Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


A summary of the Clinton email saga to date

Posted by khallow on Thursday September 22 2016, @12:53AM (#2076)
10 Comments
Rehash
For those who are still somehow convinced that Clinton didn't commit any crimes in her negligent handling of US classified information, we have this "no spin" summary of the FBI investigation. For example:

The FBI could not review all of the Hillary Clinton emails under investigation because: The Clintons’ Apple personal server used for Hillary Clinton work email could not be located for the FBI to examine.

  • An Apple MacBook laptop and thumb drive that contained Hillary Clinton email archives were lost, and the FBI couldn’t examine them.
  • 2 BlackBerry devices provided to FBI didn’t have their SIM or SD data cards.
  • 13 Hillary Clinton personal mobile devices were lost, discarded or destroyed. Therefore, the FBI couldn’t examine them.
  • Various server backups were deleted over time, so the FBI couldn’t examine them.
  • After State Dept. notified Hillary Clinton her records would be sought by House Benghazi Committee, copies of her email on the laptops of her attorneys Cheryl Mills and Heather Samuelson were wiped with BleachBit, and the FBI couldn’t review them.
  • After her emails were subpoenaed, Hillary Clinton’s email archive was also permanently deleted from her then-server “PRN” with BleachBit, and the FBI couldn’t review it.
  • Also after the subpoena, backups of the PRN server were manually deleted.

Notice the "after the subpoena" stuff at the end of the list. That's destruction of evidence which is likely yet another felony for whoever did that. After that, the report lists all classified information that was discovered from what emails the FBI investigators were able to reconstruct; a list of Clinton players involved in the scandal; and a timeline. The timeline repeatedly lists concerns raised about the email setup, security training for Clinton and her staff, events like destruction of evidence, and hacking attempts, some which were successful, into State Department affairs and personal email accounts of State Department officials and Clinton associates.

Thus, we have strong evidence for gross negligence, which is a felony even if it is not intentional, evidence of coverup of something, and a presidential candidate with a remarkable disregard for the responsibilities of her duties.

A good day at Yellowstone

Posted by khallow on Thursday September 08 2016, @05:37PM (#2058)
9 Comments
Topics
As I've occasionally mentioned, I work at Yellowstone for a private concessionaire in the midst of the largest geyser fields in the world (thanks to the Yellowstone hotspot). A couple of my coworkers have waxed poetic about a pair of closely connected geysers called Fan and Mortar. I had assumed these geysers were runts, but it turns out that they have quite spectacular, though poorly predictable eruptions. Anyway, I finally broke down and stuck around to watch them go off on September 3rd. This is a video of that event by an unrelated watcher. I'm about 50 yards to the right down the boardwalk, about to get soaked.

Geysers are notoriously finicky and some at Yellowstone take years or decades to erupt. Fan and Mortar Geysers are typical of the breed. They have a dormant and active phase and tend to stay in a phase for at most a few years before transitioning. Currently, they're in the midst of their active phase, trending to more frequent eruptions. The current frequency this year has averaged around 5-6 days with periods between major eruptions of between 4 to 9 days. This phase may continue to next year, but who knows?

Anyway, I had heard from one of my coworkers that the geysers had last erupted around 2pm on August 28. The beginning of September 3 was day 5 since the last eruption. I had the day off, so I thought I'd give it a try, assuming that they hadn't already gone off yet. I slowly worked my way over, first checking the times on some of the more predictable geysers of the area (there are around 50 active geysers in this particular area, the "Upper Geyser Basin" including Old Faithful, the most famous geyser in the world and a uniquely consistent performer for a large geyser). It was a bit overcast and cool, a bit too warm for the thin parka I wore, but not quite warm enough for T shirts.

I arrived at Fan and Mortar around 7:30am (MDT). There were already three people watching who informed me that the geysers hadn't gone off yet (it leaves puddles when it does go off). Two had radios going. The area has an avid fan community, the "geyser gazers" that keeps track of the geyser eruptions via radio. The US National Park Service also monitors the channel and records significant geyser eruptions. It's quite active. During the 3+ hours that I stood watching the geyser build up, there were three other eruptions reported, including one of the nearby Riverside geyser, another predictable geyser that goes off just shy of two times a day.

I soon started speaking with the neighbors and getting myself acquainted with this peculiar system. There are a number of things that make Fan and Mortar very unusual. First, they have a complex dynamics between the two geysers even over the course of a few seconds as energy is transferred between geysers. I could see this in how the various vents (there are around a dozen between the two) would come to life (either steaming or sometimes spurting scalding water a foot or two). The two most important vents of the group were the Upper Mortar Vent and the Main Fan Vent. Heavy splashing in either of those two is a usual indicator of an incipient eruption of the pair. The geysers are closely connected and you won't get a major eruption from one without something from the other.

About halfway down this page is a labeled photograph of the two geysers. The river behind them is the Firehole River which runs through the most extensive and vigorous geyser fields in the world. Upper Geyser Basin is further upstream than the other major geyser basins and close to one of the three known magma bulges of the Yellowstone hotspot. There is also this discussion of the dynamics of the two geysers:

Let me walk you through the basics of Frustration and Mortification, ehem, I mean Fan and Mortar Geysers. These two erupt together and when active, the intervals typically fall every 3-7 days. Here's a labeled photo for reference.

Normally, Fan goes through cycles in which its vents turn on in a certain order. After a quiet period (during which Mortar may splash lightly from Bottom or Lower), River Vent turns on. River actually erupts horizontally, away from your perspective in the photo above - so figuring out when River is on either involves using heavy steam as a proxy or walking 100 meters up the path to the bridge where you can get a clear view of it. High and Gold begin to splash and are considered on when the splashing becomes nearly constant. Finally, Angle turns on with a swishing sound. The cycle ends when River turns off again - a single cycle can be anywhere from 20 to 70 minutes, typically.

Every once and a while, an event cycle occurs, simply meaning something different happens. Here's where things get complicated. Main Vent is not a friend to Fan's other vents, and splashing in Main Vent often leads to pauses in activity from the other event. Here's a timeline for what we might consider an "ideal" event cycle:

Main Vent splashing.....River Vent on.....River Vent pause.....River Vent on.....River Vent pause.....River Vent on.....no more Main Vent splashing.....High/Gold Vents on.....Angle Vent on

The final component needed for an eruption is called lock. In lock, High Vent erupts steadily to a height of 1.5-2 meters (5-6 feet), and Gold/Angle Vents splash continuously. An eruption may be initiated from East or Main Vent, or in Upper Mortar. Soon all the vents take off. Upper Mortar reaches 23 meters (80 feet), Main Vent hits over 30 meters (100 feet), and East Vent shows off an impressive horizontal throw that will absolutely get you wet. The following photos are from a particularly strong eruption on August 12th, 2014. Note the drenched people and the beautiful jets from Upper Mortar.

Anyway, back to my story. I came as an event cycle petered out and say on a bench. About 9am after watching nearby Riverside go off, we noticed a pause with almost all activity, particularly that of the River Vent on Fan Geyser, going quiet. One of my cowatchers stated that the pause was rather long, meaning it might just lead to an eruption later that day. He advised I stick around. Despite getting hungry, I decided to heed his advice. Just before 10am, one of the observers saw a bit of water splash in the Main Vent. I was thinking, dude, it was just a little splash. About 15 minutes later it did it again.

Now, you might ask yourself, what's the draw in watching a pile of rock emit steam and water for three hours? Even when the geysers aren't doing the real thing, there's a lot of interplay and activity. It's always doing something. Fan is the main performer here with six major vents running in a line across its mound. River Vent faces the Firehole River, of course, and provides the main indicator of the "event cycle" described above. The three vents across the top, Top, Gold, and Angle Vent all spurt steaming water and often rob power from one another. Then opposite the river are Main and finally East Vent which are the main soakers of the audience when a major eruption happens.

Meanwhile Mortar Geyser groans and hisses ominously. You could always tell when the Upper Mortar Vent was steaming because of the deep growl it emitted while nearby Bottom Mortar Vent would near continuously hiss even during the quiet periods.

So there was always something going on. After 10am, the Fan Geyser vents on the top (Top, Gold, and Angle) resumed activity and soon, we spotted the second singular splash in Fan's Main. That was faithfully radioed in at 10:15am. By this time, I noticed that we were building up a small crowd. Soon after, Top started erupting continually indicating considerable activity. But the other two by it, Gold and Angle would only erupt fitfully with Angle having very little activity. As noted above, we were now looking for "lock" all three vents going simultaneously and continually. The crowd kept building up to I'd guess around 100 people.

Some point after 10:30am, we got a key escalation with water splashing out of the Upper Mortar cone. Shortly after that, lock happened. That's about when the build up of the video above started. You can see Mortar Geyser on the left side with sporadic splashing and the mound of Fan Geyser behind and to the right with steam shooting into the river from the River Vent and the three vents on top steadily erupting to a few feet (the "lock" of course). Then there are larger spurts from the Upper Mortar Vent which shortly cascade into a full-blown eruption from every vent in the video (at 10:48). I was between the spot of the video and the main brunt of the East Fan Vent so I got wet, but didn't get a face full of water. People cleared out of that space quickly.

In addition to my parka, I also wore a hat. That turned out to be a great idea since I would have gotten completely soaked otherwise. The eruptions are hard to video because they generate a huge cloud of steam (and silica rich spray too, hard on lens!) quickly, hiding the details. But moving around, I could see the vents and where the water eventually fell.

Just as with the build up, there was some weird dynamics with power shifting between the two geysers. One geyser would surge with its vents and the other fade a little, back and forth.

I think the build up and eruptive dynamics make this one of the most spectacular geysers in the world though you have to be very lucky to see it erupt, if you don't have the time to sit around to wait on it. The local Old Faithful Visitors Center would have information on recent Fan and Mortar activity and they would be good to consult, if you're just traveling through.

After about ten minutes, the eruption stopped and the geysers entered a heavy steam phase. At that point, I headed off to bed.

Related: check out this awesome video.

Top Comedians 16.09

Posted by The Mighty Buzzard on Friday September 02 2016, @12:53PM (#2048)
8 Comments
/dev/random

By request, these are our top resident wiseasses, clowns, and wit smiths:

By count: Nick Funny Mods %Funny wonkey_monkey60635% aristarchus59625% c0lo58522% Ethanol-fueled43113% VLM3809% bob_super35624% maxwell demon35520% Tork29720% frojack2574% Bot25337%

By percent: Nick Funny Mods %Funny Anne Nonymous16960% Buck Feta19755% Bot25337% DECbot12137% skullz10137% Gaaark21536% wonkey_monkey60635% JeanCroix9232% jimshatt9530% davester66624129%

A tip of the hat to @wonkey_monkey: and @Bot: for being the only ones to make both lists. Their asses are indeed wise.

Looks like I'm going to have to up my game if I want to make the list next time.

Q about math writing on SN

Posted by khallow on Tuesday August 30 2016, @06:45PM (#2042)
25 Comments
Science
Here's my question. Is it possible to write math with all the usual weird symbols on SN? I haven't seen anybody do it, but that might just mean nobody has bothered yet. Even if it's not possible, perhaps there's some other way to display math that's accessible from SN?

I've been kicking around a few mathematical ideas for a number of years and think I'd like to throw them out there similar to how NCommander is planning his development of a keylogger. Unfortunately, my current writing is very symbol heavy, though it mostly relies on normal calculus and algebra symbols. I suppose I could dump it on arxiv.org, though that has visibility to the entire math world, and their expectations are probably going to be higher than the relatively informal mess I'm planning with this project.

Anyway, to outline, way back when (back in the late 90s), I had this hare-brained idea that since I was studying some graduate level algebra at the time, adding a differential to the polynomial-style algebras I was studying would be neat. I soon realized in a naive way that I had a collection of differential equations of a complexity between what are termed "special functions", solutions of very special equations with unusual or even unique characteristics and general functions which are claims made about fairly arbitrary systems with modest restrictions on the equations and/or solutions. I thought at the time, that an intermediate system might have some of the interesting math of the special functions but with a much broader application.

I have off and on over the years read and explored this idea, slowly expanding my understanding of this subject and a number of related topics.

It has turned out to be a huge rabbit hole with all sorts of weird influences from a variety of fields of mathematics such as complex analysis, dynamical systems, algebra, geometry, number theory, and even analog computing. While I would make an attempt to make this material understandable, it would be going to some really esoteric destinations, I think. But I would try to write so that the ideas could be accessible to a knowledgeable layman who has kept up with the series.

Also, if you'd be interested in this, then please speak up.

Troll Hall of Fame 16.08

Posted by The Mighty Buzzard on Monday August 29 2016, @11:58AM (#2038)
10 Comments
/dev/random

Here we go again. AC is excluded of course because he cheats by having tens of thousands of people do his posting for him.

By count: Nick Trolls %Troll Ethanol-fueled56517% Runaway19563097% jmorris23712% The Mighty Buzzard21910% aristarchus2179% frojack1503% Hairyfeet1499% zugedneb9025% khallow876% VLM802% By percent: Nick Trolls %Troll zugedneb9025% Ethanol-fueled56517% Khyber2015% jmorris23712% The Mighty Buzzard21910% jasassin3010% aristarchus2179% Hairyfeet1499% TLA148% Runaway19563097%

A tip of the hat to the returning champions and a hearty welcome aboard to the newcomers.

We're (in?)famous

Posted by The Mighty Buzzard on Wednesday July 20 2016, @11:07AM (#1979)
27 Comments
Digital Liberty

So, audioguy (one of our sysadminy types) was checking the firewall logs and apparently one of the speedbumps we put in for bots got tripped by an L-3 Communications Holdings address. Not to be confused with Level 3 Communications, L-3 is the sneaky spy corp born of the Lockheed Martin merger. So, yes, we're officially being actively (as opposed to the passive scraping the NSA does to everyone's traffic) electronically surveiled.

Mind you, since they're tripping our firewall, they're not going to be seeing much unless they throttle back how many connections they use at once. They really should make use of the API for bot stuff. It's still firewalled but there are bits in it that can get you much more info at once and save us both the overhead of inefficient scraping.

More Clinton emails stuff

Posted by khallow on Tuesday June 28 2016, @01:08AM (#1941)
10 Comments
News
Earlier in a story about the scandal of Clinton's email server, several people made the claim that Clinton hasn't actually committed any crimes (such passing around classified information on unauthorized channels). This article summarizes what they are up against including several examples of concrete, felony-level law breaking:

To make matters worse for Hillary, it recently emerged that at least one of the emails she handed over to investigators under subpoena in fact did contain classified information that was marked as such. The April 2012 email chain discusses an impending phone call with Malawi’s new president. The important part is an email from Monica Hanley, an aide, to Clinton, including the “call sheet” for the secretary. In layman’s terms, this was a note for Secretary Clinton telling her what she needed to discuss during her scheduled phone conversation with a foreign head of state.

We don’t know what that was, however, since most of that email has been redacted as classified at the Confidential level, the lowest classification level in the U.S. Government. The smoking gun here is that the call sheet begins with the line: “(C) Purpose of Call: To offer condolences on the passing pf President Mutharika and congratulate President Banda on her recent swearing in.”

Everything after that has been redacted. But that “(C)” is what is termed a “portion marking,” a tip-off to the reader that the paragraph following is classified. (For how this all works in practice, see this explainer.) In other words, Hanley knew she was sending classified information in an unclassified email to Hillary Clinton’s personal email account, an unambiguous violation of Federal law.

and

Last week the Associated Press broke a big story about how Clinton’s “unclassified” emails included the true names of CIA personnel serving overseas under cover. This was hardly news, in fact I broke the same story four months ago in this column. However, the AP account adds detail to what Clinton and her staff did, actions that placed the lives of CIA clandestine personnel at risk. It also may be a violation of the Intelligence Identities Protection Act, a 1982 law that featured prominently in the mid-aughts scandal surrounding CIA officer Valerie Plame, which so captivated the mainstream media. More recently, former CIA officer John Kiriakou spent two years in Federal prison for violating this law.

To make matters worse for Team Clinton, last week it emerged that several of the classified emails under investigation involved discussions of impending CIA drone strikes in Pakistan. Clinton aides were careful to avoid hot-button words like “CIA” and “drone” in these “unclassified” emails, engaging in a practice that spies term “talking around” an issue.

However, the salient fact is that the CIA—which has the say here—considers this information to be Top Secret, as well as enormously sensitive. It had no business being in anybody’s unclassified emails. As the secretary of state, Ms. Clinton and her top staff had access to classified communications systems 24 hours a day. They chose not to use them here—a choice that clearly violated Federal law. Moreover, this new report demonstrates that a previous Clintonian EmailGate talking point, that discussions of drones in emails were no more than pasting press pieces, and therefore innocuous, was yet another bald-faced lie.

You can read the original article to view embedded links in the quotes above.

It makes little sense, except perhaps to further some false flag operation, to continue to make the argument that Clinton didn't break serious laws here.

12 Red Flags in Clinton's Email Setup

Posted by khallow on Monday June 13 2016, @08:47PM (#1923)
10 Comments
News
Here's an interesting take on Hillary Clinton's email scandal. For example, there's this classic mention of the security of the email server in question:

On January 9, 2011, the non-Departmental advisor to President Clinton who provided technical support to the Clinton email system notified the Secretary’s Deputy Chief of Staff for Operations that he had to shut down the server because he believed “someone was trying to hack us and while they did not get in i didnt [sic] want to let them have the chance to.” Later that day, the advisor again wrote to the Deputy Chief of Staff for Operations, “We were attacked again so I shut [the server] down for a few min.” On January 10, the Deputy Chief of Staff for Operations emailed the Chief of Staff and the Deputy Chief of Staff for Planning and instructed them not to email the Secretary “anything sensitive” and stated that she could “explain more in person.”

Or some CYA discussions by the firm which ended up handling backups of the server at the end before it was seized:

In the letter, Johnson quotes from emails sent by and to employees at Platte River Networks, which indicate there was discussion about how the duration of data backups could be reduced, apparently at the direction of the Clinton Executive Service Corp.

Then this past August, a Platte River Networks employee wrote to a coworker that he was, “Starting to think this whole thing really is covering up some shaddy (sic) s**t.”

“I just think if we have it in writing that they told us to cut the backups, and that we can go public with our statement saying we have backups since day one, then we were told to trim to 30days (sic), it would make us look a WHOLE LOT better,” the unnamed employee continued.

And now the various responsible parties are coordinating their defense:

Four central figures in the FBI’s criminal investigation of Hillary Clinton’s email practices are all using the same lawyer, a move described as a “red flag” by a former U.S. attorney who now runs a government watchdog group.

Lawyer Beth Wilkinson is representing: Clinton former chief of staff Cheryl Mills; policy adviser Jake Sullivan; media gatekeeper Philippe Reines; and former aide Heather Samuelson, who helped decide which Clinton emails were destroyed before turning over the remaining 30,000 records to the State Department.

“I think it would be a real red flag,” Matthew Whitaker, executive director of the Foundation for Accountability and Civic Trust, or FACT, told Fox News, in reference to the legal defense. He suggested having a single lawyer would help the four Clinton aides align their stories for FBI interviews.

It continues to amaze me how Clinton supporters can continue to ignore rather brazen signs of corruption and criminal activity.

Story Pipeline

Posted by Phoenix666 on Friday May 13 2016, @08:21PM (#1884)
9 Comments
Topics

Thanks for the kind message. I have been looking to submit more through the recent dry spell, but the usual sources did run pretty thin. Perhaps we could put call-outs for Soylentils to submit good primers and how-to's they have found to fill those rough patches?

Troll Hall of Fame Redux

Posted by The Mighty Buzzard on Monday May 02 2016, @05:01PM (#1868)
21 Comments
/dev/random

It's that time again. Time to pay tribute to those willing, nay eager, to say that which a lot of people do not want to hear. Be their motives sincere or simply to wind you up, they are the souls brave enough to be unpopular with the masses. Here are the top ten by sheer number of times modded Troll and (of the top 50 of the previous group) the top ten by percent of their comments that have been modded Troll. These are not an "all time" list, only the ones that haven't fallen off the end of our moderation log table. By count: NickTrolls%Troll Ethanol-fueled50117% Runaway19562617% jmorris18412% The Mighty Buzzard18111% aristarchus1558% Hairyfeet1459% frojack1262% zugedneb8624% khallow706% VLM672%

By percent: NickTrolls%Troll zugedneb8624% Ethanol-fueled50117% Khyber2015% jmorris18412% The Mighty Buzzard18111% jasassin3010% Hairyfeet1459% aristarchus1558% Arik418% TLA148%