Press Enter to search or select a section to narrow results

Was there a double standard on the investigations of David Petraeus and Hillary Clinton?

Dea. Ron Gray Sr. · Friday, July 8th 2016 at 11:09PM · 2183 views
Was there a double standard on the investigations of David Petraeus and Hillary Clinton?

Soon after the FBI announced that it did not recommend charges against Hillary Clinton for her use of private servers as Secretary of State, Donald Trump revived an old line of attack: that Clinton was getting better treatment than David Petraeus.

"The system is rigged. General Petraeus got in trouble for far less. Very very unfair! As usual, bad judgment," Trump tweeted.

What went out

There are three levels of classification set by the U.S. government: confidential, secret, and top secret, in order of increasing severity. Comey said that the FBI found 110 emails in 52 email chains from the Clinton servers that contained information that was classified at the time they were sent or received. Of those email chains, 36 were found to include information labeled secret; eight were found to contain information labeled top secret. (Roughly 2,000 additional emails contained information that was not classified at the time they were sent or received but was later made confidential).

Petraeus gave Broadwell access to eight "black books" which contained classified information. The black books contained top-secret and "code word" information. A search of Broadwell’s apartment found digital copies of over three hundred documents marked "secret."

Liza Goitein, co-director of the Brennan Center for Justice’s Liberty and National Security Program and a critic of the U.S. classification system, told us that as a citizen, as opposed to as a prosecutor, she’d evaluate the mishandling of information based on how dangerous the information would actually be if exposed.

Without a better sense of what information was contained in those emails, Gotein suggested, it's hard to say how dangerous Clinton and Petraeus’ actions really were. Critics of the U.S. classification system argue that over-classification makes official designations at best an imperfect barometer of how sensitive information really is. Gotein points, for instance, to the CIA’s targeted killing program in Pakistan, which is officially classified but has been widely reported.

The legal situation

At the July 5 news conference, Comey said that Clinton’s case did not resemble others in which prosecutions had been pursued for mishandling of classified information.

"All the cases prosecuted involve some combination of clearly intentional and willful mishandling of classified information or vast quantities of information exposed in such a way as to support an inference of intentional misconduct or indications of disloyalty to the United States or efforts to obstruct justice," Comey said.

Petraeus’ mishandling of documents was indisputably intentional, and Petraeus obstructed justice by lying to FBI agents investigating the case.

In their investigation, the FBI found a tape of Petraeus acknowledging that information was classified before giving it to Broadwell anyway. Petraeus agreed in his plea deal that his actions "were in all respects knowing and deliberate."

In his July 5 press conference, Comey said that the FBI "did not find clear evidence that Secretary Clinton or her colleagues intended to violate laws governing the handling of the classified information." He went on to say that Clinton should have known that her handling of the emails was inappropriate, and that her behavior was "extremely reckless."

Petraeus also acknowledged that he had lied to the investigators about giving confidential information to Broadwell. Comey did not indicate that Clinton or her colleagues had lied in interviews related to this case, though the FBI’s findings did contradict some of her campaign’s public statements.

Experts who thought Petraeus’s legal situation was substantially worse than Clinton’s pointed to his lying to investigators as the primary factor.

READ MORE: Was there a double standard on the investigations of David Petraeus and Hillary Clinton? http://www.politifact.com/truth-o-meter/ar...

Share This Article

Comments (57)

Steve Williams Saturday, July 9th 2016 at 1:12AM

The only fact that needs to be considered, as I've been saying for 16 months, is that Hillary operated an unsecured server. Since she was stupid enough to do that, she's too stupid to be President.

Dea. Ron Gray Sr. Saturday, July 9th 2016 at 8:07AM

And Donald Trump is?

robert powell Saturday, July 9th 2016 at 9:32AM


Director of the Central Intelligence Agency General David Petraeus CLAIMED to have "TRAINED" the Iraqi Shia Army

and "WON" the IRAQI War on Insurgency........

AND was compromised by Seeaxual Favors.......

----- unsecuredCrooked hilClinton was an accessory to Rape by billClinton

BOTH are the ULTIMATE American NON QUALIFIERS

------to be USA PRESIDENT after the GREATEST USA Presidency Ever of President Baraka Hussein Obama

At LEAST Mr. Donald Trump will Adorn the White House with Beauty and Class.....over the LBGTV Hillary

Steve Williams Saturday, July 9th 2016 at 9:49AM

Ron, I thought maybe your subject was Hillary finally. I see you are still running from her.

Dea. Ron Gray Sr. Saturday, July 9th 2016 at 10:47AM

Was there a double standard on the investigations of David Petraeus and Hillary Clinton? I say NO!!!

Maybe I misread you Steven. I QUOTE: "Since she was stupid enough to do that, she's too stupid to be President."

The State Department hacked, The White House unclassified network hacked, USPS hacked, NOAA hacked, U.S. Coast Guard contractor stole personal data more than 250 times while repairing PCs http://www.computerworld.com/article/28487...

During that same time Officials warn 500 million financial records hacked http://www.usatoday.com/story/news/politic...

Every Part of the US Government Has Probably Already Been Hacked http://www.defenseone.com/technology/2014/...

Washington Post Joins List of News Media Hacked by the Chinese http://www.nytimes.com/2013/02/02/technolo...

Now you are acting surprised that Hillary had a private sever. I belief that the question was asked of the Director of The FBI was Hillary's server ever hacked and he said that there was no evidence.

Hillary did the same thing as the former Sectary of State and no formal investigation. She has been investigation 4 more times, then 911 and the statement of Weapons of Mass Destruction. Maybe the republicans have something to fear?

Steve Williams Sunday, July 10th 2016 at 6:55AM

Ron, I was never surprised nor concerned that Hillary had her own server. I was concerned if it was or was not secure. There is no difference between an official server or a private server. Either one can be made secure and either one can be left unsecure. Now all those hacking reports you dug up prove my point. She was stupid to leave her server unsecure.

robert powell Sunday, July 10th 2016 at 7:09AM


Was there a double standard on the investigations of David Petraeus and Hillary Clinton?

SUBJECT

No, both pet and hill should be in jail, justice was not served for the American TaxpAyer

".....She was stupid to leave her server unsecure... "

Sunday, July 10th 2016 at 6:55AM
Steve Williams

*******************************************

she ws in violation of her employer.....the American Taxpayer

and DISRESPECTFUL to President Baraka Hussein Obama

FBI has stated that anyone that IS found to do the things hillClinton did WOULD NEVER get SECURITY CLEARANCE in the FUTURE......

++++++++That disqualifies hillClinton from Presidency

BRING BACK Bernie.................


Dea. Ron Gray Sr. Sunday, July 10th 2016 at 10:42AM

The head of the FBI said that there was no evidence that Hillary's private server was hacked, like all of those links that I quoted you, if that was your concern.

Steve Williams Sunday, July 10th 2016 at 3:15PM

Ron, Hillary's server was discovered by a hacker. As I told you months and months ago. I'll lookit up again for you.

Dea. Ron Gray Sr. Sunday, July 10th 2016 at 3:29PM

That is a proven to be a LIE STEVEN...

Dea. Ron Gray Sr. Sunday, July 10th 2016 at 3:58PM

Guccifer Admitted He Lied About Hacking Hillary Clinton's server.

Steve Williams Sunday, July 10th 2016 at 4:34PM

Two years ago while spending some time with the Nmap Scripting Engine (NSE) someone mentioned that we should try the classic telnet login root:root on random IP addresses. This was meant as a joke, but was given a try. We started scanning and quickly realized that there should be several thousand unprotected devices on the Internet.

After completing the scan of roughly one hundred thousand IP addresses, we realized the number of insecure devices must be at least one hundred thousand. Starting with one device and assuming a scan speed of ten IP addresses per second, it should find the next open device within one hour. The scan rate would be doubled if we deployed a scanner to the newly found device. After doubling the scan rate in this way about 16.5 times, all unprotected devices would be found; this would take only 16.5 hours. Additionally, with one hundred thousand devices scanning at ten probes per second we would have a distributed port scanner to port scan the entire IPv4 Internet within one hour.

http://internetcensus2012.bitbucket.org/pa...

Dea. Ron Gray Sr. Sunday, July 10th 2016 at 5:13PM

Thanks for the link.

Steve Williams Sunday, July 10th 2016 at 6:53PM

You're welcome.

Steve Williams Sunday, July 10th 2016 at 7:05PM

A lot of devices and services we have seen during our research should never be connected to the public Internet at all. As a rule of thumb, if you believe that "nobody would connect that to the Internet, really nobody", there are at least 1000 people who did. Whenever you think "that shouldn't be on the Internet but will probably be found a few times" it's there a few hundred thousand times. Like half a million printers, or a Million Webcams, or devices that have root as a root password.

Steve Williams Sunday, July 10th 2016 at 7:12PM

The Associated Press today points to a remarkable footnote in a recent State Department inspector general report on the Hillary Clinton email scandal: The mail was managed from the vanity domain “clintonemail.com.” But here’s a potentially more explosive finding: A review of the historic domain registration records for that domain indicates that whoever built the private email server for the Clintons also had the not-so-bright idea of connecting it to an Internet-based printer.

According to historic Internet address maps stored by San Mateo, Calif. based Farsight Security, among the handful of Internet addresses historically assigned to the domain “clintonemail.com” was the numeric address 24.187.234.188. The subdomain attached to that Internet address was….wait for it…. “printer.clintonemail.com“.

Interestingly, that domain was first noticed by Farsight in March 2015, the same month the scandal broke that during her tenure as United States Secretary of State Mrs. Clinton exclusively used her family’s private email server for official communications.

Farsight's record for 24.187.234.188, the Internet address which once mapped to "printer.clintonemail.com".
Farsight’s record for 24.187.234.188, the Internet address which once mapped to “printer.clintonemail.com”.
I should emphasize here that it’s unclear whether an Internet-capable printer was ever connected to printer.clintonemail.com. Nevertheless, it appears someone set it up to work that way.

Ronald Guilmette, a private security researcher in California who prompted me to look up this information, said printing things to an Internet-based printer set up this way might have made the printer data vulnerable to eavesdropping.

“Whoever set up their home network like that was a security idiot, and it’s a dumb thing to do,” Guilmette said. “Not just because any idiot on the Internet can just waste all your toner. Some of these printers have simple vulnerabilities that leave them easy to be hacked into.”

More importantly, any emails or other documents that the Clintons decided to print would be sent out over the Internet — however briefly — before going back to the printer. And that data may have been sniffable by other customers of the same ISP, Guilmette said.

“People are getting all upset saying hackers could have broken into her server, but what I’m saying is that people could have gotten confidential documents easily without breaking into anything,” Guilmette said. “So Mrs. Clinton is sitting there, tap-tap-tapping on her computer and decides to print something out. A clever Chinese hacker could have figured out, ‘Hey, I should get my own Internet address on the same block as the Clinton’s server and just sniff the local network traffic for printer files.'”

I should note that it’s possible the Clintons were encrypting all of their private mail communications with a “virtual private network” (VPN). Other historical “passive DNS” records indicate there were additional, possibly interesting and related subdomains once directly adjacent to the aforementioned Internet address 24.187.234.188:

24.187.234.186 rosencrans.dyndns.ws
24.187.234.187 wjcoffice.com
24.187.234.187 mail.clintonemail.com
24.187.234.187 mail.presidentclinton.com
24.187.234.188 printer.clintonemail.com
24.187.234.188 printer.presidentclinton.com
24.187.234.190 sslvpn.clintonemail.com

Tags: clinton email scandal, clintonemail.com, Farsight Security, printer.clintonemail.com, Ronald Guilmette

This entry was posted on Thursday, May 26th, 2016 at 5:50 pm and is filed under A Little Sunshine. You can follow any comments to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.

http://krebsonsecurity.com/2016/05/did-the...

Dea. Ron Gray Sr. Sunday, July 10th 2016 at 7:40PM

I should emphasize here that it’s unclear whether an Internet-capable printer was ever connected to printer.clintonemail.com. Nevertheless, it appears someone set it up to work that way.

Speculation, pure speculation. Thanks for the read.


Steve Williams Sunday, July 10th 2016 at 8:25PM

Ron,

The Carna botnet gathered a tremendous amount of data. The data is publicly available, I can find it again if you like. This data apparently is still being assimilated. The AP was who broke the story that among the data gathered was clintonemail.com. The Benghazi committee would like to take credit, but it was the AP.

Steve Williams Sunday, July 10th 2016 at 8:42PM

The questions about Clinton's email practices left the Obama administration in an awkward position. At one point, the State Department directed reporters to contact Clinton, who has not publicly commented about her emails. The White House said it was her responsibility to make sure any emails about official business weren't deleted from her private server.

Meanwhile, the AP said it was considering legal action under the U.S. Freedom of Information Act against the State Department for failing to turn over some emails covering Clinton's tenure as the nation's top diplomat after waiting more than one year. The department has never suggested that it doesn't possess all Clinton's emails.

It was not immediately clear exactly where Clinton's computer server was run, but a business record for the Internet connection it used was registered under the home address for her residence as early as August 2010. The customer was listed as Eric Hoteham.

An aide to then-first lady Clinton was identified in a 2002 congressional report as Eric Hothem, whose name is spelled differently than in the Internet records. Hothem, a financial adviser in Washington, was not available to take an AP reporter's phone call at his office Wednesday. He was a special assistant to Clinton as far back as 1997 and considered one of the family's information technology experts.

http://bigstory.ap.org/article/b78ba433af3...

Dea. Ron Gray Sr. Monday, July 11th 2016 at 7:39AM

The FBI investigation is over and found no laws with broken, but Justice Department said they would take the recommendations from the FBI so they won't follow prosecution. The Republicans plan to investigate the FBI investigation and after all these years of 9 investigations they could not find any laws that Hillary broken with her private server.

Let us move on.

Steve Williams Monday, July 11th 2016 at 8:00AM

You can move on Ron, but facts are facts. America will not elect Hillary.

Steve Williams Monday, July 11th 2016 at 8:16AM

Poll: Most disapprove of FBI decision to exonerate Clinton
https://www.google.com/amp/s/www.washingto...

Dea. Ron Gray Sr. Monday, July 11th 2016 at 8:27AM

Steven, you are from the camp that sees nothing wrong with the republicans investigating BenGhazi 9 times, aren't you?


Steve Williams Monday, July 11th 2016 at 9:26AM

The Department Has Issued Numerous Warnings About Cybersecurity Risks One of the primary reasons that Department policy requires the use of Department systems is to guard against cybersecurity incidents. Threats and actual attacks against the Department have been on the rise for nearly a decade. For example, in May 2006, the Department experienced large-scale computer intrusions that targeted its headquarters and its East Asian posts.133 Consequently, the Department has issued numerous announcements, cables, training requirements, and memos to highlight the various restrictions and risks associated with the use of non-Departmental systems, especially the use of personal email accounts. As early as 2004, Department cables reminded staff that only Department-approved software should be installed on the Department’s information systems because outside software may bypass firewall and anti-virus checks, creating an open channel for hackers and malicious code, thus placing Department networks at serious risk.134 Since then, the Department has published prohibitions or warnings related to the use of instant messaging, PDAs and smartphones, thumb drives, CDs and DVDs, Internet browsers, and personally owned devices.135 Employees are also reminded of these issues through the Department’s required annual Cybersecurity Awareness course.136 Further, in 2005 DS’s Cyber Threat Analysis Division (CTAD) began issuing notices to Department computer users specifically highlighting cybersecurity threats. For example, CTAD’s 131 12 FAM 544.2 (November 4, 2005). 132 5 FAM 443.7 (October 23, 2015). 133 See Cyber Insecurity: Hackers Are Penetrating Federal Systems And Critical Infrastructure: Hearing Before the House Committee on Homeland Security, Subcommittee On Emerging Threats, Cybersecurity And Science And Technology, 110th Congress (2007) (statement of Donald Reid, Senior Coordinator for Security Infrastructure, Bureau of Diplomatic Security, U.S. Department of State), at 13-15. 134 04 STATE 204864 (September 22, 2004). 135 See e.g., 05 STATE 096534 (May 2005); Prohibition Against Use of Privately Owned Software/Hardware on Department Automated Information Systems, Announcement No. 2006_01_074 (January 24, 2006); Use Of Unclassified/SBU Thumb Drives, Announcement No. 2008_09_046 (September 9, 2008); Using PEDs Abroad, Announcement No. 2008_09_068 (September 12, 2008); Remote Accessing and Processing, Announcement No. 2008_11_061 (November 14, 2008); 09 STATE 130999 (December 24, 2009); Use of Non-Department Owned Personal Digital Assistants (PDAs) and Smartphones in Department Facilities, Announcement No. 2010_10_150 (October 26, 2010). 136 5 FAM 845 (July 12, 2013).

Steve Williams Monday, July 11th 2016 at 9:27AM

notices from 2005 to 2011 addressed BlackBerry security vulnerabilities, generally citing mobile devices as a weak link in computer networks.137 CTAD warned that BlackBerry devices must be configured in accordance with the Department’s security guidelines. In July 2005, IRM introduced its BlackBerry service that provided domestic users access to their OpenNet email, calendar, and contacts.138 From the beginning, the BlackBerry servers were required to be configured in accordance with the current DS Information Technology Security Guide, which contains an extensive list of security settings that lock down the devices. These security standards continue to apply to current Department BlackBerry devices. In March 2009, after unsuccessful efforts to supply Secretary Clinton with a secure government smartphone, DS was informed that Secretary Clinton’s staff had been asking to use BlackBerry devices inside classified areas. The Assistant Secretary of DS then sent a classified memorandum to Secretary Clinton’s Chief of Staff that described the vulnerabilities associated with the use of BlackBerry devices and also noted the prohibition on the use of Blackberry devices in sensitive areas. According to a DS official, shortly after the memorandum was delivered, Secretary Clinton approached the Assistant Secretary and told him she “gets it.” The use of personal email accounts to conduct official business has been a particular concern over the past several years. For example, on March 11, 2011, the Assistant Secretary for Diplomatic Security sent a memorandum on cybersecurity threats directly to Secretary Clinton.139 A portion of the unclassified version of this memorandum states: Threat analysis by the DS cyber security team and related incident reports indicate a dramatic increase since January 2011 in attempts by [redacted] cyber actors to compromise the private home e-mail accounts of senior Department officials. … Although the targets are unclassified, personal e-mail accounts, the likely objective is to compromise user accounts and thereby gain access to policy documents and personal information that could enable technical surveillance and possible blackmail. The personal e-mail of family members also is at risk. The memorandum included as an attachment “a snapshot of affected Department personnel,” noting that many of the email account owners play major roles in forming diplomatic and economic policy.140 It concluded by noting, “We also urge Department users to minimize the use 137 See, e.g., CTAD, Cyber Security Awareness (March 3, 2011). 138 Department of State, Blackberry Wireless PDA Use in the Department of State, Announcement No. 2005_07_018, July 7, 2005. This announcement also notes: “Personal Blackberry devices are not allowed.” In September 2005, overseas posts were also authorized to procure, install, and operate their own BlackBerry Enterprise Server (BES) and BlackBerry devices. 05 STATE 172062 (September 2005). 139 OIG asked DS if it had sent memoranda warning of similar risks to other Secretaries, but it could not find any similar examples. 140 Spear phishing was one of the several types of threats included in the Memorandum. It is an attack on a single user or department within an organization, such as asking employees to update their username and passwords. Once

Steve Williams Monday, July 11th 2016 at 9:28AM

of personal web email for business, as some compromised home systems have been reconfigured by these actors to automatically forward copies of all composed emails to an undisclosed recipient.” Following the March 2011 memorandum, DS cybersecurity staff conducted two cybersecurity briefings of S/ES staff, the Secretary’s immediate staff, and Bureau of Public Affairs staff in April and May 2011. OIG discovered in Secretary Clinton’s retired paper files a copy of the classified presentation used during the briefing. It contains material similar to the type provided in the March 11, 2011, memorandum. On June 28, 2011, the Department, in a cable entitled “Securing Personal E-mail Accounts” that was approved by the Assistant Secretary for Diplomatic Security and sent over Secretary Clinton’s name to all diplomatic and consular posts, encouraged Department users “to check the security settings and change passwords of their home e-mail accounts because of recent targeting of personal email accounts by online adversaries.”141 The cable further elaborated that “recently, Google asserted that online adversaries are targeting the personal Gmail accounts of U.S. government employees. Although the company believes it has taken appropriate steps to remediate identified activity, users should exercise caution and follow best practices in order to protect personal e-mail and prevent the compromise of government and personal information.” It then recommended best practices for Department users and their family members to follow, including “avoid conducting official Department business from your personal e-mail accounts.”142

Dea. Ron Gray Sr. Monday, July 11th 2016 at 10:02AM

Steven, you are from the camp that sees nothing wrong with the republicans investigating BenGhazi 9 times, aren't you?

Steve Williams Monday, July 11th 2016 at 10:19AM

I'm from the camp that thinks primary sources should be investigated. Like this OIG report.

Dea. Ron Gray Sr. Monday, July 11th 2016 at 10:36AM

Well, let us investigate 911 and the statement of weapons of mass destruction or The many Embassy that Embassy bombing and deaths that happen under the Bush administration. Let us investigate secretary of State Condoleezza Rice home server in the email if she destroyed.
Since you want to get to the facts, do you have any problems with that?

Steve Williams Monday, July 11th 2016 at 11:31AM

Let's investigate the 2016 Democratic Presidential presumptive nominee.

Steve Williams Monday, July 11th 2016 at 11:35AM

Secretary Clinton: By Secretary Clinton’s tenure, the Department’s guidance was considerably more detailed and more sophisticated. Beginning in late 2005 and continuing through 2011, the Department revised the FAM and issued various memoranda specifically discussing the obligation to use Department systems in most circumstances and identifying the risks of not doing so. Secretary Clinton’s cybersecurity practices accordingly must be evaluated in light of these more comprehensive directives.

Dea. Ron Gray Sr. Monday, July 11th 2016 at 2:17PM

She have been thoroughly investigated for over 20 years and studio found nothing. Get over it Steven, you are sounding foolish.

Steve Williams Monday, July 11th 2016 at 3:59PM

Secretary Clinton used mobile devices to conduct official business using the personal email account on her private server extensively, as illustrated by the 55,000 pages of material making up the approximately 30,000 emails she provided to the Department in December 2014. Throughout Secretary Clinton’s tenure, the FAM stated that normal day-to-day operations should be conducted on an authorized AIS,147 yet OIG found no evidence that the Secretary requested or obtained guidance or approval to conduct official business via a personal email account on her private server. According to the current CIO and Assistant Secretary for Diplomatic Security, Secretary Clinton had an obligation to discuss using her personal email account to conduct official business with their offices, who in turn would have attempted to provide her with approved and secured means that met her business needs. However, according to these officials, DS and IRM did not—and would not—approve her exclusive reliance on a personal email account to conduct Department business, because of the restrictions in the FAM and the security risks in doing so. During Secretary Clinton’s tenure, the FAM also instructed employees that they were expected to use approved, secure methods to transmit SBU information and that, if they needed to transmit SBU information outside the Department’s OpenNet network on a regular basis to nonDepartmental addresses, they should request a solution from IRM.148 However, OIG found no evidence that Secretary Clinton ever contacted IRM to request such a solution, despite the fact that emails exchanged on her personal account regularly contained information marked as SBU. Similarly, the FAM contained provisions requiring employees who process SBU information on their own devices to ensure that appropriate administrative, technical, and physical safeguards are maintained to protect the confidentiality and integrity of records and to ensure encryption of SBU information with products certified by NIST.149 With regard to encryption, Secretary Clinton’s website states that “robust protections were put in place and additional upgrades and techniques employed over time as they became available, including consulting and employing third party experts.”150 Although this report does not address the safety or security of her system, DS and IRM reported to OIG that Secretary Clinton never demonstrated to them that her private server or mobile device met minimum information security requirements specified by FISMA and the FAM. In addition to interviewing current and former officials in DS and IRM, OIG interviewed other senior Department officials with relevant knowledge who served under Secretary Clinton, including the Under Secretary for Management, who supervises both DS and IRM; current and former Executive Secretaries; and attorneys within the Office of the Legal Adviser. These officials all stated that they were not asked to approve or otherwise review the use of Secretary Clinton’s server and that they had no knowledge of approval or review by other Department staff. These officials also stated that they were unaware of the scope or extent of Secretary Clinton’s use of a personal email account, though many of them sent emails to the Secretary on this account. Secretary Clinton’s Chief of Staff also testified before the House Select Committee on Benghazi that she was unaware of anyone being consulted about the Secretary’s exclusive use of a personal email address.151 OIG did find evidence that various staff and senior officials throughout the Department had discussions related to the Secretary’s use of non-Departmental systems, suggesting there was some awareness of Secretary Clinton’s practices. For example: • In late-January 2009, in response to Secretary Clinton’s desire to take her BlackBerry device into secure areas, her Chief of Staff discussed with senior officials in S/ES and with the Under Secretary for Management alternative solutions, such as setting up a separate stand-alone computer connected to the Internet for Secretary Clinton “to enable her to check her emails from her desk.” The Under Secretary’s response was “the stand-alone separate network PC is [a] great idea” and that it is “the best solution.” According to the Department, no such computer was ever set up. • In November 2010, Secretary Clinton and her Deputy Chief of Staff for Operations discussed the fact that Secretary Clinton’s emails to Department employees were not being received. The Deputy Chief of Staff emailed the Secretary that “we should talk about putting you on state email or releasing your email address to the department so you are not going to spam.” In response, the Secretary wrote, “Let’s get separate address or device but I don’t want any risk of the personal being accessible.”152 • In August 2011, the Executive Secretary, the Under Secretary for Management, and Secretary Clinton’s Chief of Staff and Deputy Chief of Staff, in response to the Secretary’s request, discussed via email providing her with a Department BlackBerry to replace her personal BlackBerry, which was malfunctioning, possibly because “her personal email server is down.” The then-Executive Secretary informed staff of his intent to provide two devices for the Secretary to use: “one with an operating State Department email account (which would mask her identity, but which would also be subject to FOIA requests), and another which would just have phone and internet capability.” In another email exchange, the Director of S/ES-IRM noted that an email account and address had already been set up for the Secretary153 and also stated that “you should be aware that any email would go through the Department’s infrastructure and subject to FOIA searches.”154 However, the Secretary’s Deputy Chief of Staff rejected the proposal to use two devices, stating that it “doesn’t make a whole lot of sense.” OIG found no evidence that the Secretary obtained a Department address or device after this discussion. • OIG identified two individuals who provided technical support to Secretary Clinton. The first, who was at one time an advisor to former President Clinton but was never a Department employee, registered the clintonemail.com domain name on January 13, 2009.155 The second, a Schedule C political appointee who worked in IRM as a Senior Advisor from May 2009 through February 2013,156 provided technical support for BlackBerry communications during the Secretary’s 2008 campaign for President.157 OIG reviewed emails showing communications between Department staff and both individuals concerning operational issues affecting the Secretary’s email and server from 2010 through at least October 2012. For example, in December 2010, the Senior Advisor worked with S/ES-IRM and IRM staff to resolve issues affecting the ability of emails transmitted through the clintonemail.com domain used by Secretary Clinton to reach Department email addresses using the state.gov domain.158 • Two staff in S/ES-IRM reported to OIG that, in late 2010, they each discussed their concerns about Secretary Clinton’s use of a personal email account in separate meetings with the then-Director of S/ES-IRM. In one meeting, one staff member raised concerns that information sent and received on Secretary Clinton’s account could contain Federal records that needed to be preserved in order to satisfy Federal recordkeeping requirements. According to the staff member, the Director stated that the Secretary’s personal system had been reviewed and approved by Department legal staff and that the matter was not to be discussed any further. As previously noted, OIG found no evidence that staff in the Office of the Legal Adviser reviewed or approved Secretary Clinton’s personal system. According to the other S/ES-IRM staff member who raised concerns about the server, the Director stated that the mission of S/ES-IRM is to support the Secretary and instructed the staff never to speak of the Secretary’s personal email system again. • On January 9, 2011, the non-Departmental advisor to President Clinton who provided technical support to the Clinton email system notified the Secretary’s Deputy Chief of Staff for Operations that he had to shut down the server because he believed “someone was trying to hack us and while they did not get in i didnt [sic] want to let them have the chance to.” Later that day, the advisor again wrote to the Deputy Chief of Staff for Operations, “We were attacked again so I shut [the server] down for a few min.” On January 10, the Deputy Chief of Staff for Operations emailed the Chief of Staff and the Deputy Chief of Staff for Planning and instructed them not to email the Secretary “anything sensitive” and stated that she could “explain more in person.”159

Steve Williams Monday, July 11th 2016 at 4:07PM

Wow!!!

Dea. Ron Gray Sr. Monday, July 11th 2016 at 7:26PM

Why did the republican lead investigation of Hillary email let her go some 8 times?

Steve Williams Monday, July 11th 2016 at 9:10PM

There hasn't been a Republican led investigation of her email.

Dea. Ron Gray Sr. Tuesday, July 12th 2016 at 8:26AM

Remember Benghaziiiii, the question of her e-mails was a main point.

What happen?

Dea. Ron Gray Sr. Tuesday, July 12th 2016 at 8:46AM

Let us get back to the conversation on the difference between David Petraeus and Hillary Clinton, if you will.

Steve Williams Tuesday, July 12th 2016 at 1:34PM

Hillary is toast.

Dea. Ron Gray Sr. Tuesday, July 12th 2016 at 4:16PM

I know that feeling Steven. You are feeling hopeless. Poor thang!!!

Steve Williams Tuesday, July 12th 2016 at 5:54PM

The FBI has been asked to investigate her perjury before the House.

Dea. Ron Gray Sr. Tuesday, July 12th 2016 at 7:39PM

Still holding out Steven? Don't hold your breath. (LOL)




Steve Williams Wednesday, July 13th 2016 at 12:23AM

Comey contradicted Hillary's statements under oath to Congress. What's so funny about that Ron?

Dea. Ron Gray Sr. Wednesday, July 13th 2016 at 3:27AM

Did you hear The Director of The FBI when he said: "Our judgment is that no reasonable prosecutor would bring such a case."



Steve Williams Wednesday, July 13th 2016 at 8:27AM

What Comey said, and what Hillary said under oath, cannot both be true Ron.

Steve Williams Wednesday, July 13th 2016 at 8:31AM

For instance, Hillary testified to Congress she had turned over all her work related emails. Comey said they found thousands of work related emails on her server that had not been turned over.

Steve Williams Wednesday, July 13th 2016 at 8:36AM

The FBI also discovered several thousand work-related e-mails that were not in the group of 30,000 that were returned by Secretary Clinton to State in 2014. We found those additional e-mails in a variety of ways. Some had been deleted over the years and we found traces of them on devices that supported or were connected to the private e-mail domain. Others we found by reviewing the archived government e-mail accounts of people who had been government employees at the same time as Secretary Clinton, including high-ranking officials at other agencies, people with whom a Secretary of State might naturally correspond.

This helped us recover work-related e-mails that were not among the 30,000 produced to State. Still others we recovered from the laborious review of the millions of e-mail fragments dumped into the slack space of the server decommissioned in 2013.

https://m.fbi.gov/#https://www.fbi.gov/new...

Steve Williams Wednesday, July 13th 2016 at 8:40AM

If you want to know about what Comey called the "slack space", I can tell you how it works.

Dea. Ron Gray Sr. Wednesday, July 13th 2016 at 9:16AM

These are his words and not mine or yours. Did you hear The Director of The FBI when he said: "Our judgment is that no reasonable prosecutor would bring such a case."

Steve Williams Wednesday, July 13th 2016 at 11:05AM

I did Ron.

Steve Williams Wednesday, July 13th 2016 at 11:06AM

I also heard Hillary tell the Benghazi Committe, under oath, she had turned over all her work related emails. Hillary is toast.

robert powell Wednesday, July 13th 2016 at 1:21PM


Hillary is toast.
Wednesday, July 13th 2016 at 11:06AM
Steve Williams

the Kansas Obama revenge....his FBI Director Comey

----- anyway....hillClinton "predators" of the 90s DISQUALIFIES her to EVERY African American

Steve Williams Wednesday, July 13th 2016 at 1:53PM

Good points.

Dea. Ron Gray Sr. Wednesday, July 13th 2016 at 3:15PM

WOW!!

Dea. Ron Gray Sr. Sunday, July 17th 2016 at 3:19PM

Petraeus gave Broadwell access to eight "black books" which contained classified information. The black books contained top-secret and "code word" information. A search of Broadwell’s apartment found digital copies of over three hundred documents marked "secret."

Post a Comment

Please log in to post comments.