Foreign Policy

the Truth About Secrets

Hacker: One who accesses a computer system by circumventing its security system, who makes innovative customizations or combinations of retail electronic and computer equipment, or, who shares an anti-authoritarian approach to software development now associated with the free software movement. | Photo: Archives | Hacker, Criminal, Computer, Theft, Programmer, Crime, Mask,

What no one want's to say about secrecy in the Internet age

During a presidential campaign, one cannot expect either of the major two sides to be totally honest in presenting their case. Normally, it is not so much outright lies but significant omissions that are utilized. This election is different with outright lies more in use, and thus we the electorate must discern for ourselves using simple common sense, more than ever, what is real and and what is not.

One of the most critical attacks on Hillary Clinton has focused on her use of a private server and not the government “secure server”. It is a good strategy for Donald Trump as it could indicate carelessness and other personality traits that damage Clinton and counter similar traits the Democrats believe are inherent in Trump.

No such thing as a "secure server"

One problem; anyone who knows anything about hacking, and the state of technology, knows there is no such thing as a “secure server” so in reality it would not matter where Hillary or anyone else placed an e-mail as ALL servers are open to hacking these days. A day does not go by that we read things like the ability of a hacker to take over your car while you are driving or clean out your bank account or lately the Russians allegedly hacking the Democratic Party or what WikiLeaks is up to in this "wild west" hacking world. So using common sense we should assume what should be obvious – namely that there is no such thing as a secure server.

Meanwhile, we should also assume it is not in the interest of the Pentagon, NSA, or any other clandestine agency to admit that they can be hacked (or indeed have been regularly) and those entities also don’t want to admit they are regularly hacking the Chinese or Russians and indeed everyone else including allies. We also know that the Israelis have hacked just about all our relevant government “secure servers”. All sides have an interest in keeping quiet on this little secret.

The truth is if you want to keep a secret, stay away from the internet, a phone line, any sort of microphone and overall... put nothing in writing.

More on Guccifer

Marcel Lazăr Lehel (born in 1971/1972), known as Guccifer, is a Romanian hacker responsible for a number of high-level computer security breaches in the U.S. and Romania. Lehel targeted celebrities, Romanian and U.S. government officials, and other prominent persons.

Lehel first appeared in news media in February 2013 after the website The Smoking Gun reported he was responsible for hacking the AOL account of Dorothy Bush Koch, sister of former president George W. Bush. Family photos of former president George H. W. Bush, who was in the hospital at the time, were circulated to the internet. He also circulated a self-portrait painted by George W. Bush. Lehel went on to hack a number of AOL, Yahoo!, Flickr, and Facebook accounts, giving him access to information about current and former high-level government officials.


Marcel Lazar Lehel, also known as "Guccifer" is escorted by masked policemen in Bucharest after being arrested January 22, 2014. | Photo: Reuters | Guccifer, Marcel Lazar Lehel, Hillary Clinton, Hacker, Email, Computer, Internet, Crime, Romania,

In January 2014, Lehel was jailed in his native Romania for seven years after being convicted of hacking emails of Romanian officials. Lehel was subsequently extradited by Romania to the United States, where he was indicted on federal charges. In May 2016, Lehel pleaded guilty in federal court to two charges. July 2016, he is awaiting sentencing at Alexandria City Jail in Alexandria, Virginia.

Comment on Facebook

Updated Jan 2, 2019 12:27 PM EST | More details


©2019 AND Magazine

This material may not be published, broadcast, rewritten, or redistributed without express written permission from AND Magazine corporate offices. All rights reserved.