• It’s You, Isn’t It Hillary?

    June 3, 2016 // 23 Comments »

    hillary1


    After losing the race for president in 2008, Hillary made plans to never have that happen again.


    She believed — no, she was certain — that history had chosen her to be the first woman president of the United States. All the years of acting the role of First Lady, all the public humiliation with Bill’s sex life strewn across TV, it would all finally pay off.

    And she wrote a damn good script. Once again swallowing her pride, Hillary came to publicly support Barack Obama, taking as her prize the job of Secretary of State. As Secretary, she amassed hours of B-roll footage of herself traveling around the world empowering women, talking tough to dictators, showing concern, lots of safe smoke with no dangerous fire.


    About a year ago everything looked good.

    She had a summer autobiography out with a not-running-for-president book tour to get her into the news ahead of a fall announcement to run. Bill was again at her side, the Old Dog returning some big favors by sharing his popular image. The Democratic National Party made sure the fix was in, assuring that she’d only have as “competition” loyal punching bag Martin O’Malley, who’d fight the good fight for awhile before graciously disappearing forever. And just in case, the superdelegate system was tweaked up to ensure Hillary didn’t even really need to win too many primaries. That would also bank campaign funds for the general election. She’d be on the offensive the whole time, controlling the message, basically running an 18 month general election campaign.

    On the Republican side, Hillary faced no real challenge. A limp Jeb, a frustrating Mario, an unsteady Cruz and some has-beens and never will be’s. It’d be a turkey shoot.


    But… but… Hillary just couldn’t stop being herself.

    She is now struggling to just stay above water, hoping to limp to the nomination based on some funny delegate math and a few earlier victories in the South. If she is the nominee, she’ll be the least popular and least trusted nominee from her party in its history, with a negative campaign based nearly 100% on hoping people dislike Trump just a bit more than they dislike her.


    And she did it all by herself.

    Her endless paranoia led her to create that private email server as Secretary of State, despite advice to the contrary (as well as common sense.) She tried to hide it, until she got caught. Her reaction then was to sound like a desperate lawyer without much of case, parsing words and claiming she was the victim of a “vast right wing conspiracy.” Under pressure, she later issued a without-consequences faux apology and pleaded with people to forget the whole thing. Served by a compliant media, she was pretty successful.

    But her lies and parsing and prevarications ended her up as the only candidate in U.S. history running for office while under investigation by the FBI.

    She and her aides are being subpoenaed in multiple Freedom of Information Act cases. The State Department — her State Department — issued a scathing Inspector General report blowing holes in her multiple explanations for the server. State still has an open and ongoing conflict of interest investigation into Clinton’s decision to have senior aide Huma Abedin employed simultaneously by Clinton, the State Department, a Clinton-connected private firm and the Clinton Foundation. Accusations and investigations into the shady finances of and overseas donations to the Clinton Foundation swirl.


    If any of this would have caught the public’s eye a few months sooner, Bernie Sanders would already have the Democratic nomination. If somehow the primary season had a few more months to go, Bernie Sanders would have the nomination.

    The game is not over, and Clinton must survive the final primaries, an FBI report on her mishandling of classified materials on her email server, the convention, and of course the general election itself. Trump will be a rough opponent, and Clinton will be on the defensive much of the time. It is unclear how many of Sanders’ supporters will come over to her after such a bitter primary season.


    Clinton may yet sneak through all this to claim her prize, floating on the apparent new standard for the presidency, “at least she’s not under indictment.” But is that really the way we want to now choose our leaders?



    Related Articles:




    Copyright © 2019. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Facebooktwittergoogle_plusredditpinterestlinkedin

    Posted in Iraq

    Memo to the President Regarding the Hillary Clinton Email Server

    May 29, 2016 // 19 Comments »

    obama and clinton


    The following memo was written by a group of U.S. intelligence, diplomatic, and military veterans, calling on President Obama to expedite the FBI review of former Secretary of State Clinton’s alleged email security violations so the public can assess this issue in a timely fashion.

    Clinton’s judgement — never mind the significant question of legality — is an important criterion which Americans must consider in choosing their next president.

    Yeah, it is long, but sometimes important things are complex, and need to be explained clearly. That is especially true in the case of the Clinton Emails, where the media has failed in its job of explaining how classification works, and the significance of exposing classified material.

    I am a member of the group that drafted this memo, and proudly signed it before it was sent to the White House.

    MEMORANDUM FOR: The President

    FROM: Veteran Intelligence Professionals for Sanity

    SUBJECT: Those “Damn Emails” – “Really a Concern”


    Introduction

    Last Wednesday Robert Gates, CIA Director under President Bush-41 and Defense Secretary under President Bush-43, publicly commented that Secretary Hillary Clinton’s “whole email thing … is really a concern in terms of her judgment,” adding, “I don’t know what originally prompted her to think that was a good idea.”

    What originally prompted her does not matter. As your Secretary of State and your subordinate, she willfully violated laws designed to protect classified information from unauthorized disclosure. It may be somewhat difficult for those not as immersed in national security matters as we have been to appreciate the seriousness of the offense, including the harm done in compromising some of the most sensitive U.S. programs and activities. This is why we write.

    Pundits and others are playing down the harm. A charitable interpretation is that they have no way to gauge what it means to expose so much to so many. We do know, and our overriding concern is to protect the national security of our country from further harm. It would be a huge help toward this end, if you would order Attorney General Loretta Lynch to instruct the FBI to stop slow-walking the email investigation and release its findings promptly.

    If you choose, instead, to give precedence to politics over national security, the American people will be deprived of timely appreciation of the gravity of the harm done; national security officials who do follow the rules will be scandalized; FBI investigators will conclude that that their job is more political than professional; and the noxious impression will grow that powerful people cannot be held accountable when they break the law. Worse: if the results of the FBI investigation remain under lock and key, dangerous pressures are likely to be exerted on the most senior U.S. officials by those who have the key – as we explain below.

    We the undersigned Veteran Intelligence Professionals for Sanity (VIPS) have spent 400 years working with classified information – up to and including TOP SECRET, Codeword, and Special Access Programs (SAP). Given that experience, we believe that much of the commentary on the former Secretary of State Hillary Clinton email controversy has been misplaced, focusing on extraneous issues having little or nothing to do with the overriding imperative to protect classified information.

    As intelligence, military, and foreign service professionals, we are highly aware not only of that compelling need, but also of the accompanying necessity to hold accountable those whose actions compromise – whether for reasons of convenience or espionage – sensitive operations, programs and persons. In addition, we know that successful mutual cooperation with foreign intelligence services depends largely on what they see as our ability to keep secrets secret.

    Background

    Last August, Secretary Clinton handed over her private email server to the FBI, five months after she acknowledged she had used it for work-related emails as Secretary of State. She admitted to having deleted about 31,000 emails she described as personal. Media reports last fall, however, indicated that the FBI was able to recover the personal emails, and was reviewing them, as well as the 30,000 others she had described as work-related.

    In January, the Department of State announced that, of the 30,000 work-related emails, at least 1,340 contained classified material. The Department retroactively classified 22 of those TOP SECRET and prevented their release. Among the 22 were some that, according to media reports, included information on highly sensitive Special Access Programs (SAP).

    The White House has said it will do nothing to impede the FBI investigation and possible filing of charges against Clinton, if the facts should warrant that kind of action. Inasmuch as the outcome of the investigation is bound to have major political consequences, such White House assurances stretch credulity.

    By all indications, the FBI is slow-walking the investigation and mainstream media are soft-pedaling the issue. As things now stand, most Americans remain unaware of the import of this industrial-scale compromise of very sensitive national security information in Secretary Clinton’s emails.

    Our concern mounted in January when the Inspector General of the intelligence community wrote to the chairs of the congressional intelligence committees that he had received from one of the intelligence agencies two “sworn declarations” asserting that Secretary Clinton’s emails contained not only CONFIDENTIAL and SECRET information, but also information at the TOP SECRET/SAP level.

    In 2009, you signed an Executive Order regarding SAP (Special Access Programs), so we assume you were briefed on their extremely high sensitivity and the consequent need to sharply limit the number of people allowed to be “read-in” on them. The mishandling of SAP information can neutralize intelligence programs costing billions of dollars, wreck liaison relationships assiduously cultivated for decades, and get a lot of people killed.

    ‘It Wasn’t That Bad’

    All those directly or peripherally involved in the investigation of the Clinton email issue know very well that it could have a direct impact on who is likely to become the next President of the United States, and they will be making decisions with that reality in mind. They know that it is with you that “the buck stops,” and they are sensitive to signs of your preferences. Those were not difficult to discern in your commencement address at Howard University on May 7, in which you strongly advocated the same basic policy approaches as those espoused by one Democratic presidential candidate – Hillary Clinton.

    Your White House has also made excuses for deliberate security violations by Secretary Clinton that would have gotten senior officials like us fired and probably indicted. We look with suspicion at what we see as contrasting and totally inappropriate attempts by the administration and media to play down the importance of Secretary Clinton’s deliberate disregard of basic security instructions and procedures.

    It appears that the option chosen by the White House is using the declared need for “thoroughness” to soft-pedal and delay completion of the investigation for several more months, while the corporate media sleeps on. Four months have already gone by since the smoking-gun-type revelations in the intelligence community Inspector General’s letter to Congress, and it has been well over a year since Secretary Clinton first acknowledged using an insecure email server for official business.

    Another claim emanating from your White House is that Clinton was careless in managing her emails and has admitted as much, but that she has not damaged American national security. She has called it a “mistake,” but security officials of the National Security Agency explicitly forewarned her against violating basic laws and regulations designed to prevent the compromise of classified information.

    NSA, FBI Have Enough Evidence

    Surely, enough time has passed, and enough material has been reviewed, to permit a preliminary damage assessment. The NSA has the necessary information and should, by now, have shared that information with the FBI. Secretary Clinton’s server in her house in Chappaqua, New York, was not a secured device. Her email address incorporated her initials, “hdr” (apparently for her maiden name, Hillary Diane Rodham). It also included the “clinton” server identity, so it was easy for a hacker to spot.

    Anyone with the proper equipment, knowledge and motivation might have been able to obtain access. That is what hackers are able to do, with considerable success, against government servers that are far better protected than the private email server located in her New York State home.

    In fact, there have been reports that Secretary Clinton’s emails were, indeed, hacked successfully by foreigners. The Romanian hacker who goes by the name Guccifer claimed earlier this month that he had repeatedly hacked her email server. He described the server as “like an open orchid on the Internet” and that “it was easy … easy for me, for everybody.” Guccifer has been extradited from Romania and is now in jail in Alexandria, Virginia, where the FBI is said to be questioning him on the emails. There have also been credible claims that Russian intelligence and other foreign services were able to hack the Secretary’s server.

    Another argument being surfaced, in a transparent attempt to defend Secretary Clinton, has to do with intent. It is said that she did not intend to have classified information on her computer in New York and had no intention of handling secret material in a way that would be accessible to foreign intelligence or others lacking the proper security clearances and the need-to-know.

    But while intent might be relevant in terms of punishment, it does not change the fact that as a member of the Senate Armed Services Committee, then Senator Clinton had clearances for classified information for years before becoming Secretary of State. She knew the rules and yet as Secretary she handled classified information carelessly after a deliberate decision to circumvent normal procedures for its safeguarding, thus making it vulnerable to foreign intelligence, as well as to criminal hackers.

    Anyone who has ever handled classified material knows that there are a number of things that you do not do. You do not take it home with you, you do not copy it and share it with anyone who does not have a clearance and a need-to-know, you do not strip off the classification marks and treat it as unclassified, and you do not transfer it to another email account that is not protected by a government server.

    If you have a secured government computer operating off of a secure server that means that what is on the computer stays on the computer. This is not a matter of debate or subject to interpretation. It is how one safeguards classified information, even if one believes that the material should not be classified, which is another argument that has been made in Clinton’s defense. Whether or not the classification is unnecessary is not your decision to make.

    Apart from the guidelines for proper handling of classified information, outlined in Executive Order 13526 and 18 U.S.C Sec. 793(f) of the federal code, there is some evidence of a cover-up regarding what was compromised. This itself would be a violation of the 2009 Federal Records Act and the Freedom of Information Act.

    Numerous messages both in New York and in Washington have reportedly been erased or simply cannot be found. In addition, the law cited above explicitly makes it a felony to cut and paste classified information removing its classification designation. Retaining such information on a private email system is also a felony. In one of Secretary Clinton’s emails, she instructed her staff simply to remove a classification and send the information to her on her server.

    So the question is not whether Secretary Clinton broke the law. She did. If the laws are to be equally applied, she should face the same kind of consequences as others who have been found, often on the basis of much less convincing evidence, guilty of similar behavior.


    Some More Equal Than Others

    Secretary Clinton’ case invites comparison with what happened to former CIA case officer Jeffrey Sterling, now serving a three-and-a-half-year prison term for allegedly leaking information to New York Times journalist James Risen. Sterling first came to the media’s attention when in 2003 he blew the whistle on a botched CIA operation called Operation Merlin, telling the Senate Intelligence Committee staff that the operation had ended up revealing nuclear secrets to Iran. When in 2006 James Risen published a book that discussed, inter alia, this amateurish cowboy operation, the Department of Justice focused on Sterling as the suspected source.

    In court, the federal prosecutors relied almost entirely on Risen’s phone and email logs, which reportedly demonstrated that the two men had been in contact up until 2005. But the prosecutors did not provide the content of those communications even though the FBI was listening in on some of them. Risen has claimed that he had multiple sources on Operation Merlin, and Sterling has always denied being involved.

    Jeffrey Sterling was not permitted to testify in the trial on his own behalf because he would have had to discuss Operation Merlin, which was and is still classified. He could not mention any details about it even if they were already publicly known through the Risen book. No evidence was ever produced in court demonstrating that any classified information ever passed between the two men, but Sterling, an African American, was nevertheless convicted by an all-white jury in Virginia based on “suspicion” and the presumption that “it had to be him.”

    The contrast between the copious evidence – some of it self-admitted – of Secretary Clinton’s demonstrable infractions, on the one hand, and the very sketchy, circumstantial evidence used to convict and imprison Jeffrey Sterling, on the other, lend weight to the suspicion that there is one law for the rich and powerful in the United States and another for the rest of us.

    Failing to take steps against a politically powerful presidential candidate and letting her off unscathed for crimes of her own making, while an institutionally unprotected Jeffrey Sterling sits in prison would be a travesty of justice not dissimilar to the gentle wrist-slap given Gen. David Petraeus for giving his mistress extremely sensitive information and then lying to the FBI about it.

    Your order to then-Attorney General Eric Holder to let Gen. David Petraeus off easy created a noxious – and demoralizing – precedent in the national security community indicating that, whatever the pains taken at lower levels to prevent compromise of duly classified information, top officials are almost never held accountable for disregarding well-established rules. These are some of the reasons we are so concerned that this is precisely the direction in which you seem to be leaning on the Clinton email issue.

    In our view, the sole legitimate reason for disclosing classified information springs from the only “oath” we all took – “to support and defend the Constitution of the United States against all enemies foreign and domestic.” When, for example, Edward Snowden saw the U.S. government grossly violating our Fourth Amendment right to be “secure” against warrantless “searches and seizures,” he gave more weight to that oath (ethicists call it a supervening value) than to the promise he had made not to disclose information that could harm U.S. national security.


    Possibly Still Worse Ahead

    You might give some thought, Mr. President, to a potentially messy side of this. What is already known about NSA’s collect-it-all electronic practices over the past several years strongly suggests that NSA, and perhaps the FBI, already know chapter and verse. It is virtually certain they know what was in Secretary Clinton’s emails – including the ones she thought she had deleted. It is likely that they have also been able to determine which foreign intelligence agencies and other hackers were able to access the emails.

    One ignores this at one’s peril. Secretary Clinton’s security violations can have impact not only on whether she becomes your successor, but also on whether she would, in that case, be beholden to those who know what lies hidden from the rest of us – perhaps even from you.

    Intelligence professionals (in contrast to the occasional political functionary) take the compromise of classified information with utmost seriousness. More important: this is for us a quintessentially nonpartisan issue. It has to do, first and foremost, with the national security of the United States.

    We are all too familiar with what harm can come from blithe disregard of basic procedures designed to protect sensitive intelligence and other national security information. Yes, the lamentable unevenness in how such infractions are handled is also an important issue – but that is not our main focus in the present context.


    The Truth Will Out

    Not all workers at the NSA or the FBI are likely to keep their heads in the sand, as they watch very senior officials and politicians with their own agendas disregard laws to safeguard the nation’s security. We know what it is like to do the difficult, disciplined work of protecting information from being compromised by strictly abiding by what often seem to be cumbersome rules and regulations. We’ve been there; done that.

    If you encourage the Department of Justice and the FBI to continue slow-walking the investigation, there is a good chance the truth will come out anyway. As you are aware, the Justice Department, the FBI, and NSA have all yielded recent patriots who, in such circumstances, decided that whistleblowing – rather than silence – was the only way to honor the oath we all swore – to support and defend the Constitution.

    To sum up our concern regarding how all this plays out, if you order the Justice Department and FBI to pursue the investigation with “all deliberate speed,” so to speak, and Secretary Clinton becomes president, the juicy email secrets in the hidden hands of the NSA and FBI are likely to give those already powerful institutions a capacity for blackmail that would make J. Edgar Hoover’s mouth water. In addition, information hacked by foreign intelligence services or Guccifer-like hackers can also provide useful grist for leverage or blackmail.


    Taking Care the Laws Are Faithfully Executed

    We strongly urge you to order Attorney General Loretta Lynch to instruct FBI Director James Comey to wind up a preliminary investigation and tell the country now what they have learned. By now they – and U.S. intelligence agencies – have had enough time to do an early assessment of what classified data, programs and people have been compromised. Realistically speaking, a lengthier, comprehensive post-mortem-type evaluation – however interesting it might be, might never see the light of day under a new president.

    We believe the American people are entitled to prompt and full disclosure, and respectfully suggest that you ensure that enforcement of laws protecting our national security does not play stepchild to political considerations on this key issue.

    On April 10, you assured Chris Wallace, “I guarantee that there is no political influence in any investigation conducted by the Justice Department, or the FBI – not just in this [Clinton email] case, but in any case. Full stop. Period.”

    We urge you to abide by that promise, and let the chips fall where they may. Full stop. Period.


    For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)

    William Binney, Technical Director, NSA; co-founder, SIGINT Automation Research Center (ret.)

    Thomas Drake, Senior Executive, NSA (former)

    Philip Giraldi, CIA, Operations Officer (ret.)

    Sen. Mike Gravel, Adjutant, top secret control officer, Communications Intelligence Service, special agent the Counter Intelligence Corps and United States Senator

    Matthew Hoh, former Capt., USMC, Iraq & Foreign Service Officer, Afghanistan (associate VIPS)

    Larry C. Johnson, CIA & State Department (ret.)

    Michael S. Kearns, Captain, USAF Intelligence Agency (ret.), ex-Master SERE Instructor

    John Kiriakou, Former CIA Counterterrorism Officer

    Ray McGovern, former US Army infantry/intelligence officer & CIA analyst (ret.)

    Elizabeth Murray, Deputy National Intelligence Officer for Middle East, CIA (ret.)

    Todd Pierce, MAJ, US Army Judge Advocate (ret.)

    Scott Ritter, former MAJ, USMC, former UN Weapon Inspector, Iraq

    Diane Roark, DOE, DOD, NSC, & professional staff, House Intelligence Committee (ret.)

    Robert David Steele, former CIA Operations Officer

    Peter Van Buren, U.S. Department of State, Foreign Service Officer (ret.) (associate VIPS)

    Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA, (ret.)

    Ann Wright, U.S. Army Reserve Colonel (ret) and former U.S. Diplomat




    Related Articles:




    Copyright © 2019. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Facebooktwittergoogle_plusredditpinterestlinkedin

    Posted in Iraq

    Justice Dept Grants Immunity to Staffer Who Set Up Clinton’s Email Server

    March 4, 2016 // 26 Comments »

    bryan at party



    You remember Bryan Pagliano, pictured above, the guy who ran Hillary’s IT during her 2008 presidential campaign. After Obama tossed Hillary the job of secretary of state, Hillary had Pagliano hired by the State Department. She also had him continue to administer her private server, supposedly paying him on the side for the help.

    Taking the Fifth

    In addition to everything else swirling in the cesspool of that email server, there are also questions about whether or not whether the State Department spent taxpayer money to manage Hillary’s email server. See, Pagliano was working for both State as a government employee and Hillary as a private employee at the same time. One wonders if he always kept the two tasks fully separate, and of course what a government employee was doing working privately for the Clintons at the same time.

    When asked back in September to provide testimony to Congress, Pagliano refused, asserting his Fifth Amendment rights.

    Now things have changed.


    Getting Immunity

    The Justice Department has granted immunity to the former State Department staffer, who worked on Hillary Clinton’s private email server, as part of a criminal investigation into the possible mishandling of classified information, according to a senior law enforcement official.

    The official said the FBI had secured the cooperation of Bryan Pagliano, who worked on Clinton’s 2008 presidential campaign before setting up the server in her New York home in 2009.


    What Pagliano Likely Knows

    Bryan Pagliano can shed light on several issues:

    — Pagliano’s dual role as government employee and Clinton employee opens a whole new arena for investigation against Clinton, similar to the one already ongoing with aide Huma Abedin, who at one point worked simultaneously for the State Department, the Clinton Foundation, Hillary herself and a private company closely tied to the Clintons.

    — While at State, what was Pagliano’s day-to-day job? What did he really do, not just his job description, but is actual work accomplishments? Is there a paper trail showing he did any actual work at all, or was the State “job” just a make-work position to get him on the payroll as a gift in return for his service to Clinton?

    — He listed on LinkedIn his political-appointee position as “Serve as strategic advisor and special projects manager to the Chief Technology Officer (CTO) / Deputy Chief Information Officer (DCIO) overseeing the operations of the Information Resource Management (IRM) bureau.” Employed at such a high level inside State’s IT structure assures that State’s most senior information officers knew about Clinton’s email setup, and apparently did not or were not able to stop it. Unless Brian never told his supervisor about his other job.

    — What was going on inside the State Department vis-a-vis the email server. Who knew about it? When did they know? Was it ever vetted/approved, and if so, by whom? Were objections raised by security personnel and how were those objections dealt with? Who is on the complete list of people who had email addresses on the server? What discussions took place inside State regarding the presence of classified information on the server? Were objections ever raised from outside State, say from the White House or the intelligence community?

    — Pagliano can also speak to what security measures if any were in place on Clinton’s server, and when were they instituted. He had visibility into server logs, showing any attacks or penetrations into the server.

    — Pagliano, as a State Department employee, had access to the State Department computer systems. He currently works as a computer contractor for State, and still has access to State Department computer systems. Has he ever been asked by Clinton to use his positions to gain information she would ordinarily not have access to, or to which she did not want her name attached?

    — Pagliano may have knowledge of where any backups of the server are, shedding light on what emails were deleted by Clinton before her “full disclosure” of what was in fact a highly curated batch of documents.

    There is a lot to learn from Bryan Pagliano. His testimony could be like when the Feds turn a Mafia accountant, a low-level guy with access to the family jewels.


    BONUS: The State Department’s Chief Information Officer, who should have stopped the Clinton email server? Well, well, she retired from State a few months before Hillary left, into a nice job at the IMF. It pays to be a winner!



    Related Articles:




    Copyright © 2019. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Facebooktwittergoogle_plusredditpinterestlinkedin

    Posted in Iraq

    Your Serve, Hillary: Email Scandal Deepens

    August 12, 2015 // 8 Comments »



    March 10: Hillary admits she used a personal email server while Secretary of State, claiming it was because she did not want to handle multiple devices. She adamantly said there was no classified on her server, and that she would never turn the hardware over to anyone. “I did not email any classified material to anyone on my email. There is no classified material.”

    “We have no indication that Secretary Clinton used her personal e-mail account for anything but unclassified purposes,” State Department deputy spokesperson Marie Harf said.

    The devices argument died instantly in a hail of photos of her using multiple devices. Information released yesterday shows that not only did Hillary have classified information on her server, the tiny sample the State Department allowed the Inspector General from the Intelligence Community to review contained very highly classified material. Hillary was forced to turn her hardware over to the FBI.

    Let’s break it down a bit.

    That Classified Material

    Seven emails are currently being reviewed by an inter-governmental agency, led by the FBI, to determine whether or not they are classified. Two other emails were classified as top secret by the CIA, according to information circulated by Senator Chuck Grassley.

    Grassley said in a statement that: “two of the four emails that the office had previously described as ‘above Secret’ were, in fact, classified at the Top Secret/SI level. According to the Intelligence Community Inspector General, the other two emails, which intelligence community officials said were classified by the State Department at the time they were sent, are being reviewed by the State Department to determine what the current appropriate level of classification should be.”

    TS//SI//TK//NF

    In fact, the two emails in question were marked TS//SI//TK//NF. What does all that mean?

    TS = TOP SECRET
    SI = Special Intelligence (SIGINT)
    TK = TALENT KEYHOLE (from satellites)
    NF = NOFORN (US eyes only)

    America has a basic, three-tiered classification system: Confidential, Secret and Top Secret. Hillary exposed the highest level of classification, on par with what Edward Snowden and David Petraeus did. Chelsea Manning is in jail for only Secret level documents.

    After information is considered Confidential, Secret or Top Secret, handling tags apply. These further indicate how the contents should be treated, given where it came from, those “sources and methods” one hears about that when known to an adversary, tell them not only what we know, but how we know it.

    SI and TK together indicate the information came from electronic spying, eavesdropping of some sort, and satellite-based. An adversary would know, after seeing what was on Hillary’s server, that they were being monitored from space and that the U.S. satellites were specifically capable of picking up whatever was discussed in those emails. The argument about how, post-Snowden, all of the world “knows” they are being monitored is one thing, but hard proof in a specific instance is another level of “knowing” that will allow an adversary to take specific countermeasures.

    Lastly, the NF means that the information is of such sensitivity that it cannot be disclosed even to America’s closest allies, typically the “Five Eyes” group: Australia, Canada, Great Britain and New Zealand. Sharing among the group is so broad that the U.S. even gave them access to information pulled electronically by the NSA from inside the equivalent of Japan’s Oval Office.

    As for any security Clinton may have used on her server, it is important to note that Top Secret materials within the government are not only processed on special hardware, they must be read inside of special rooms with physical security.

    A friend of this blog also wrote in to say:

    “Unclass, class up to Secret, and TS/SCI are processed and retrieved on three distinct systems; employees have separate log-ons for each. You can’t ‘accidentally’ send a classified doc to an unclass address.

    “So, for HRC or her colleagues to have gotten classified info into an unclass system, they would have had to copy or ‘gist’ it into the class system, while omitting the markings. As you and others have noted, the material remains classified. This is a deliberate decision to ignore law and regulations. If you then use a non-State server and your personal, unencrypted phones… the likelihood of compromise is high.”

    It is also important to note that Clinton’s email server was not encrypted for at least her first three months of foreign travel, including her using the system on a visit to China.


    What’s Next

    With Clinton’s server (as well as the two thumb drives her attorney held with duplicate contents) now in possession of the FBI, all of the emails she did not delete are available for analysis. Depending on how the other emails, the ones she claimed were personal, were deleted, they may also be forensically salvageable.

    Yet all that only will add to the growing pile of what happened.

    The key question of what will be done with the amassed data, such as some sort of prosecution, remains hanging. It is not a partisan statement or an exaggeration to say that any other government employee found to have held such highly classified data on an unclassified system would have lost her job, her security clearance and likely faced judicial charges.

    Clinton’s limited defense options are already in the trial balloon stage, fronted by a State Department that should be a neutral entity at this point now that the case has moved to the FBI.

    “Department employees circulated these emails on unclassified systems in 2009 and 2011 and ultimately some were forwarded to Secretary Clinton,” said State Department spokesman John Kirby. “They were not marked as classified.”


    What affect any of this will have on voters is even a larger question fully unresolved.



    Related Articles:




    Copyright © 2019. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Facebooktwittergoogle_plusredditpinterestlinkedin

    Posted in Iraq

    Did Spam Filtering Service Have Full Access to Clinton Emails?

    March 19, 2015 // 20 Comments »

    readyclinton

    A researcher says the commercial spam filtering service Hillary Clinton used for her personal email server had full, unfettered access to her messages. A person at the company — or someone who could hack into the company — could read and save any of her messages.

    Marc Perkel tells us that “Hillary Clinton used a spam filtering service MxLogic to filter her spam and viruses. What this means is employees at MxLogic, now owned by McAfee (which has been bought out by Intel), had full access to all her State Department email in unencrypted form.”

    Perkel explains email from the Internet is routed by DNS records called MX records which are used to look up where to deliver email. When someone uses an external spam filtering service they point their MX records to that service and all email for that domain goes to the spam filtering service first. They clean it and forward the good email on to the recipient.”

    So, without such a filtering service, your email goes from You straight to Me. When I sign up for such a service, your email goes from You to the MxLogic Company to Me.

    Setting things up is pretty easy, once you sign up for the filtering service. McAfee says “activation starts with a simple mail exchanger (MX) record redirection.” That redirects emails from you to them, and then them to me.

    Exposing Clinton’s Technical Details

    Did Hillary use the services of MxLogic/McAfee? Perkel says yes, that the MX records for clintonemail.com are:

    clintonemail.com. 7200 IN MX 10 clintonemail.com.inbound10.mxlogicmx.net.
    clintonemail.com. 7200 IN MX 10 clintonemail.com.inbound10.mxlogic.net.

    We know that Clinton’s server was fully unencrypted for her first three months of overseas travel. It is unclear exactly when after that encryption was employed, but it does not matter. McAfee had to be able to read the email messages to filter them. So a message might have been encrypted into McAfee, and it might have left McAfee encrypted, but inside the company it was visible. A company employee could have accessed it. A foreign intelligence service could have planted someone inside the company. Someone could have hacked into McAfee from outside.

    Now one of the ways all this could be quickly checked and parsed through is to examine the header information on Clinton’s emails, the technical stuff you usually don’t see when you open a message (but it is in there.) Oh, wait. You can only see that information if you have the actual electronic email. If someone prints the message out, as Clinton did in delivering 55,000 pages to the State Department, the technical information is lost forever. In that sense, Clinton did not deliver her actual records to State as required by law, just partial copies.

    Now if someone — anyone — who received an actual Clinton email and has it electronically would share that with some responsible technical people, much would be revealed. Someone with access should also look to see if Guccifer leaked full headers with Sidney Blumenthal’s email from the Clinton server.

    Is Clinton Secure?

    So how secure is Clinton’s email server? Well, first of all, the log-in page is still online. Go here and let me know if you get in, please. Keep in mind this may be considered felony hacking and you could go to jail for a long time, so don’t do it.

    But in addition to that, let’s see what security company Qualys’ online server security checker does with Clinton’s rig. Here are the results. Oops! She got only a “B,” with lots of technical stuff marked as “weak.”

    One recalls Clinton in her press conference stating that her server was in a location guarded by the Secret Service. However, researcher Perkel claims to have evidence that the server is at a commercial facility, and not in Clinton’s home or another known location guarded by the Secret Service.

    To be fair, all of the information above pertains to the current state of Clinton’s email server. We do not know much about the state of the server during her four years as Secretary of State. It does seem funny to think, however, that there was any reason to downgrade security at any point. That does not make sense, especially since until recently all of the State Department emails were still on the server.

    Important Note

    Trying to figure out these details is at the edge of my own limited technical knowledge, so I invite readers to clarify, debunk or support all this.

    It also seems that large media companies who can pose questions to Clinton have smart IT personnel. It remains a source of great frustration that these significant issues are being raised exclusively in non-mainstream forums. THE INTERCEPT, WIRED, NEW YORK TIMES — where are you?




    Related Articles:




    Copyright © 2019. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.

    Facebooktwittergoogle_plusredditpinterestlinkedin

    Posted in Iraq

IP Blocking Protection is enabled by IP Address Blocker from LionScripts.com.