senior politicians, the token conviction notwithstanding.
Huma Abedin emails on Weiner computer will confirm corruption scandal involving Qatar pipeline, Syrian Civil War, CIA, Clinton Foundation. *** Obama/HRC are using DOJ with Loretta Lynch to obstruct FBI investigation into Qatar bribes to Clinton foundation. *** https://twitter.com/hectormorenco/status/792590527308763137
Phi Beta Iota: It is entirely possible that Huma Abedin is either a Saudi Arabian clandestine agent monitoring Hillary Clinton on behalf of Saudi Arabia, or a double-agent for Israel, which is very good at using the Saudis as patsies. Also please note that because the private server was taken offline and “bleached,” it is highly likely that the FBI now has ALL of her email, including the 33,000 qui pro quo emails, and perhaps contact emails with her Saudi or Israeli handlers.
The following JPEG is circulating on the Internet as a summary of some of the disclosures in the newly-released Podesta emails. [PBI Comment and sources below the fold.]
by Release of 33,000 Illicitly Destroyed Emails Showing Influence Peddling Quid Pro Quos and Other High Crimes as Well as Racism, Committing Felonies on Camera
Anonymous sources on 4chan are saying that Wikileaks has Hillary’s 33,000 deleted emails, and what’s in them will mean the end of her candidacy and maybe obliterate the Democratic Party. According to link above, the planned release of the material is November 1st, in 4 or 5 sets. Teasers: Money funneled to ISIS, Obama rattling the war drums against Russia to distract from what’s in the leaks, Hillary on racist rants against black subordinates, bribes to media and election officials. Break out the popcorn when it arrives!
While discussing how heroin abuse and how individuals often develop an addiction, Lynch argued:“[I]ndividuals [start out] with a prescription drug problem, and then because they need more and more, they turn to heroin. It isn’t so much that marijuana is the step right before using prescription drugs or opioids — it is true that if you tend to experiment with a lot of things in life, you may be inclined to experiment with drugs, as well. But it’s not like we’re seeing that marijuana as a specific gateway.”Attorney General Lynch added that instead of trafficking rings, what “introduce[s] a person to opioids … [is] the household medicine cabinet.”
A security researcher has demonstrated that the passcode of an iPhone can be cracked using off-the-shelf components which cost just $100 — a tiny fraction of the $1.3 million the FBI paid a third party to do the same thing in the case of an iPhone 5C belonging to the San Bernardino shooter earlier this year. In a video posted on YouTube and an accompanying paper describing the technique, University of Cambridge associate researcher Sergei Skorobogatov showed how a four digit passcode could be revealed in less than two days using a technique known as Nand mirroring.