A few years back I had occasion to setup and run a number of servers in a data host. Fourteen servers in total. These were for my own online businesses, some of which included acting as middleman for retail internet accounts for customers. I had one employee to help me run them. He was quite proficient and we had little difficulty in managing these servers. It was quite instructive. We found that all of the servers were subject to constant bots that sought many ways to bypass the entry codes and gain access to our sites. The attacks were non-stop, around the clock.
For a time this was not an issue so long as we took precautions to defeat the brute force attacks. But the scale of the attacks was a surprise. Not that there was anything provocative about my websites, they were plain vanilla enterprises that had medium traffic and attracted no political attention.
However, after a time we realized that some of the hackers — who resided in many places around the globe — were finding ways to get into one or two of our sites. This was a mystery. After several interventions that required us to reproduce the site or clean it up internally, I noticed that the most effective hackers, the ones that we had the most difficulty with, were coming from China. Everyone, I learned, was having similar issues with Chinese hackers, even US law firms. I was a practicing lawyer at the time so I was familiar with the Bar requirements for client privacy.
That term is actually pretty much a misnomer because these days there are no more “US law firms” or “American law firms’ because the larger firms today are all globalist enterprises with zero loyalty to the US or any other single nation.
Finally the Chinese hackers became so proficient that it was clear we were spending most of our time trying to combat them and cleaning up the damage that these Chinese hackers were doing. Finally I decided to shut down all of my servers as we simply could not protect them and sooner or later we were certain to have a significant data breach that would affect our customers’ privacy. So I closed my online businesses, partly so as not to run into issues with my State Bar.
It occurs to me that when Hillary Clinton — who was ostensibly a practicing lawyer as I was — installed a server in her home in violation of federal law and State Department policy, that this server was highly exposed to hacking by Chinese hackers, as any genuine lawyer should know. In fact, anyone who has attempted to run servers, even in a highly protected server farm, knows that such a server is absolutely guaranteed to be hacked within a matter of days by Chinese bots with the result that all of the information and emails that Clinton had on her server were most assuredly obtained within a single day by government departments in China.
Why was Clinton not prosecuted? At the very least her license should have been revoked for her knowing violations of federal law. When James B. Comey went on the air in 2016 just before the election and declared that Hillary was only guilty of simple negligence and not gross negligence, this was a deliberately false statement. Any lawyer knows that her oversight was gross negligence, not simple negligence, as she knowingly did it. So why was she not prosecuted? It’s a silly question. We all know why. The corruption of absolute power, which was again demonstrated when Bill Clinton “ambushed” Loretta Lynch on the airport tarmac to ensure that she, as Attorney General and thus head of the Department of Justice in 2016, would not prosecute, by promising Lynch either continued office when Hillary won the election or nomination to the Supreme Court. That’s the very definition of corruption.