Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re: "Tacit approval"? My nose! (Score 1) 199

Would you care to prove that HRC tried to avoid using her private email server for classified communications? Evidence suggests she didn't. Powell had and used an email account on the classified State Department network ("high side"); Clinton did not. The NYTimes reports that a search of Powell's emails was done, and only uncovered two emails, sent to Powell but someone else, that were upgraded to confidential or secret after the fact -- unlike emails that Clinton sent containing information that was classified (and even marked as such) at the time, and emails on her server that included top secret information.

Comment Re: "Tacit approval"? My nose! (Score 1) 199

That article doesn't suggest that either "forwarding information marked classified" or "direct[ing] underlings to remove classification" blocks/markings is at all common. Why is your reading comprehension so awful? Did you get dropped on your head as a baby?

Meanwhile, your overactive imagination is making you hear voices about what was on an email server that was required by federal law to exist and be used for specific purposes, and you're ignoring that Hillary Clinton got caught lying about what was in the emails she deleted.

Comment Re: "Tacit approval"? My nose! (Score 1) 199

You do highlight more relevant distinctions between Colin Powell and Hillary Clinton, though:

Colin Powell did not forward information marked classified. Hillary Clinton did.

Colin Powell did not direct underlings to remove classification information from hard copies before sending it over non-secure networks. Hillary Clinton did.

In fact, Hillary Clinton forwarded the "marked classified but not in the header" email a year after she told her subordinate to handle information in just that manner. Of course, she still had an obligation to protect and preserve the classified information -- but you apparently bought her excuses to the contrary. In fact, she had a further obligation to report the spill and work with appropriate security officers to remedy it, and she failed in that duty as well.

Comment Re: "Tacit approval"? My nose! (Score 1) 199

Aw, the ignorant little spouter of off-topic and factually wrong talking points doesn't like being identified as such. Guess what: Slashdot isn't a safe space, and you're going to get called on false equivalencies and falsehoods. Go away and come back when you know how any of the relevant laws work.

Comment Re: "Tacit approval"? My nose! (Score 2, Informative) 199

Colin Powell used a private email account (not server) only for things that the State Department didn't have a functional email server for. Hillary Clinton avoided using the State Department's perfectly functional system.

Colin Powell only used it for unclassified communications. Hillary Clinton used her email server to receive and send up to TOP SECRET communications.

Colin Powell did not hire personal staff to the State Department basically for the purposes of supporting his private email account. Hillary Clinton brought one of her techs to State so he could more easily support her email server.

Colin Powell did not affirmatively choose to delete emails were under both subpoena in private lawsuits and Congressional investigation. Hillary Clinton did.

Colin Powell did not put his name on a memo that reminded State Department staff of the department policy to avoid using personal email if at all possible, because no such policy existed at the time. Hillary Clinton did put her name to such a memo, because the policy existed before she took office there.

Colin Powell did not have staff who needed immunity agreements from the Department of Justice. Hillary Clinton did, even for things that should not need such agreements, like producing a laptop.

Colin Powell was not represented by lawyers who had conflicts of interest by being potential subjects of investigation over email misuse. Hillary Clinton was -- in fact, one of her lawyers got an immunity deal while representing Clinton.

You have been led around by the nose. Stop being such a tool.

Unsurprisingly, the Republican National Committee operated an email server for White House staff to use for partisan communications and purposes. Unsurprisingly, it's illegal to use federal property for purposes like that. Unsurprisingly, there's no federal law that requires the RNC to retain its internal communications indefinitely, like there is for federal records.

Comment Re: "Tacit approval"? My nose! (Score 1) 199

My justification for the FBI not investigating these attacks is only that the there's no obvious US jurisdiction, and none of the victims seem likely to ask the FBI to investigate while providing information that could establish US jurisdiction. Why do you disagree strongly with that?

The rest of your beef seems to be that I have different standards for thinking the FBI should formally investigate a computer crime from other people have for attributing nationalities to the perpetrators of computer crimes. Do you think there should be just one standard for those two different things? If so, why?

Comment "Tacit approval"? My nose! (Score 1) 199

The FBI will probably investigate these hacks as soon as the victims come forward and cooperate with the investigations.

Which, considering that they are violating various US laws themselves, doesn't seem very likely.

It's lousy pro-jihadist/pro-Russian propaganda to suggest that the FBI should investigate various random crimes, by someone of only self-described nationality, targeting non-US people using servers in unknown jurisdictions, when there's no clear nexus to US jurisdiction.

Comment Re: Meanwhile... (Score 1) 65

For OSes with frequent releases, calendar-based numbering makes more sense than major numbers. What qualifies as a major change in an OS is very subjective, and it means nobody needs to remember how old FooBSD 7.5 or 8.3 or whatever is.

I won't argue that the silly names are a good idea, though.

Slashdot Top Deals

To write good code is a worthy challenge, and a source of civilized delight. -- stolen and paraphrased from William Safire