Category Archives: Law

Bloomberg

The risk he will not take:

…when I look at the data, it’s clear to me that if I entered the race, I could not win. I believe I could win a number of diverse states — but not enough to win the 270 Electoral College votes necessary to win the presidency.

In a three-way race, it’s unlikely any candidate would win a majority of electoral votes, and then the power to choose the president would be taken out of the hands of the American people and thrown to Congress. The fact is, even if I were to receive the most popular votes and the most electoral votes, victory would be highly unlikely, because most members of Congress would vote for their party’s nominee. Party loyalists in Congress — not the American people or the Electoral College — would determine the next president.

I’m always amused at the horror of some that a president might be selected exactly the way the Founders intended it.

Hillary, And The Law

She thinks laws are for the little people:

“While Clinton may have technical arguments for why she complied with each of these and the other rules that have been discussed in the news, the argument that Clinton complied with the letter and spirit of the law is unsustainable,” said Douglas Cox, a law professor at City University of New York who studies records preservation.

She deserves a long term in Club Fed, not a four-year term in the White House.

Hillary’s Latest Email Problems

John Schindler deconstructs the Gray Lady’s attempt to whitewash:

At the National Security Agency—where I used to work as a senior intelligence analyst, including as the technical director of NSA’s largest operational division—what outsiders call hacking is handled by a shadowy group called Tailored Access Operations that gets at the hard targets requiring actual cyber-break-ins. TAO are probably the best hackers on earth, but Russia and China are no slouches either, as demonstrated by their repeated infiltrations into protected U.S. Government computer networks in recent years.

However, unencrypted IT systems don’t need “hacking”—normal SIGINT interception will suffice. Ms. Clinton’s “private” email, which was wholly unencrypted for a time, was incredibly vulnerable to interception, since it was travelling unprotected on normal commercial networks, which is where SIGINT operators lurk, searching for nuggets of gold.

They hunt for data with search terms called “selectors”—a specific phone number, a chatroom handle, an email address: here Ms. Clinton’s use of the “clintonmail.com” server was the SIGINT equivalent of waving a huge “I’m right here” flag at hostile intelligence services. Since the number of spy agencies worldwide capable of advanced SIGINT operations numbers in the many dozens, with Russia and China in the top five, that Ms. Clinton’s emails wound up in the wrong hands is a very safe bet, as any experienced spy will attest.

The amount of ignorance on this issue spouted by her defenders is both staggering and terrifying.