Email and Cybersecurity for Dummies: a Primer to help w/OIG report about Hillary's Private Server

Hello friends, FYI I've put my blood sweat and tears into this diary ... it occurred to me that non-technical people would not intuitively understand the enormous risks to national security that Hillary took by using a personal email account hosted on a private server. I'm part technologist and part teacher - so I tried to create something that non-techies could be able to read. Can I challenge you to forward the URL for this essay to five people that you can think of who might find it useful? And then challenge them to do the same? National secrets are not something to be trifled with. But most people don't really understand exactly what Hillary even did. Used a personal email account? That doesn't sound so horrific ...

FYI, the focus of the ongoing FBI investigation is on security; when a sample of 40 of her emails were examined, four were found to contain classified information.

In March of 2015, a controversy began when the public technically savvy members of the public learned that

  1. Hillary Clinton had used a personal email account for official business while she served as Secretary of State, and
  2. the personal email account had been hosted on a private server that she owned, and was located in her residence.

What about members of the public who are not so technically savvy? Were they troubled by this news? Probably not. I think I know why. Do the words “hosted on a private server” sound especially menacing to you? No? If anything, they sound more than a tad boring.

Here’s the thing. At it’s heart, the controversy has to do with a number of issues, including national security. National security! Let’s talk strictly in hypotheticals for a moment. Suppose those at high levels in the government were — intentionally or unintentionally — habitually sloppy about keeping sensitive, classified material safe from our enemies … is that boring? Now imagine that those very same folks were using their clout to intimidate and silence underlings who tried to “plug up some of the security holes”, so to speak … is that boring? In Tinker Tailor Soldier Spy, and other spy movies, the plot often includes treasonous government officials selling secrets to the “other side”. National secrets. Secrets that affect national security. Are those secrets boring? Are you kidding me? This stuff is not boring. Anyone who thinks that this topic IS boring clearly must not quite understand what everyone else is talking about.

Some people are geeks. Some are not. The latter aren’t bad people or anything, they just lack certain knowledge. I want to take some time and explain IMPORTANT BUT GEEKY concepts, so that well-intentioned laymen can understand what all of the fuss is about. My goal is to explain the concepts, not to force anyone to agree with my views. I want folks to be able to understand the facts; I think the facts rather speak for themselves. But I do have opinions, and those will undoubtedly leak out in my writing below.

THE OIG REPORT (MAY 2016)

A watchdog group within the State Department launched a project one month after the controversy began (April 2015) to gather information, including

  • the practices of other Secretaries of State, and
  • the relevant laws and/or government policies that were in effect during various administrations

The group, a.k.a. the Office of the Inspector General (OIG), recently completed their work and published a set of reports to document their findings. The fourth and final report, Office of the Secretary: Evaluation of Email Records Management and Cybersecurity Requirements, was issued on May 26 to address

“efforts undertaken by the Department of State (Department) to preserve and secure electronic records and communications involving the Office of the Secretary” (p.4)

A close reading of the title reveals there are not one but two different areas of concern regarding Clinton’s email practices:

  1. Email records management (that is, preserve electronic records), and
  2. Cybersecurity (that is, secure electronic records)

Yikes, we are not even past the title and mucho geekiness has already emerged. Records management? Cybersecurity? WTF? Let me provide some quick translations. The TWO primary concerns about Clinton’s email practices that were researched and summarized in the OIG report are:

  1. Did Clinton fail to take steps to ensure that the public can review the work she was doing as Secretary of State?

    The public has a right to request access to “records” that document the work of any federal agency. In addition, the head of every federal agency (such as the State Department) has the responsibility to create and preserve those records.

    The infrastructure that Clinton used appears to diminish the ability of the public to review her work, since it was essentially “off the grid”.

    Furthermore, the OIG report shows that Bryan Pagliano, the former State Department IT specialist who provided technical support to Clinton (and who was hired in 2009 in an unusual manner as a political appointee, after having worked as an IT director for Clinton's 2008 presidential campaign) was providing that support without the knowledge of his direct supervisors. (p. 39)

  2. Were any risks being taken with classified material?

    In other words, was State Department information stored on her server safe and secure at all times (from the prying eyes of hackers, enemies of the state, and anyone else who was not authorized to view it)?

While both of these concerns are important, in my view the second one is the most critical. The second one also happens to be

  • the one that many laymen seem not to grasp
  • the focus of the investigation being conducted by the FBI

The basic idea: when American intelligence falls into the wrong hands, American national security is compromised. The position of Secretary of State by its very nature is one that involves large amounts of sensitive data. If any of it happened to creep into Clinton’s email (we now know that it did), and that material was not “secure and protected from threats” (p. 26), then … the bad guys might have seen it. This is bad, very bad, for it means that any national secrets that were discussed on Clinton’s emails were rather poorly kept secrets.

Note: Both former Defense Secretary Robert Gates and former acting CIA Director Michael Morell have stated publicly that they believe a number of foreign countries (possibly including Iran, China, or Russia) may have hacked into and seen the contents of Clinton’s private server.

EMAIL ACCOUNT USAGE BY SECRETARIES OF STATE FOR THE PAST TWENTY YEARS

When reviewing Clinton’s email practices, it is helpful to compare and contrast them to those of other recent Secretaries of State. The chart below summarizes various findings from the OIG report.

Comparison of Secretaries of State since 1997

NOTES:

  1. Two other Secretaries have had private email accounts and used them to conduct official business: Colin Powell and John Kerry. Neither of these email accounts was hosted on a private server that they owned and maintained, however. According to the OIG report, Powell was not diligent about preserving his emails (p. 21), but Kerry is meeting current requirements to preserve email records. (p.25)
  2. Other than Clinton, no other Secretaries have used a private email server that they owned and maintained for official business of the State Department.
  3. Other than Clinton, no other Secretaries worked in an environment that lacked a permanent Inspector General in the State Department.

WSJ- State Department Lacked Top Watchdog During Hillary Clinton Tenure

The State Department had no permanent inspector general—the lead watchdog charged with uncovering misconduct and waste—during Hillary Clinton’s entire tenure as secretary, leaving in place an acting inspector who had close ties to State Department leadership. [...]

Five months after Mrs. Clinton left office, Mr. Obama nominated a permanent inspector general, who was confirmed by the Senate three months later.

The lack of a confirmed inspector general raises questions about oversight of the department under Mr. Obama and Mrs. Clinton. The department has been criticized for its failure to gather and archive the email records of Mrs. Clinton and other officials and for responses to public-record requests that lawmakers and advocacy groups say were insufficient, including its response to requests for information from a congressional panel investigating the 2012 terror attack in Benghazi, Libya. [...]

The White House declined to elaborate on reason for the lack of an appointment.

AREA OF CONCERN — CYBERSECURITY (SECURE ELECTRONIC RECORDS)

Regarding Clinton’s email practices: Were any risks being taken with classified material?

One area that the OIG report focused on was “the use of non-Departmental systems to conduct official business.” The big question: was the information related to said business safe when it was on Clinton’s private server?

“In addition to complying with records management and preservation requirements, Department employees, including those in the Office of the Secretary, must comply with cybersecurity policies. Department information must be secure and protected from threats.” (p. 26)

Since 1996, State Department policies have contained provisions enacted in the interest of cybersecurity (also known as computer security). These policies have evolved over time.

Cybersecurity is the set of activities that are required to keep the hardware, software, and information on all components of a computer system safe from unauthorized persons. It includes safeguards to control both physical access and also remote access via the Internet. Protection includes preventing intruders from reading and/or modifying any portion of the system.

To understand potential security issues regarding Clinton’s email practices, one really needs to first understand “how email works”. Below I provide a highly simplified explanation which provides a very limited set of details.

EMAIL 101

In the images below, the top half shows a real world, snail-mail example; the bottom half shows the equivalent situation for email.


Step 1: When you send a message, it needs to be taken to the Post Office (/Email Server)
Step 1: When you send a message, it needs to be taken to the Post Office (/Email Server)

In the real world, a person might compose a letter at a desk in their house. In order to mail it, the letter needs to be taken to the Post Office. The mail carrier usually performs this service.

With email, a person will compose a message using an Email Client. In order to “mail” it, the message needs to be sent to an Email Server, which is a (usually dedicated) machine that hosts processes that are equivalent to those of a Post Office. The job of the processes running on this machine is to accept incoming messages and then take the appropriate steps to send them out on the Internet to where they need to go. An Email Client is usually connected to an Email Server via a Local Area Network (LAN) or the Internet; when the user presses the “send” button, the message is then transported from the Email Client (a program on a machine) to the Email Server (a program on a (usually different) machine).


Step 2: The Post Office (/Email Server) then sends the message to a (usually different) Post Office (/Email Server) that is closer to the recipient.
Step 2: The Post Office (/Email Server) then sends the message to a (usually different) Post Office (/Email Server) that is closer to the recipient.

The next step in the process is invisible to most of us. In the real world, the Post Office that has the letter now takes the appropriate action to send the letter to a (usually different) Post Office that is closer to where the recipient lives.

With email, a program running on the first Email Server reads the distribution list, makes a copy of the message for each address on the list, makes a call to a DNS server to convert each user-friendly address on the email to an IP address, and then sends a copy of the message to each IP address. Note: each IP address is actually the network location of a computer that is configured as an Email Server. If someone sent a message to hdr22@clintonemail.com (the address that Clinton used for official business as Secretary of State), the call to DNS would return the IP address of the computer that was located in Clinton’s basement. When a personal email account is “hosted on a private server,” it means that messages sent to that email account are sent to a computer that is (usually) owned and maintained by the owner of the email account.


Step 3:   The second Post Office (/Email Server) delivers the message to a mailbox.  The recipient must go to the mailbox to retrieve the letter, and then they can read it.
Step 3: The second Post Office (/Email Server) delivers the message to a mailbox. The recipient must go to the mailbox to retrieve the letter, and then they can read it.

In the final step, the destination Post Office receives the letter and takes action to deliver the letter to a mailbox associated with that particular person (either a PO box at the post office or a mailbox where the recipient resides). The recipient must go to the mailbox to retrieve the letter, and then they can read it.

With email, when a program running on the destination Email Server receives the message, it puts that message into a mailbox that resides on the Email Server. The next time that the user runs their email program on the Email Client, that program automatically checks the mailbox on the Email Server and downloads any new messages that are found for the user to their Email Client. The Email Client now lists the new message, and the user is able to read it using their email program.

Congratulations! You have now completed Email 101! If you are interested in setting up your own personal email account hosted on your own private server, just follow the easy directions below!

How to Set Up a Clinton-Style Home Email Server

Setting up a server is no simple task. “It’s a pretty big job to maintain a server like that and make sure it’s properly configured,” says Peter Firstbrook, an Internet security researcher at Gartner. Firstbrook says such an endeavor is “highly unusual.” He has not heard of any companies whose executives had set up personal servers for work emails, let alone government officials.

To set a personal email server, someone would need to:

  • Buy a server, which is about the size of a desktop computer.
  • Buy an operating system to run the server, most likely a version of Microsoft Windows or Linux.
  • Buy an exchange program to manage the flow of emails (Microsoft Exchange Server is the most common).
  • Buy a digital certificate to certify that the server has been encrypted.
  • Buy a domain name (in this case, clintonemail.com).
  • Install the software.
  • Install virus and spam filters.
  • Set up firewalls, including a message-transfer agent, an email-specific firewall.
  • Get a business-class Internet connection—a regular consumer connection likely isn’t reliable enough.
  • Configure the devices using the server, such as Clinton’s BlackBerry.

For any email account, the hosting provider has the responsibility for maintaining the machines that act as Email Servers; they must provide

  • sufficient security to protect the machine and the information stored on it.
  • day to day technical support and also upgrades as necessary.

For email accounts that are hosted on a *.gov server, an IT organization with the federal government is responsible for security and technical support.

For email accounts that are hosted by a provider such as AOL or Google, that hosting provider is responsible for security and technical support.

For personal email accounts hosted on a private server, the owner of the server is responsible for security and technical support.

Potential security issues regarding Clinton’s email practices

Overview slide which essentially combines Steps 1-3.
hdr22@clintonemail.com is the address that Hillary Clinton used for official business as Secretary of State

Now that you are an expert on how email works, let go back and review:

  • An Email Server is a computer that has a special relationship to one or more Email Clients.
  • Setting up a private Email Server is no simple task. It is much more difficult than going to google or yahoo and requesting an email account from them.
  • Hillary Clinton was the only Secretary of State who used a personal email account hosted on a private email server that she owned and maintained.

You also know that If someone sent a message to hdr22@clintonemail.com,

  • the Email Server for the sender would translate that email address to an IP address (like 208.91.197.27), and then send the message to the IP address — which happened to point to a computer that lived in Clinton’s basement
  • the message would be stored at least temporarily on Clinton’s private Email Server (i.e. 208.91.197.27)

Here’s the thing ... persons who are called “hackers,” “spys”, “cyber terrorists,” etc., are also experts on how email works. They know much, much more than has been shown here, including how to “hack into” or “attack” any computer that is accessible on the Internet. That is why most everyone installs firewalls and anti-virus software on their home computers hooked up to the Internet: some hackers enjoy setting traps that will damage the computers of those who run into them. If one doesn’t take steps to safeguard their system, it is vulnerable and most likely will be attacked.

Think about it: if so many Email Servers are able to translate hdr22@clintonemail.com into an IP address, the “bad guys” can translate it too. They know which machine Clinton is using. They also know that as a Secretary of State, she is routinely involved in situations that involve “state secrets” that might be extremely valuable to know. It’s almost as if the bad guys had been handed a map to buried treasure, with a big red “X” marking the spot.

The government and global corporations understand the importance of cybersecurity and hire experts to review their computer systems and take appropriate action to keep those systems safe. The experts monitor for possible cyber attacks; and if/when those occur, they move quickly to understand the vulnerabilities and eliminate them.

In contrast, Clinton’s personal email account was a late addition to a home-grown solution that had already existed for years and had not been designed with security as a top priority. The OIG report indicates that she did not ask for a review to ensure that it was adequate for her official business, but she had an obligation to do so with Diplomatic Security.

OIG found no evidence that the Secretary requested or obtained guidance or approval to conduct official business via a personal email account on her private server. According to the current CIO and Assistant Secretary for Diplomatic Security, Secretary Clinton had an obligation to discuss using her personal email account to conduct official business with their offices, who in turn would have attempted to provide her with approved and secured means that met her business needs. However, according to these officials, DS and IRM did not—and would not—approve her exclusive reliance on a personal email account to conduct Department business, because of the restrictions in the FAM and the security risks in doing so.

During Secretary Clinton’s tenure, the FAM also instructed employees that they were expected to use approved, secure methods to transmit SBU information and that, if they needed to transmit SBU information outside the Department’s OpenNet network on a regular basis to non- Departmental addresses, they should request a solution from IRM. However, OIG found no evidence that Secretary Clinton ever contacted IRM to request such a solution, despite the fact that emails exchanged on her personal account regularly contained information marked as SBU. (p. 37)

*DS - Bureau of Diplomatic Security
*IRM - Bureau of Information Resource Management
*FAM - Foreign Affairs Manual
*SBU - sensitive but unclassified

Technical support for Clinton’s private Email Server was provided by two persons with questionable expertise in security:

  • “an individual based in New York who provided technical support for Secretary Clinton’s personal email system but who was never employed by the Department” (p.2)

    Justin Cooper is a longtime adviser to former President Bill Clinton, and registered the clintonemail.com domain name on January 13, 2009.

  • “a Special Advisor to the Deputy Chief Information Officer (2009-13) who provided technical support for Secretary Clinton’s personal email system” (p.2)

    Bryan Pagliano worked as an IT director for Clinton's 2008 presidential campaign, and then was hired in 2009 by the state department as a political appointee in what the HR manager described as “not a traditional supervisor/employee relationship.” Turns out that Pagliano was providing technical support to Clinton without the knowledge of his direct supervisors, who

    • “believed that [his] job functions were limited to supporting mobile computing issues across the entire Department” (p. 39)
    • “did not know he was providing ongoing support to the Secretary’s email system during working hours” (p. 39)

Several hacking incidents are described in the OIG report. Instead of inviting IT experts in to help understand the vulnerabilities and eliminate them, the incidents were apparently not reported to anyone else in the State Department.

Department policy requires employees to report cybersecurity incidents to IRM security officials when any improper cyber-security practice comes to their attention. 12 FAM 592.4 (January 10, 2007). Notification is required when a user suspects compromise of, among other things, a personally owned device containing personally identifiable information. 12 FAM 682.2-6 (August 4, 2008). However, OIG found no evidence that the Secretary or her staff reported these incidents to computer security personnel or anyone else within the Department. (p.40)

Finally … you know the FBI investigation we keep hearing about? As it turns out, the focus of the FBI investigation is on security:

WP - FBI looking into the security of Hillary Clinton’s private e-mail setup

The FBI has begun looking into the security of Hillary Rodham Clinton’s private e-mail setup, contacting in the past week a Denver-based technology firm that helped manage the unusual system, according to two government officials.

Turns out the investigation was initiated after the Inspector General from the intelligence community, I. Charles McCullough III,

found information that should have been designated as classified in four e-mails out of a “limited sample” of 40 that his agency reviewed. As a result, he said, he made the “security referral,” acting under a federal law that requires alerting the FBI to any potential compromises of national security information.

“The main purpose of the referral was to notify security officials that classified information may exist on at least one private server and thumb drive that are not in the government’s possession,” McCullough said in a statement, which was also signed by the State Department’s inspector general, Steve A. Linick. — link

Now let’s move on to the other area of concern in the OIG report ...

AREA OF CONCERN — EMAIL RECORDS MANAGEMENT (PRESERVE ELECTRONIC RECORDS)

Regarding Clinton’s email practices, Did Clinton fail to take steps to ensure that the public can review the work she was doing as Secretary of State?

The OIG report also focused on “records preservation requirements” and “Freedom of Information Act (FOIA) compliance.” The big question: by using for official business an “off the grid” personal email account which was hosted on a private server that she owned and maintained, did Clinton fail to create and preserve sufficient documentation about said business as proscribed by relevant laws and policies? The most important of these are

The head of each federal agency is required to make and preserve records that document the work of the agency. One reason for this requirement is to satisfy requests from the public made under FOIA. When records are not properly created and preserved, citizens lose the ability to review the activities of their government. “As Congress, the President, and the Supreme Court have all recognized, the FOIA is a vital part of our democracy.”
When President Obama was sworn in, he made a beautiful speech about the importance of FOIA and transparency in government, and made a pledge that “Transparency and the rule of law will be the touchstones of this presidency.”

The way to make government responsible is to hold it accountable. And the way to make government accountable is to make it transparent so that the American people can know exactly what decisions are being made, how they're being made, and whether their interests are being well served.

The directives I am giving my administration today on how to interpret the Freedom of Information Act will do just that. For a long time now there's been too much secrecy in this city. The old rules said that if there was a defensible argument for not disclosing some thing to the American people, then it should not be disclosed. That era is now over. Starting today, every agency and department should know that this administration stands on the side not of those who seek to withhold information, but those who seek to make it known.

To be sure, issues like personal privacy and national security must be treated with the care they demand. But the mere fact that you have the legal power to keep something secret does mean you should always use it. The Freedom of Information Act is perhaps the most powerful instrument we have for making our government honest and transparent, and of holding it accountable. And I expect members of my administration not simply to live up to the letter but also the spirit of this law.


Picture inside a large warehouse
The head of each federal agency is required to MAKE and PRESERVE records that document the work of the agency, per the Federal Records Act. The public has a right to obtain and review these records, per the Freedom of Information Act (FOIA).

The Federal Records Act provides “the legal framework for federal records management, including record creation, maintenance, and disposition.”

The Federal Records Act requires the head of each agency to “make and preserve records containing adequate and proper documentation of the organization, functions, policies, decisions, procedures, and essential transactions of the agency and designed to furnish the information necessary to protect the legal and financial rights of the Government and of persons directly affected by the agency’s activities.” Effective records management is critical for ensuring that sufficient documentation of an agency’s business is created, that an agency can efficiently locate and retrieve records needed in the daily performance of its mission, and that records of historical significance are identified, preserved, and made available to the public. (p. 2-3)

When the act was passed back in 1950, the personal computer had not yet been invented and email did not exist; complying with the Federal Records Act primarily involved making and storing copies of relevant papers. Email communications are a different kind of beast, nevertheless, the Federal Records Act still applies. Records must be created and preserved for all events that meet the definitions specified in the Act, even those that originated on a medium other than paper.

“Although emails were not explicitly mentioned in the Federal Records Act or FAM until the mid-1990s, the law has stated since 1943 that a document can constitute a record ‘regardless of physical form or characteristics.’ “ (p. 4)

Key point: Records management requirements have always applied to emails exchanged on personal email accounts, provided their content meets the definition of a record. In addition, for the last two decades, both Department of State policy and Federal regulations have explicitly stated that emails may qualify as Federal records.

Key point: When official business is conducted on a private email account, it is highly unlikely that appropriate records are either made or preserved for that business. Thus the requirements of the Federal Records Act and FOIA are not met, so citizens rights under FOIA are violated.

FINAL THOUGHTS

My goal was to explain technical and other concepts so that well-intentioned laymen can understand the concerns that are in the news these days regarding Hillary’s use of a personal email account that was hosted on a private server that she owned. Hopefully certain buzzwords are now more meaningful and the OIG report doesn’t sound quite as “cryptic”.

To review: OIG published a report on May 26 called, Office of the Secretary: Evaluation of Email Records Management and Cybersecurity Requirements. It was the fourth and final report in a set of reports that were published. FYI, the names of the other reports can be found on page 1 of the recent document.

A close reading of the title reveals there are not one but two different areas of concern regarding Clinton’s email practices:

  1. Email records management

    In other words: Did Clinton fail to take steps to ensure that the public can review the work she was doing as Secretary of State?

    The public has a right to request access to “records” that document the work of any federal agency. In addition, the head of every federal agency (such as the State Department) has the responsibility to create and preserve those records.

  2. Cybersecurity

    In other words: Were any risks being taken with classified material?

    Was classified State Department information stored on Clinton’s server safe and secure at all times?

    Note: the focus of the ongoing FBI investigation is on security; when a sample of 40 of her emails were examined, four were found to contain classified information.

The title of the OIG report also indicates it is an evaluation. OIG also conducts audits, inspections, and investigations regarding programs and operations of the State Department. The objective of an OIG evaluation is to provide a set of recommendations that will improve the efficiency and effectiveness of the State Department.

  • Note: the objective of an evaluation does not include rendering legal judgement about the guilt or innocence guilt of any party, therefore the lack of such a verdict in this report is not surprising. The OIG report does not make any explicit remarks about Clinton being “innocent” or “guilty” (that I have found); the lack of such remarks does not imply any verdict.

Also note that as part of this project, OIG interviewed dozens of former and current Department employees, including Madeleine Albright, Colin Powell, and Condoleezza Rice, and John Kerry. OIG also requested an interview with Clinton; however, that request was declined.

In conjunction with the interviews, OIG reviewed paper and electronic records and documents associated with these offices. OIG also consulted with NARA officials. Finally, OIG interviewed Secretary Kerry and former Secretaries Albright, Powell, and Rice. Through her counsel, Secretary Clinton declined OIG’s request for an interview.

In addition to Secretary Clinton, eight former Department employees declined OIG requests for interviews: (p. 2)

  1. “the Chief of Staff to Secretary Powell (2002-05);”
    Lawrence Wilkerson
  2. “the Counselor and Chief of Staff to Secretary Clinton (2009-13);”
    Cheryl Mills
  3. “the Deputy Chief of Staff for Policy to Secretary Clinton (2009-11) and the Director of Policy Planning (2011-13);”
    Jake Sullivan
  4. “the Deputy Chief of Staff for Operations to Secretary Clinton (2009-13);
    Huma Abedin
  5. “the Deputy Assistant Secretary for Strategic Communication (2009-13);
    Philippe Reines
  6. “the Director of the S/ES Office of Information Resources Management (2008-13);
    John Bentel
  7. “a Special Advisor to the Deputy Chief Information Officer (2009-13) who provided technical support for Secretary Clinton’s personal email system;
    Bryan Pagliano
  8. “a Senior Advisor to the Department, who supervised responses to Congressional inquiries (2014-15).
    Heather Samuelson (determined which of Clinton's emails to delete in late 2014)

Two additional individuals did not respond to OIG interview requests: (p. 2)

  • "the Deputy Secretary of State for Management and Resources (2011-13)"
    Thomas Nides
  • "an individual based in New York who provided technical support for Secretary Clinton’s personal email system but who was never employed by the Department."
    Justin Cooper (a longtime adviser to former President Bill Clinton. Sec. Clinton, who registered the clintonemail.com domain name on January 13, 2009)
Share
up
0 users have voted.

Comments

I will need to print out so that I can easily go back to it.

up
0 users have voted.
Older and Wiser Now's picture

I really appreciate you giving me feedback.

up
0 users have voted.

~OaWN

Bollox Ref's picture

don't/refuse to see the difference between a personal gmail account............ and your own personal, unauthorized basement server.

Trying to get people to acknowledge the difference is like HMS Glowworm trying to sink the Admiral Hipper. Bloody impossible.

up
0 users have voted.

Gëzuar!!
from a reasonably stable genius.

Older and Wiser Now's picture

Maybe you can print off the slides and take time to teach them?

up
0 users have voted.

~OaWN

of her private server, even that would have been more secure from hacking, although it's not a good idea to put classified information and state secrets on google's servers either.

Great article by the way! So detailed!

up
0 users have voted.

Love is my religion.

Older and Wiser Now's picture

What Powell did was "bad", although it was still the early days and they didn't know better. As I understand it, he was trying to be an advocate for "modern technology" when he was doing it - and that is actually a GOOD thing I think.

But what Clinton did was so many, many times worse. Thanks for dropping by!

up
0 users have voted.

~OaWN

Thumb's picture

Maybe post a summary/review at r/kossaks with a link back here for the full details?

up
0 users have voted.

"Polls don't tell us how well a candidate is doing; Polls tell us how well the media is doing." ~ Me

Older and Wiser Now's picture

I'm glad you like it Thumb, and thanks for letting me know. It all makes sense to me Wink But what matters is if it makes sense to others ...

up
0 users have voted.

~OaWN

Thanks so much for taking the time to write this.

up
0 users have voted.
Older and Wiser Now's picture

Thanks for letting me know you could understand what I was trying to write. Smile

up
0 users have voted.

~OaWN

reflectionsv37's picture

but I too was a programmer in my prior life. I really think the FBI will be recommending indictments, some of which would include multiple counts of perjury, obstruction of justice, failure to report security breaches, and the biggie, mishandling of classified information.

up
0 users have voted.

“Our enemies are innovative and resourceful, and so are we. They never stop thinking about new ways to harm our country and our people, and neither do we.”
George W. Bush

Hillary and the DNC just declared her the presumptive nominee in order to suppress voting in the remaining primaries. My guess is that any indictment or recommenation for legal action will now be suprressed. It is quite possible that this premature declaration was to stop the FBI in it's tracks and has nothing to o with Bernie.

up
0 users have voted.
reflectionsv37's picture

and that we won't be waiting much longer for an announcement. Over the past few days I've read so many articles on this that I've lost track of some of them, but James Comey, the head of the FBI said they won't rush the investigation due to political situations, that their main goal is thoroughness. The FBI has been interviewing a number of people but the only one they've identified by name is Huma Abedin, Hillary's closet aide and they may have interviewed her multiple times.

I also suspect that Hillary has probably also been notified in some way that she has been identified as a target or that they will be scheduling an interview. Hillary lies so much and so often that I simply don't believe her when she claims the FBI hasn't contacted her. By letting that piece of information out, it might have a big change on the primaries and I'm sure she will do everything in her power to withhold that information. Perhaps even after the FBI has interviewed her. I suspect that she won't mention anything about the investigation until the FBI and Justice Department make an announcement. Remember, she hasn't held a press conference for 6 months. She doesn't want to publicly answer anymore questions about this.

And that brings us back to your final sentence that today's declaration of victory is meant to stop the FBI. I don't think that's the case because nothing she says is going to stop the FBI. What they want to do, is stop Bernie. They want so desperately for Bernie to concede but he refuses. I see 2 possible reasons for this. One, it makes it a little more uncomfortable for the Justice Department to move forward with charges due to political reasons. This might make it easier for Obama to step in and put his finger on the scale to protect Hillary if she is truly the sole, unchallenged winner of the Democratic primary nomination. Two, it could be that they, Hillary and the DNC, already know that things look grim for Hillary and having Bernie concede might make it easier for the establishment to find a substitute like Biden or someone else rather than falling in line behind Bernie. I've read other places, if Bernie concedes then he becomes a loser who gave up leaving the ultimate decision to the party. I don't really buy option two as I don't think Hillary ever thinks of anyone but herself and plans to fight on until they handcuff her and frogmarch her off to jail.

All of this makes me think that we won't wait much longer for the FBI to wrap things up. They know what's at stake and I'm sure in the back of their minds they thinking about what might happen if this happens after the primary and before the general, or worse yet, what would happen if they indicted her after she won the general.

One thing I read recently was by a former FBI investigator who was talking about the sequence of events in these investigations. He said that they interview all the other players in the investigation and save the target for last. He went on to say, once they get to the target they only ask questions they already have the answer. It then becomes the choice of the target to essentially confess, or perjure themselves. Ask Martha Stewart what happens when you lie to the FBI!

up
0 users have voted.

“Our enemies are innovative and resourceful, and so are we. They never stop thinking about new ways to harm our country and our people, and neither do we.”
George W. Bush

Steven D's picture

The silence on that truth among the Dem Party and the media speaks to the depth of corruption and the lack of democracy in our country more than anything else I can think of.

up
0 users have voted.

"You can't just leave those who created the problem in charge of the solution."---Tyree Scott

Older and Wiser Now's picture

Geez, I keep hitting the wrong link all the time. This was supposed to be for you Smile

http://caucus99percent.com/comment/103719#comment-103719

up
0 users have voted.

~OaWN

jwa13's picture

up
0 users have voted.

When Cicero had finished speaking, the people said “How well he spoke”.
When Demosthenes had finished speaking, the people said “Let us march”.

Older and Wiser Now's picture

Whatever we have left of Democracy is being tested as we speak ...

She took risks with national security. NATIONAL SECURITY. What could she possibly have done that was worse, short of SELLING the secrets to the Russians?

up
0 users have voted.

~OaWN

Santa Susanna Kid's picture

their hackers may have obtained them without even using Paypal.
Outstanding work, O & W Now. I love the way you laid this out...

up
0 users have voted.
Older and Wiser Now's picture

Yes, the Russians had them, EVERYONE had them. And Edward Snowden is in exile in Russia. So insane ...

Thank you for the nice words, SSK. Makes me feel that all that work might have been worth it.

up
0 users have voted.

~OaWN

Santa Susanna Kid's picture

Edward Snowden for Secretary of State, in my utopian dream...

up
0 users have voted.
Alphalop's picture

to mind....

While not worse directly, the possibilities.....

How ironic would it be if Russia nuked us with our own damn Uranium?

Clinton cannot be allowed to be president. We have already seen the damage she is capable of with the limited powers of SoS, I don't want to contemplate what she will accomplish, or cause, while seated in the oval office.

up
0 users have voted.

"I used to vote Republican & Democrat, I also used to shit my pants. Eventually I got smart enough to stop doing both things." -Me

Older and Wiser Now's picture

the corruption of the Democratic Party.

And as I think on it more, it seems to have started around 1992.

I came across info that makes me realize that Clinton realized that he could ensure his own job security by NOT GIVING HIS BASE what they elected him to do. For example, Ted Kennedy want to to increase the min wage and index it to inflation in the late 90's after Bill had gotten the first enacted. Bill's staff made a comment that by passing another increase they would be,
"giving up a good political issue" or something like that. If poor people got higher wages, they woudn't NEED Dem politicians quite so much ...

Our core problem is not so much money in politics, as it is having Democratic politicians caring more about rich donors than the voters --- and not suffering any consequences for it.

up
0 users have voted.

~OaWN

Steven D's picture

But the 1992 election solidified the takeover.

up
0 users have voted.

"You can't just leave those who created the problem in charge of the solution."---Tyree Scott

[deleted]

up
0 users have voted.
Older and Wiser Now's picture

Can you check the end of the comments? That was supposed to be for you. I'm cursed or something ...

up
0 users have voted.

~OaWN

Older and Wiser Now's picture

Thank you BBO! I always get nervous before I hit publish, it's nice to hear that it seems to make sense to you. I took a look at a lot of explanations about email on the Internet, and I am rather proud of what I came up with. Of course, it is very simplified, but I think it gives a good high level explanation ...

State Department buzzwords:
sensitive but unclassified (SBU)
Foreign Affairs Manual (FAM)

I bet it's in my quotes, not in what I wrote per se. But I will update to make it more clear ...

I don't know the answer to your question about two systems, but it seems like it could be true.
"Secretary Kerry uses a Department email account on OpenNet" (p. 25) so I imagine that 'not on OpenNet' might be an option?

up
0 users have voted.

~OaWN

[deleted]

up
0 users have voted.
Older and Wiser Now's picture

Really just meant to say that I was a programmer, that's all.

But yes, if you get more info I would be interested in hearing what you find out.

up
0 users have voted.

~OaWN

[deleted]

up
0 users have voted.
Older and Wiser Now's picture

up
0 users have voted.

~OaWN

[deleted]

up
0 users have voted.
yellopig's picture

Also, two things:

  • Hillary doesn't use a password. How insane is that?
  • Email is not "point-to-point" like snail mail is. How many intermediate stops might our national secrets have made?
up
0 users have voted.

“We may not be able to change the system, but we can make the system irrelevant in our lives and in the lives of those around us.”—John Beckett

Older and Wiser Now's picture

Techies who know what is going on just shudder. Both items you mention are so cringe-worthy.

I hadn't been even thinking about the second .. you are exactly right. It's truly incredible what she did. And to not be punished for it at all, and win the presidency? Ridiculous.

up
0 users have voted.

~OaWN

[deleted]

up
0 users have voted.
Older and Wiser Now's picture

I heard somewhere that when you fly somewhere, much of the time your luggage isn't actually on the same plane as you are. I'm not sure if that's true or not, but when you think about it, it doesn't actually need to be on your same plane ...

I imagine that all kind of optimizations are made when routing snail-mail, the equivalent of trying not to have empty seats on a plane. And so a package might bounce around to various cities, because it turns out that is the cheapest route, as bizarre as it sounds.

It's kind of wild to think of snail mail delivery as being like a 'cloud based system', but I think you are right, it kind of is.

up
0 users have voted.

~OaWN

yellopig's picture

That say that handlers can't open & read the contents. It's point-to-point in the sense that (legally) only the sender & receiver may open & read.

Unencrypted email is copied as plain text by each intermediate computer on the way. And anybody who doesn't bother with passwords surely won't use encryption either.

up
0 users have voted.

“We may not be able to change the system, but we can make the system irrelevant in our lives and in the lives of those around us.”—John Beckett

reflectionsv37's picture

of an email, you can see where it went. Those emails bounce all over the place, sometimes making hops all over the world. Particularly when you're sending email internationally.

up
0 users have voted.

“Our enemies are innovative and resourceful, and so are we. They never stop thinking about new ways to harm our country and our people, and neither do we.”
George W. Bush

Hawkfish's picture

Ok, point to point is tricky. We are no longer in the days of arpanet with store and forwarding mail, and hopefully they were at least using some kind of end to end encryption (e.g. SSL on port 447) but that is still risky if someone compromises a node in the middle during a remote connection session. If they were smart enough to set up the keys for the laptop/device she was using in a secure environment, then it is probably difficult to hack. But this is US State, so it is a fat target just begging for a zero day exploit.

Then there is the lack of a password...

WTF? The gibberish I just spouted was middling level technical wisdom from about 10 years ago, and it is not good that they may be that out of date. But passwords go back to Biblical times. Not knowing that shit...

These people are dumber than a bag of hammers! This is the sort of judgement we are supposed to be voting for??? My sweet little non-technical 79 year old mother has more clues than that!

Is that really true? Do you have a reference?

up
0 users have voted.

We can’t save the world by playing by the rules, because the rules have to be changed.
- Greta Thunberg

yellopig's picture

It's been a hashtag on twitter for days now (#HillaryPassword).

up
0 users have voted.

“We may not be able to change the system, but we can make the system irrelevant in our lives and in the lives of those around us.”—John Beckett

Hawkfish's picture

Is this why she want to put Bill in charge of the economy? She doesn't understand (or even want to understand) all these computer thingies, and since Bill was responsible for the first internet boom, he must be a good choice. That way she can get back to blowing things up?

up
0 users have voted.

We can’t save the world by playing by the rules, because the rules have to be changed.
- Greta Thunberg

Zinman's picture

We now know her server was not explicitly authorized by the State Department's security systems administrators, nor was it authorized to protect classified information. We also know some foreign agents spy on our Government's communications, and we know some of them are very good at their jobs.

Given that all the findings of the FBI inquiry will not be made public, should there not be a parallel set of prosecutions (if any found to be warranted) for unclassified violations and another set of prosecutions for classified violations?

The political ramifications for Hillary entail serious conflicts within our National Presidential elections. To me, the ethical path for Hillary is to drop out of the Presidential election, but she seems disinclined to do that, which alone is enough to disqualify her from consideration as a Presidential candidate.

up
0 users have voted.

Be a Friend of the Earth, cherish it and protect it.

Older and Wiser Now's picture

it will be crystal clear to many that we are not a country of laws.

No man is above the law, but maybe it's different for women?

up
0 users have voted.

~OaWN

[deleted]

up
0 users have voted.
reflectionsv37's picture

but it needs another section added. I think what you presented is very clear but there is more to this than first meets the eye. We all know that investigations evolve as more and more information is discovered and I think you stopped short of detailing what is the most significant information revealed thus far in this investigation.

To recap a little of what you presented, it's readily apparent that the use of a private email account and in particular, the use of a privately maintained server in her basement, did not safeguard the information included in those emails nor did it come anywhere near the security requirements necessary to prevent unauthorized access by hackers or foreign operatives from accessing that information.

It also shows that these records were not maintained in a way that would allow access to the information for FOIA requests. That is proven in a number of different instances where the State Department responded to FOIA requests stating there were no documents found. This occurred solely because the State Department never had access to the emails on Clinton's private server. The State Department itself could not access that information and in fact, some claim that they didn't know a private server was being used by Clinton. Note: I don't really believe that.

But here begins what I think is missing from your analysis. As the investigation evolved, it has now become known that the contents of Clinton's email exchanges were captured and retained on her private server. It appears, by the shear volume of over 62,000 emails, that most of those emails must have been retained, with the exception of emails from a 2 month period when she first began using her email address at the State Department.

It is also now known that there was a great deal of highly classified information in those emails retained on her personal server, some even rated Top Secret and some classified as SAP(Special Access Programs) that can and do contain the most sensitive secrets of our government. I believe this now the main focus of the investigation and that which will ultimately be the most damaging. The question now is, did Hillary Clinton knowingly or negligently mishandle classified information? The answer to that question has to be a resounding yes!

As I see it, this has to do with how she maintained(or in this case failed to maintain) the security of the classified information that was trusted to her. First, upon here departure from the State Department, she was required to return all information classified and otherwise of department records in her possession. She obviously did not do that as the information was retained, and eventually discovered on her server after she left the State Department.

Her actions after leaving the State Department in regards to the security of the server and dumbfounding. After leaving office, Brian Pagliano could no longer maintain her server so contracted with another company Platte River Networks in Denver, CO to maintain her server. This is a small time mom and pop operation and she literally and figuratively, handed that server, that box, that had all of that classified information over to group of unknown people. No one in Platte River Networks had any security clearances or had ever handled classified material before.

Platte River copied the contents of her server to a new server and placed the new server back in service. They claim they erased the contents of the original server but did not "wipe" it clean. To wipe the hard drive would be to overwrite many times with data so the information could never be read again. If I understand this correctly, the FBI has the server and has been able to recover not only the 32k emails Clinton handed over as work related(these were the ones that contained the classified material) but they were also able to recover the 30K + emails she deleted from the server that she claimed were personal. Some of which we now know for certain were work related.

If handing the server over to Platte River wasn't bad enough, it gets even worse. Platte River Networks had an agreement with another company Datto Inc. that provided back up services to Platte River Networks. It was discovered that Datto Inc. backed up the entire contents of Clinton's personal server for further retention in the "cloud". The cloud is offline storage of information for future retrieval. Think about that for a minute. Classified National Security information sitting on the cloud and who knows where else?

To make this a little more understandable to the layman who might not understand the concepts of emails, servers and data retention and backups, let's paint this hypothetical of Hillary's actions using an example of paper documents.

Clinton has access every day and receives paper documents from many different sources. She is supposed to put those documents into file cabinets at the State Department so they are secure and can be accessed in the future for FOIA requests and other requirements.

Rather than use the State provided file cabinets, she puts them in her briefcase, takes them home each night and files them in a box(the server) in her basement. She does this for 4 years commingling personal information and classified information. When she leaves the State Department, rather than turn this box of papers over to the State Department as she is required, she retains it. She not only retains it, but hands it over to another company to make copies and put those in a new box(her new server). The company that she entrusted to copy and put the documents in the new box, makes a backup copy that they store somewhere(the cloud) to protect themselves from any being lost. If that is not mishandling classified government information, I have no idea what the meaning of mishandling, is, is.

I believe this is what they ultimately nail Clinton with and she could serve 10 years in prison because of it. If you want to understand how all this transpired, in great detail, read the long version of the http://www.thompsontimeline.com/The_Clinton_Email_Scandal_Timeline.

up
0 users have voted.

“Our enemies are innovative and resourceful, and so are we. They never stop thinking about new ways to harm our country and our people, and neither do we.”
George W. Bush

Older and Wiser Now's picture

I was worried about the length of the diary already, but your comment adds an extra dimension to the issues. I love that it is part of the "permanent record".

Your comment makes me think of the brief statement made by the Intelligence IG, I. Charles McCullough III, when he said

“The main purpose of the referral was to notify security officials that classified information may exist on at least one private server and thumb drive that are not in the government’s possession,” McCullough said in a statement, which was also signed by the State Department’s inspector general, Steve A. Linick.

Once it's not in the government's possession anymore, the genie is out of the bottle. He must be livid. Just imagine the conversations that must be going on behind close doors these days ... And the politics. I've been watching "House of Cards" so I can just imagine the games that must be going on as the various players try to make things go their way ...

If she manages to win the prize, she's surely going to be impeached within the first 100 days ... Maybe we should convince Bernie to be her VP after all, if you catch my drift.

up
0 users have voted.

~OaWN

reflectionsv37's picture

was a section about the Clinton's attorneys negotiating for the release of the server and the thumb drive. At that time, the files on the server were deleted and Her attorney, Kendall had the thumb drive of the 32k emails in his safe. The State Department was so concerned about the information on the thumb drive(I'm sure they now knew through other sources that it contained classified information) that the State Department sent him a SCIF(Sensitive Compartmented Information Facility) safe to protect the data. Apparently, an ordinary safe could allow people to read the contents via technology I'm not familiar with. Apparently, a SCIF is somehow enclosed in a wire mesh that prevents any radio or other electronic signals to escape or enter.

Hillary and all of her aides offices were enclosed in a SCIF and Hillary was not allowed to bring her BlackBerry into her office as it was not a secure device. She had to lock in a secure box before entering her office. They set her up a room, just outside of her office and the SCIF where she could go to check her email.

The whole thing makes House of Cards looks like a cheap novel. I think it was Kevin Spacey that said something along the lines that the plot of HoC doesn't even come close to comparing to what is really happening in our government. I think he's right!!

If you haven't, do yourself a favor and read that timeline. It's absolutely incredible!

up
0 users have voted.

“Our enemies are innovative and resourceful, and so are we. They never stop thinking about new ways to harm our country and our people, and neither do we.”
George W. Bush

reflectionsv37's picture

about Clinton's server, Platte River Networks and Datto Inc. Unbeknownst to Clinton, IT firm had emails stored on cloud; now in FBI's hands I just stumbled across this yesterday and thought it was a new article. Turns out this was written way back on October 6, 2015. I think most people at that time missed the significance of this as I don't even remember it being discussed. And I was trying to pay attention!!! This information needs to come out and be spread around. The more exposure it gets, the less likely the FBI or Justice Department can quietly let this go away.

With the information that is already out there, it's clear as can be that Hillary Clinton is guilty of crimes. Hopefully, the FBI and Justice Department will pursue them. If you or I did anything like this, we'd already be in jail awaiting trial.

up
0 users have voted.

“Our enemies are innovative and resourceful, and so are we. They never stop thinking about new ways to harm our country and our people, and neither do we.”
George W. Bush

riverlover's picture

to withhold to standards of transparency, hiding multiple interests, ostensibly working at high security levels within the government while everyone involved seemed to be getting compensated from multiple competing sources. Everyone must have a closetful of hats.

And cloud storage of government documents! Even little I did not have cloud storage until a year ago (2015) although I had remote backup from Carbonite (paid by year) which I actually used after a careless moment when I had ransomware installed and had to pay for a complete OS rebuild from Win7 though all developmental iterations to Win10.

I cannot conceive of cloud storage. I need pictorial images. and imagine a huge flock of sheep, with thousands of color splotches, milling across a hilllside, with shepherds calling out occasionally to their flock and having them arrive and assemble back in numerical order. Ultimate sheep counting.

up
0 users have voted.

Hey! my dear friends or soon-to-be's, JtC could use the donations to keep this site functioning for those of us who can still see the life preserver or flotsam in the water.

reflectionsv37's picture

Where exactly did my data go when I sent it to "The Cloud". Where is it, who has it, how is it protected, is it protected who are you sharing it with... The questions go on and on!!! And with National Security information??? A bunch of the CIA agents mentioned in those emails are probably pretty worried!!!

up
0 users have voted.

“Our enemies are innovative and resourceful, and so are we. They never stop thinking about new ways to harm our country and our people, and neither do we.”
George W. Bush

Thank you, OaWN.

up
0 users have voted.

~ Be kind, for everyone you meet is fighting a hard battle. ~

Older and Wiser Now's picture

... I've loved those words of wisdom ever since I first heard them years ago. They are so, so true.

up
0 users have voted.

~OaWN

riverlover's picture

used that first. But it is a reiteration of the Golden Rule.

up
0 users have voted.

Hey! my dear friends or soon-to-be's, JtC could use the donations to keep this site functioning for those of us who can still see the life preserver or flotsam in the water.

Older and Wiser Now's picture

I never thought of it as the Golden Rule, but I see your point. Though I think it is a BETTER version of the Golden Rule. It's that last part at the end, "for they are on a difficult journey". It helps us connect with our empathy and compassion.

Be kind to everyone you meet - I think that's the Golden Rule. It says "do this", but it doesn't say why. It's that "why" part at the end that has so much kick to it, at least to me.

up
0 users have voted.

~OaWN

Deja's picture

I'm sending links to this to several people I know, because trying to explain it gets frustrating.

I'm still baffled, though, as to WHY ANY govt employees conduct "official business" on "private email" ever? We truly are the laughing stock of the world. I could never do this. Anyone else? No .gov on the addy, and I'm going to think it's nefarious, for sure.

Also, in MS Exchange class, we were told that Blackberry devices, and what they sent/received, were more secure than other hand-helds due to the added network through which the messages were sent. Certainly not a #Killary supporter, just giving the devil her due, if you will.

Again, EXCELLENT breakdown, and Thank You!

up
0 users have voted.
Older and Wiser Now's picture

I love the "I'm sending links to this to several people I know" part! Woo-hoo! Flattery's not so bad either Wink

I think that Powell used it back at a time when the government was "behind the times" ... *.gov email simply did not exist. So he now had a way to communicate with folks around the world ... it was probably thrilling. They didn't really know the risks back then ...

I don't think there are good reasons today to use private mail instead of government accounts. I imagine the biggest reasons private mail is used is for secrecy, folks don't want others to know what they are actually doing.

I don't know about the Blackberry devices and Exchange. I heard that Obama got a souped up Blackberry-type solution to use, and the Hillary wanted one too and was peeved that her request was denied. Apparently the cost was huge.

Thanks for dropping by and letting me know ...

up
0 users have voted.

~OaWN

I am not sure of the audience you hope to reach. Are you going to publish on Wiki? Do you want to create a document that is kept in archives as an ongoing reference for readers?

Is there a short version for those who understand how email works and do not wish to set up their own server?

I look forward to the final version and your decision on where to publish.

up
0 users have voted.

Look up at the stars and not down at your feet. Try to make sense of what you see, and wonder about what makes the universe exist. Be curious. Stephen Hawking

Older and Wiser Now's picture

though I've been known to publish at TOP on a few occasions. My original plan was to publish it over there tomorrow, I'm still toying with the idea although considering the news of today I imagine it might be too bloody.

I put a note over on Kossacks earlier today - I just wanted to put a tool in the hands of activists and even not such activists. If each person could think of five people, and those people could think of five people, then perhaps she wouldn't get away with it because people don't really understand what she actually did and why it was so bad.

I haven't been involved with Wiki before ... have you? Maybe I should think about doing that. Basically my goal was to inform the population in the next few months or so, and hopefully be able to exert pressure on the political options that might present themselves.

up
0 users have voted.

~OaWN

Alligator Ed's picture

I am not a geek and know nothing about computing except how to turn it on, get to email and you tube; perhaps write a few emails. In my former life, when I still had a business, it was mandated that :thou shalt have a server". I was smart enough to know that I didn't know anything about this,despite having post-graduate degrees. Thus, I hired "IT guys" at whose mercy I remained for several years until the server electrocuted itself. Despite a small volume, relatively speaking, of in-out stuff, the IT people were getting very financially comfortable on my small scale operation.
So, Shillary, who probably has little more IT knowledge than me, had a ginormous server on which there were AT LEAST 62K emails (not counting an unknown number between her and Pagliano). It stands to reason (which HillBots don't do very well) that IT intervention had to be made one an almost daily basis. Therefore there MUST be at least one co-conspirator (Pagliano).
Your excellent, and thankfully simplified explanation, leaves open, for me at least the possibility (probability?) of another insider at State who helped arrange the off-loading FROM and TO State.gov email addresses. Could only one insider have made that work?
The analogy that comes to mind, when talking about the delivery of goods, was the handling of Bootleg during Prohibition. The Hootch was off-loaded from a boat or plane, then transferred to trucks. The truck had a delivery route, whereby the booze was removed from the truck and redistributed into the speakeasy. I don't know if this analogy is suitable, but could this whole thing have been managed by Pagliano alone?

up
0 users have voted.
Older and Wiser Now's picture

I'm assuming from your pic that you are a Mr., I sure hope I'm not being sexist!

I don't think there was an offloading going on though ... just people sending secret stuff to clintonemail.com. It's my understanding that even Obama sent a few messages to that address ... I guess it was easier to just Clinton have her way than speaking up about not using *.gov account.

At the end of my article is a list of 8 people besides Clinton who refused to cooperate with the OIG. I suspect that most of those folks were in on what was going on. And yes, computers do have a way of needing attention on a regular basis. For sure Pagliano has the low-down on what was going on. Apparently the Cooper fellow, who reside in N.Y., also most have helped out when the machine needs some hands-on attention. I read somewhere that he was likely the person who shut down the system when it was being attacked by a hacker a few times.

up
0 users have voted.

~OaWN

if he has been given immunity?

up
0 users have voted.
Wink's picture

HRC ain't going anywhere except to the White House. She's untouchable.

up
0 users have voted.

the little things you can do are more valuable than the giant things you can't! - @thanatokephaloides. On Twitter @wink1radio. (-2.1) All about building progressive media.

Great diary! Two main takeaways here:
1. Obama didn't appoint an Inspector General during Clinton's ENTIRE run at State. WHY? This allowed her to stack the deck with flunkeys and cronies and run amok with Clinton Family Foundation stuff and FOIA failures.
2. Private SERVER. Your chart clearly shows that no other SOS had one.

Obama had to know what was going on. You gotta come off the golf course at least once in eight years.

up
0 users have voted.
Older and Wiser Now's picture

Not only that, he actually sent her mail at hdr22@clintonemail.com. He had to know what was going on.

up
0 users have voted.

~OaWN

pfiore8's picture

up
0 users have voted.

“There are moments which are not calculable, and cannot be assessed in words; they live on in the solution of memory… ”
― Lawrence Durrell, "Justine"

One tiny omission re: Govt Retention:. Retained documents also become part of the National Archives. So HRC's server and deleted emails have pre-emptively censored American history.

Today, Obama Admin has reneged on promise to release HRC's TTP-related emails, saying they will be released in November. Hope someone leaks these ASAP!

up
0 users have voted.
Older and Wiser Now's picture

At least she tried. reflectionsv37 pointed out in the comments,

"Her actions after leaving the State Department in regards to the security of the server and dumbfounding. After leaving office, Brian Pagliano could no longer maintain her server so contracted with another company Platte River Networks in Denver, CO to maintain her server. This is a small time mom and pop operation and she literally and figuratively, handed that server, that box, that had all of that classified information over to group of unknown people. No one in Platte River Networks had any security clearances or had ever handled classified material before.

Platte River copied the contents of her server to a new server and placed the new server back in service. They claim they erased the contents of the original server but did not "wipe" it clean. To wipe the hard drive would be to overwrite many times with data so the information could never be read again. If I understand this correctly, the FBI has the server and has been able to recover not only the 32k emails Clinton handed over as work related(these were the ones that contained the classified material) but they were also able to recover the 30K + emails she deleted from the server that she claimed were personal. Some of which we now know for certain were work related.

If handing the server over to Platte River wasn't bad enough, it gets even worse. Platte River Networks had an agreement with another company Datto Inc. that provided back up services to Platte River Networks. It was discovered that Datto Inc. backed up the entire contents of Clinton's personal server for further retention in the "cloud". The cloud is offline storage of information for future retrieval. Think about that for a minute. Classified National Security information sitting on the cloud and who knows where else?"

The good news is that the information is actually still available. The bad news is that it was STORED IN THE CLOUD, OMG and that the FBI and OBAMA are apparently playing games to stall the release of information that the public has every right to know, under FOIA.

up
0 users have voted.

~OaWN

riverlover's picture

http://mobile.wnd.com/2016/06/fbi-revolt-of-watergate-proportions-if-hil...

I cannot tell how new this is really, but AFAIK, first mention of seizures of additional servers from State, and more indication that there will be a massive public FBI walk if there is no indictment.

up
0 users have voted.

Hey! my dear friends or soon-to-be's, JtC could use the donations to keep this site functioning for those of us who can still see the life preserver or flotsam in the water.

lunachickie's picture

thanks for posting it here--awesome details!

up
0 users have voted.

when it was first published.

up
0 users have voted.
lunachickie's picture

Well damn, I missed that placement!

That'll teach me to get all hung up on one post in particular Wink

PS--that speaks well of traffic in general around here, doesn't it? I'm here every day, but yet I missed something that good...

up
0 users have voted.
Older and Wiser Now's picture

It's nice to hear your kind words at the end of this particular day.

And yes, isn't great that traffic is so great. Kossacks is about to break the 2000 users threshold, and I think that MO said that the search engines are starting to pay attention! That's kind of nice thought too ...

up
0 users have voted.

~OaWN

up
0 users have voted.
Older and Wiser Now's picture

up
0 users have voted.

~OaWN

riverlover's picture

so sad, but that could all be bot-driven flags.

up
0 users have voted.

Hey! my dear friends or soon-to-be's, JtC could use the donations to keep this site functioning for those of us who can still see the life preserver or flotsam in the water.

But I want to thank you so much for putting this together. What I've read looks very valuable, and I'm going to come back and read it thoroughly so I can fully appreciate what you've done here.

up
0 users have voted.

Please help support caucus99percent!