Some Truth About Hillary & The Hackers


I’ve been watching ridiculous stories on the “hacked” emails of Hillary, John Podesta, et al, and I think it’s time to insert a bit of reality to the discussion. So, if you have any interest in this, here are some points to consider:

1. Anyone could have hacked Hillary.

People ask me, “Do you think it was the Russians who hacked Hillary?” I tell them that I have no idea who did it, but, “Yeah, sure, it could have been the Russians. Given the lack of security on her server, however, it could also have been the teenager down the street.”

Hillary’s server was more or less wide open. Given enough motivation and a bit of time, any reasonably technical person could have stolen those emails. In the words of one specialist, Hillary’s server was “total amateur hour.” How that happens for a Secretary of State (or a President) is a rather serious question.

Bear in mind that this would be the right setup for purposely leaking information while still being able to claim ignorance, or at least incompetence. I have no idea whether that’s true or not, but I do have to wonder.

2. No one broke into Podesta’s computer.

John Podesta, by all available information, wasn’t hacked, as most people envision hacking. Instead, he fell for a phishing scheme. Someone pretending to be Google suckered him into giving them his password. (You didn’t really think the elite were smarter than the rest of us, did you?)

Once the phishers had Podesta’s password, the rest was simply a vacuuming operation. Then came some kind of handoff to Wikileaks, and the rest was history. And there will be fallout from this for a long time, whether or not media sellouts allow it to be reported. Lots of people are insulted and exposed in those emails.

3. Google has plenty of it.

John Podesta, if you’ve noticed, used a gmail address, meaning that Google sucked his messages up as they were being written – all of them. They also had a ton of Hillary’s “lost” emails. Google literally owned every email from these addresses and dozens of others involved:,,,

And perhaps more importantly, they have everything from

Please understand that Google processed those messages for profitable information immediately. If you have any doubt on this point, consider this: How long does it take them to show you ads for ski resorts after you search for ski boots?

Please don’t imagine that they don’t look at political things; those are far more valuable than your skiing habits, and Google survives by mining information. (In other words, they grab everything they can… which you agreed to in their terms of service.) Google doesn’t charge for your searches, do they? And yet they bring in billions of dollars per month.

This is a useful question: What might you do with tens of thousands of emails to and from insiders and acres of computers to sort them all? Well, that’s about what Google’s doing.

4. NSA has it all.

The NSA has almost everything. We’ve known for a decade or more that they were simply copying everything that went through AT&T facilities. Their data center in Utah was built to store and search all those communications.

William Binney, formerly a senior official at NSA, says that it was probably an intelligence worker behind the DNC leaks, and he might be right – they have it all.

The NSA, put simply, is the largest hacker collective on the planet. They can take over more or less what they want, when they want.

5. Other people have the emails.

All those “lost” emails had recipients, didn’t they? Sure they did, and all those people – and their email servers – have or had copies of everything. And yet I’m not aware of any effort to gather them all up.

This guy says hackers used his servers and that he has records… and that no one from the FBI has bothered to call him.

6. Julian Assange is a front man.

Another good thing to understand is that Julian Assange is the face of Wikileaks, but he doesn’t do all the work himself, and he’s not manning the switches. Lots of other people are doing the daily work. Julian just volunteered to stand in front. And given what’s been happening to him over the past six years or so, you have to say that he’s one seriously brave and tough guy.

One thing Julian gets solo credit for is exposing the Google-State Department connection. (Or perhaps partnership is a better term.) If you’d like the details, see this book by Assange. It’s pretty damning.

And, by the way, Google’s bosses have visited the Obama White House literally hundreds of times. And Eric Schmidt (Google’s big boss) is very close to the Hillary campaign.

* * * * *

Serious data protection requires a professional provider, not amateurs or hucksters. If you’re ready to be serious, Cryptohippie will let you try their service for free. One week, no credit card, no BS. Try it, then either buy or don’t. Use this link.

* * * * *

A book that generates comments like these, from actual readers, might be worth your time:

  • I just finished reading The Breaking Dawn and found it to be one of the most thought-provoking, amazing books I have ever read… It will be hard to read another book now that I’ve read this book… I want everyone to read it.

  • Such a tour de force, so many ideas. And I am amazed at the courage to write such a book, that challenges so many people’s conceptions.

  • There were so many points where it was hard to read, I was so choked up.

  • Holy moly! I was familiar with most of the themes presented in A Lodging of Wayfaring Men, but I am still trying to wrap my head around the concepts you presented at the end of this one.

Get it at Amazon ($18.95) or on Kindle: ($5.99)


* * * * *

Paul Rosenberg

Snowden’s Material Was Just the Tip of the Iceberg: The Situation Is Actually Worse Than You Think


What most people don’t know about the Snowden revelations is that they were mostly old hacker tricks. They were souped up with lots of money, of course, and enjoyed the help of insiders at tech companies, but they were nonetheless hacker tricks. If you noticed the dates on his slides, they were mainly from several years ago: 2007, 2008, and so on.

It’s no secret that the NSA has been trying to hire hackers for a long time. (You can read its pitch to hackers, and a story from a hacker convention.)

So the Snowden revelations, welcome as they were, concerned mostly old techniques. And the NSA, the British Government Communications Headquarters (GCHQ), and the rest (including their allies in the tech business) have not been sitting still in the meantime.

I know this because I manage one of the leading companies in the data privacy business. We deal with these issues on a daily basis.

Before Snowden, I spent a lot of time traveling around the world, making speeches, telling people what the NSA, FBI, CIA, Google, Facebook, and the rest of the gang were doing. Most of the people I spoke to believed I was sincere, but a lot of them thought I was going a bit overboard, trying to sell my product.

After Snowden, that changed of course, but now we face a new issue: it’s still a lot worse than people understand.

The Secret Facebook Experiment

In January of 2012—approaching three years ago—Facebook ran a secret experiment on 689,000 of its users. The purpose of that experiment was to see if the company could change those peoples’ moods by altering their news feeds. And it worked. The results of the experiment concluded that “emotional states can be transferred to others via emotional contagion, leading people to experience the same emotions without their awareness.”

By the way, the US Army was one of the groups which funded the experiment. Interesting bedfellows, no?

That government agents are influencing people online has been known for some time (see here and here), though most people have never been informed of those facts. Most, in fact, have never even heard about the publicly stated wishes of Cass Sunstein. These things are not really secrets… they’re just never included in the big news feeds.

The Facebook experiment—while only one of what are certainly many such events—is important because it shows the direction in which things are moving… leading straight to individualized manipulation.

Mass surveillance is only the first step in a larger process. Once you have all of that information, what are you going to do with it? Leaving it sit really isn’t an attractive option for either the tech companies or the military-intelligence complex. The most obvious use of that information is to manipulate people.

Please don’t allow yourself to think that spies and advertisers would hold back from manipulating people; we all know better than that.

Why They’re Manipulating Us

There are compelling reasons why the data thieves must manipulate us:

The tech companies:

Internet users worldwide are addicted to the free service model. Say “free” and they’ll line up; ask for pay and they’ll walk away.

So how are tech companies supposed to pay their employees, if their customers won’t pay? Well, they found a slick answer to that problem: monetize the users’ lives… turn their private information into money.

When you use a free service, you’re giving the company no choice but to steal your data (and the more intimate, the more valuable), then to sell it. When you use a free service, you are the product. (If you don’t pay, you’re certainly not the customer!)

The spies:

The various spy agencies will always grab and use your information for one overriding reason: they’re afraid that if they don’t, someone else will.

The NSA is hardly the only data-theft gang around. They may be the biggest and best funded, but the others follow behind, learn their tricks, and play the same games. So if the US Intel boys want to keep their edge, they have to use everything they can.

How They Manipulate

You’ve been seeing primitive manipulations for some time. For example, when you do an online search on “skis,” you’ll instantly get ads for discount travel to ski resorts that are near you or that you’ve previously expressed an interest in.

That was kindergarten level. What comes next is proactive rather than reactive, and it’s much, much worse. The data thieves are now creating custom environments for each user.

Right now, what you see on Facebook/Google/YouTube/etc. is not the same screen your neighbor sees.

And the really scary thing about this is not that Google, Facebook, the government, and others are manipulating you, but that the entire process is automated—that computers are learning to manipulate you by interacting with you!

The tech companies, of course, are cashing in on this by selling the right to manipulate you to the highest bidder. Their new “big data” systems are even supercharging the process. The more experience Facebook has with you, the more it learns what will or will not affect you—just like it learned about the 689,000 people it tested in 2012.

So if Google, Facebook, and the rest are to continue providing free services, and if they want to make more money, they have to manipulate you better. And, of course, they will… they’re working on it every day.

“You’re Exaggerating”

I’m sorry if this seems too wild to be real, but please remember that most people couldn’t accept the truth of mass surveillance until they saw Snowden’s slides. What heroes like William Binney and Mark Klein were telling people in 2004 was true, but most people didn’t want to believe it. That only changed when they saw the NSA’s slides in 2013.

The same thing is happening now. Mass manipulation is here and is growing. We need to do better now than we did between 2004 and 2013.

Where This Is Going

This is going precisely where it’s already headed:

Facebook, Google, and the others will do what they’ve always done—find better ways to make money with your personal information. Running a free service doesn’t give them many options, does it?

The spooks will do what spooks always do: get secrets and manipulate them to their advantage. Morality has almost no place at all in espionage. If they can manipulate, they will manipulate.

So, as troubling as it may seem, there is little question that we’re moving into a situation where many people will be living large parts of their lives in a virtual world… a world built specifically for their personalities.

The right to manipulate that world will be sold to the highest bidder or turned over to government agencies, just like Google and the rest deliver your personal information to them now.

And as I say, this is happening already. It’s not yet mature, but it’s getting there quickly.

Think of it this way: if I know what motivates you, I can change your environment based on that knowledge, and I can induce you to act in ways that I prefer. And computers make it easy.

Facebook, almost three years ago, found that it could change people’s moods. You can be very sure that it’s been refining those techniques ever since.

As for the Intel gangs, here are two tactics that GCHQ is already using in its Joint Threat Research Intelligence Group program:

(1) to inject all sorts of false material onto the Internet in order to destroy the reputation of its targets; and

(2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.

These are GCHQ’s own words, by the way, taken directly from its training slides.

Are We Doomed?

We’re only doomed if we sit passively and do nothing… precisely what these groups expect us to do. And if we do sit idly by, the results will be the same as they usually are:

Passivity + Time = Destruction

If you want to retain your own mind and your own moods in the new world of 24/7 Internet manipulation, you can still do it, but only if you act. If you merely sit, you’ll be played; the only variables are how much and when.

To protect yourself, you’ll have to make your information unavailable to the manipulators. To put it simply, you’ll have to throw sand in the abusers’ eyes. You must prevent them from knowing what websites you visit, who you communicate with, and what you say.

There are two ways to do this:

  1. Get (and use) encryption and privacy programs.

  2. Pay professionals to do it for you.

If you want to do it yourself, here’s a PDF that will show you how.

If you want to pay professionals do it for you, make sure that they have their own “private key infrastructure” and “multiple hops.”

What We’ve Seen

We all saw Snowden’s slides. What we have not seen is any positive changes following them. The NSA crew is still doing the same thing every day. Google, Facebook, and the rest are doing the same things every day.

At most, we’ve seen tech companies trying to maintain their public images and spymasters trying to convince Joe American that he should be very, very afraid, and should endorse them to spy even more.

And if there have been no reforms, why should we expect the data thieves to get anything but worse?

Paul Rosenberg

This article was originally published by Casey Research.