“Simulated reality,” according to Wikipedia, “is the hypothesis that reality could be simulated—for example by computer simulation—to a degree indistinguishable from ‘true’ reality.” What motivated Hillary Clinton to create a private email system, argues James Taranto, is that it gave her the means to simulate her own reality, or as Bloomberg’s journalists put it “a high level of control over communications, including the ability to erase messages completely, according to security experts who have examined Internet records.”
“You erase it and everything’s gone,” Matt Devost, a security expert who has had his own private e-mail for years. Commercial services like those from Google Inc. and Yahoo! Inc. retain copies even after users erase them from their in-box.
Like many simulations, the illusion was complete only when viewed from within. When seen from outside the system, the simulation artifacts could be readily detected. But that kind of insecurity is acceptable because the system is designed to fool the American public, not the Russian or Chinese intelligence services. In The World of Lawfare, if the legal system can’t officially see it that is good enough. Gawker notes that legal considerations were exactly what motivated Clinton. “An old ABC 20/20 report from 2001 that’s been on YouTube since 2007 shows Clinton might have avoided email entirely later in her term as first lady because of all investigations the Clinton White House was under.”
Senator CLINTON: (From home video) As much as I’ve been investigated and all of that, you know, why would I—I don’t even want—why would I ever want to do e-mail?
“Why would I ever want to do e-mail?” Indeed. When you write your own record you can never be guilty of anything. One newspaper editorial argued that politicians know perfectly well what is legally visible (and therefore acted upon by law enforcement) and what is not; and have created a huge infrastructure of alternative message handlers to circumvent the system. The Washington Examiner notes that while the argument that ‘everybody does it’ is not a legitimate defense, everybody in fact does it. It cites similar but less extensive circumventions by Jeb Bush, Scott Walker, Chris Christie, Rick Perry, etc.
Enough people do it to employ an army of political operatives like Hillary’s mysterious Eric Hotham (or Hothem as it sometimes appears in the ghostly records which captures the trace of his existence) at enormous cost to create false trails, brush away tracks and throw everyone off the scent. These operatives are paid to create layers of complexity to obfuscate the facts, construct entire alternative channels of communication and sometimes manufacture a complete fictional record to present for inspection. Sealing records, classifying information, intimdating leakers — it’s all in a day’s work.
And it’s not just exalted personages like Hillary Clinton and Barack Obama who are protected by this system. Democratic inquisitor Lois Lerner’s hard disk was searched by a blind person before being physically destroyed. Not surprisingly, nothing irregular was found on Lerner’s drive that might aid in the investigation against her. You know you’ve arrived when a cleanup team is assigned to look after you.
Someone like Hillary Clinton has more layers of defense than carrier battle group. David Brock, who heads the Soros-funded Media Matters for America, was out doing the talk show circuit telling anyone who would listen that the Hillary Clinton email scandal was entirely imaginary. You can listen to him in the video below. Not to be outdone, the honorable Representative Elijah Cummings (D) of Maryland’s Seventh District praised Clinton for setting a new standard for transparency — with a straight face. That’s the truth and nothing but the truth.
“As far as I am aware, no other Cabinet secretary in history has ever called for the release of his or her emails — in their entirety and throughout his or her tenure,” Rep. Elijah Cummings (D-Md.) said in a statement on Thursday. “I commend Secretary Clinton’s decision.”
Even if you get past Brock and Cummings, speed past the minders in the mainstream media, find Hotham (or Hothem) if you can, somehow subpoena the servers you are only past the outer ring of defenses. You still have to run the gauntlet of close-in protection provided by the best lawyers money can buy who will fight tenaciously, falling back from venue to venue, like a die-hard rear guard filing motion after motion, until you give up.