***Official Political Discussion Thread***

Ok fine, maybe he will do that but, but we were just brainstorming what ****ed up bigot Trump would unleash on our people.

That is my concern, not really the petty political moves he will make in the interim
In terms of a permanent AG pick in the scenario of Sessions departing it wouldn't surprise me if the name Rudy Giuliani pops up as someone mentioned earlier. I would hope at least one GOP Senator like Richard Burr or McCain would have some concerns about Trump picking a new AG that wouldn't be recused from the Mueller probe. Maybe enough to root out the worst of the worst. Either way the replacement probably wouldn't differ much from Sessions as long as Republicans still control the Senate.
 
Didn't they pass one of the laws the kids suggested too? While ignoring everything else and voting to arm teachers of course but didn't they raise the age to buy an assault weapon to 21?

Edit: Looks like it was just the Florida Senate, still needs to go through the House.
Either way her argument is utterly ridiculous.
 
Last edited:
https://www.nytimes.com/2018/03/07/us/politics/stormy-daniels-trump.html
Trump Lawyer Obtained Restraining Order to Silence Porn Star
President Trump’s lawyer secretly obtained a restraining order last week to prevent a pornographic film star from speaking out about her alleged affair with Mr. Trump.

The White House’s spokeswoman, Sarah Huckabee Sanders, said on Wednesday that President Trump’s lawyer won an arbitration proceeding against the actress, Stephanie Clifford. She had been paid $130,000 shortly before the 2016 election in what she calls a “hush agreement.” But in recent weeks, she had prepared to speak publicly about Mr. Trump, claiming his lawyer, Michael D. Cohen, had broken the agreement.

Ms. Sanders’s statement put the White House in the middle of a story that Mr. Trump and his lawyer had been trying to keep quiet for well over a year. The turn of events created the spectacle of a sitting president using legal maneuvers to avoid further scrutiny of particularly salacious accusations of an affair and a payoff involving the porn star, who goes by the name of Stormy Daniels.

Although Ms. Clifford said their relationship was consensual, the issue is particularly sensitive to Mr. Trump, whose campaign was dogged by allegations of groping and his boast of grabbing women’s crotches.

Ms. Clifford filed a lawsuit in Los Angeles Superior Court on Tuesday asserting that the nondisclosure agreement that accompanied the $130,000 payment was void because Mr. Trump never signed it.

Ms. Sanders said that the president had denied having an affair with Ms. Clifford or making the payment himself. She added that she was not aware of whether Mr. Trump knew about the payment to Ms. Clifford at the time.

“I’ve had conversations with the president about this,” Ms. Sanders said. “This case has already been won in arbitration, and there was no knowledge of any payments from the president, and he has denied all these allegations.”

Lawrence S. Rosen, a lawyer representing Mr. Cohen, said in a statement on Wednesday that an arbitrator “found that Ms. Clifford had violated the agreement” and barred her from filing her lawsuit.

Ms. Clifford’s lawyer, Michael Avenatti, said that he did not consider the restraining order, dated Feb. 27, valid and that she would proceed with her lawsuit in open court. “This should be decided publicly,” he said.
 
Last edited:
Another thing, Trump is poisoning a potential ACA marketplace stabilization deal because he is demanding more far right stuff. This deal was promised to Collins to get her vote on the tax bill.

So Collins is getting played the same way Flake got played on DACA.

These two called called moderates must entire admit they got finessed, they are incompetent, or they never really cared.
 
Mueller gathers evidence that 2016 Seychelles meeting was effort to establish backchannel to Kremlin

Special counsel Robert S. Mueller III has gathered evidence that a secret meeting in the Seychelles just before the inauguration of Donald Trump was an effort to establish a back-channel between the incoming administration and the Kremlin — apparently contradicting statements made to lawmakers by one of its participants, according to people familiar with the matter.

In January, 2016, Erik Prince, the founder of the private military company Blackwater, met with a Russian official close to President Vladimir Putin, and later described the meeting to congressional investigators as a chance encounter that was not a planned discussion of U.S.-Russia relations.

A witness cooperating with Mueller has told investigators the meeting was set up in advance so that a representative of the Trump transition could meet with an emissary from Moscow to discuss future relations between the two countries, according to the people familiar with the matter, who spoke on the condition of anonymity to discuss sensitive matters.

George Nader, a Lebanese-American business who helped organize and attended the Seychelles meeting, has testified on the matter before a grand jury gathering evidence about discussions between the Trump transition team and emissaries of the Kremlin, as part of Mueller’s investigation into Russian efforts to interfere with the 2016 election.

Nader began cooperating with Mueller after he flew into Dulles Airport in mid-January and was stopped, served with a subpoena and questioned by the FBI, these people said. He has met numerous times with investigators.
 
Poor Hopeless Hicks saying she was hacked while we have the every best Cyber sad!

It's possible. Her emails would likely contain a lot of information of interest regarding the Trump campaign.
The article says she claims she can no longer access 2 accounts, one she used as a member of the Trump campaign and a personal account. I'd be interested in finding out what kind of email addresses she alleges there. Her saying she can no longer access them is what sticks out to me as quite suspicious.
 
It's possible. Her emails would likely contain a lot of information of interest regarding the Trump campaign.
The article says she claims she can no longer access 2 accounts, one she used as a member of the Trump campaign and a personal account. I'd be interested in finding out what kind of email addresses she alleges there. Her saying she can no longer access them is what sticks out to me as quite suspicious.

"What about her emails?"
 
"What about her emails?"
Hypothetically, if I were to steal someone's email address here's what I would do. The process is mostly the same whether it's a Gmail, Outlook, ...
Unrelated but bttw, never ever use AOL.
If I were to have gained access somehow, my first action would be to swiftly remove all the security credentials linked to the email address.
The first step would be to change the password of course, however change it a couple times.

The next step is a bit tricky and depends on how you accessed the email in the first place. Generally you can't just log in with a password as your device ID or IP address will be flagged. An experienced hacker residing in the US would likely opt for the spoofed sim card method, which only works on US persons of course. I don't have any personal experience in using the sim card spoof but I can vouch for its effectiveness. If you know the phone number, which generally isn't hard to find if you have someone's name or email address, you then execute the sim card spoof method and whatever device or program you're using will be recognized as that person's sim card. In other words, you can then request a password reset sent to the victim's phonenumber and your spoofed device will receive it as well. Alternatively, if you already have the email's password you can use the spoof method to send verification codes to your device. Normally when you try to log in on an email address from an unrecognized device or IP you'll be blocked and the email service will request a verification code. Changing any of the security credentials on an email address also requires verification codes that are sent to either the phone linked to the email address or the backup email address.

With the spoof method, you have now quickly gained entry to the victim's email address but you must also move quickly to remove any existing security credentials. Use the verification codes to remove either the linked phone number or backup email and replace it with one of yours. You can then send any further verification codes to the security credential you just added, such as your own phone or backup email. Make sure that none of the original security credentials remain and that all of them have been replaced by yours.
For extra security you may want to replace the security credentials twice like the password. Sometimes an account recovery process will revert to the previous security credentials and changing them multiple times blocks that. The final step is adding a second alias (backup email) into the security credentials. Let's say the stolen email address in this example is called "[email protected]"
In this example I'll refer to this second alias email as "[email protected]". What you then do is select this second alias and use the option to make that the primary email address.
The primary email will now be "[email protected]" and "[email protected]" will be listed as an alias/backup email. You then remove the [email protected] as an alias, which effectively removes it from the email account entirely as the primary email remains [email protected] in this scenario. What you have then done is essentially removed the original email address from existence. Trying to log in or do a password reset on [email protected] will not work because that email address has been rendered non-existent. That would generally discourage the average person from attempting account recovery.


Now you have complete control over the email address, however maintaining access relies mostly on how tech-savvy the original owner is. Active email addresses aren't targeted as much because it's only a matter of time before the owner regains access. An account recovery process will ask you fairly basic questions like the original information at the time the email account was created, answers to one or multiple security questions ("what was the name of your favorite movie?" type questions for example), a number of previously used passwords, a rough timeframe when the account was created, last activity, ...
It can be a lengthy process and the average person targeted by account theft may have some issues trying to recover it but anyone with a bit of digital experience or access to someone who does should be able to regain access in a short matter of time.

That's also why I find Hope's alleged claim that she can no longer access those accounts to be pretty suspicious. It would require some next level incompetence for someone in her position to just lose access to important emails. The process of securing a stolen email account also has to be done quickly as the original owner can intervene at any time during the process of sucessfully accessing the email and changing security credentials.
 
Last edited:
once you've gained access, how quickly can you save all the emails from the account to your hard drive?

if someone hacked your primary email, unless you're asleep, you'd probably figure it out within a couple hours. if you have a full inbox, it'd take a while. but if you know what you're looking for (search Russia + dates between 2014 and 2016 or from: trump + has:attachment) it'd take just a few minutes.
 
once you've gained access, how quickly can you save all the emails from the account to your hard drive?

if someone hacked your primary email, unless you're asleep, you'd probably figure it out within a couple hours. if you have a full inbox, it'd take a while. but if you know what you're looking for (search Russia + dates between 2014 and 2016 or from: trump + has:attachment) it'd take just a few minutes.
Not sure how long that would take actually. I don't know anyone who steals email account for the content of the emails. Normally an account recovery process takes a few days at minimum for an average person, however if the victim can easily contact the email provider directly that can be resolved in a lengthy phonecall.
 
Back
Top Bottom