Jump to content
lostinblue

Hillary Clinton's Private Server A Foreign Spy Magnet

 Share

14 posts in this topic

Recommended Posts

Filed: K-1 Visa Country: China
Timeline

Hillary Clinton's Private Server A Foreign Spy Magnet

Hillary Clinton's private email server was a spy magnet for the Russian, Chinese, Iranian and other intelligence services, say current and former intelligence officials.

As secretary of state, Clinton routed all her government-related email through the server, based in her house in Chappaqua, New York. She reportedly hired a Cablevision (NYSE:CVC) subsidiary to run the server, with antivirus protection from Intel's (NASDAQ:INTC) McAfee. And she registered her domain name, clintonmail.com, through Network Solutions.

Intelligence professionals fear that the use of the privately installed server, free of certified government defenses against foreign interception, has been a boon to foreign cyberspies.

"By using her own private server with email — which we now know was wholly unencrypted for the first three months of Hillary Clinton's tenure as secretary of state — she left this easily interceptable by any decent 21st century SIGINT service," said John Schindler, a former National Security Agency counterintelligence officer. SIGINT is shorthand for signals intelligence, or electronic spying.

"The name Clinton right on the email handle meant this was not a difficult find," Schindler said. "We should assume Russians, Chinese and others were seeing this."

'Epic' Counterintelligence Disaster

"In all, this is a counterintelligence disaster of truly epic proportions, not to mention that, since Clinton admitted she did not use higher-classification email systems at all" — systems like SIPR and JWICS, Schindler said — "we have to assume some bleed-over into her unsecured private email too, which makes this even worse."

SIPR is the Secret Internet Protocol Router network that the Department of Defense runs to ensure secret communications for the U.S. military, other agencies and certain allies. JWICS is the Joint Worldwide Intelligence Communications System for top-secret government communication. Both provide secure communications for the State Department and secretary of state. Clinton's private server was not protected by the Department of Homeland Security's Einstein intrusion detection system, which relies on NSA systems, for official State Department emails.

"She may have deleted 30,000 e-mails before turning her files over to the State Department, but that doesn't mean that the Russians and the Chinese don't have them," said Michelle Van Cleave, former U.S. National Counterintelligence Executive.

Others say that the potential damage to U.S. national security is so grave that the FBI should seize the server and conduct a forensic analysis to determine the extent of foreign penetration. That analysis would be part of what is called a damage assessment, which is routine after any suspected security breach.

FBI Forensic Analysis

However, the FBI might not find anything now, according to Rep. Trey Gowdy, R-S.C., chairman of a House investigative panel, who says that Clinton had the server wiped clean. Still, the forensic analysis by trained personnel could yield valuable clues about foreign spies gaining access to America's most fiercely guarded secrets. Gowdy has called on Clinton to appear before his committee for what he called a "transcribed interview regarding her use of private email and a personal server for official State Department business."

Rep. Ken Buck, R-Colo., a former prosecutor, said that the FBI should conduct a forensic analysis of any attempted foreign penetrations, to determine which foreign intelligence services might have hacked into Clinton's email server.

"Denying a legitimate request by the Bureau to examine her computer would certainly suggest that America's security is not Clinton's highest priority," Buck said.

"The FBI investigated a sitting CIA director for intentionally disclosing classified information. The Bureau can certainly investigate whether a former secretary of state unintentionally disclosed classified information," Buck said. "The motive may be different, but the potential damage to national security is similar."

Why Clinton hasn't offered to turn over the server to the FBI, or why the FBI has not seized it to assess the damage to national security, is unclear. A Clinton spokesperson declined to comment.

In a question-and-answer sheet provided to reporters, Clinton did not address the issue. The FBI won't say whether or not it made a request or took possession of the server. The Bureau does not have the device, according to a highly placed FBI source. That source is not cleared to speak to the press and could not speak on the record.

The lure of reading a secretary of state's emails would exert a pull on any foreign spy, intelligence officials say.

Where, on a scale of one to 10, would any sitting secretary of state rank as a target of foreign spies? "10, of course," said Van Cleave. "That being the case, all of her e-mails would have been potentially of interest to any number of foreign parties."

"A target like this would be at least a 10, maybe 10-plus if the enemy knew the email address and server," said Robert W. Stephan, a former counterintelligence analyst at the Defense Intelligence Agency who also served 19 years in the CIA. "If a foreign intelligence service determines that it is indeed the secretary of state's private communications/e-mail/server and even given the security measures that were set up, it would still be a top target for some sophisticated services," Stephan said. "Obviously Chinese, Russian, and Cuban, and possibly Iranians and North Koreans."

That statement presumes that the server was strongly protected against outside penetration, which does not seem to be the case. News reports indicate that the server's security configurations were done improperly, protecting Clinton's personal privacy and not national security, and that, even if everything was done by the book, that type of server and software package remains vulnerable to a good hacker.

"A 16-year-old can break into a server, and certainly a government sophisticated enough to break into the Sony (NYSE:SNE) system can break into Hillary Clinton's system," said Rep. Buck. "That's a no-brainer."

How would adversary spy services exploit this intelligence? "The positions, the interests, the communications between the secretary of state and her staff are of great interest to any foreign intelligence service, whether hostile or friendly," said Paul Joyal, former director of security of the Senate Select Committee on Intelligence.

"The American secretary of state using an open, unprotected server? That's an invitation to a party," said a veteran intelligence officer who asked for anonymity because he still holds active clearances. "All of her private musings. There's no secretary of state who doesn't communicate with classified information. How the hell could she do her job without it?"

Gateway To Government Systems?

"From a counterintelligence perspective, (for) anyone with any responsibility for intelligence, counterintelligence and security, this thing is a monumental disaster," the longtime senior intelligence officer said. "It's a disaster for U.S. policy. It's a huge boon for the former KGB and the Iranians."

Some experts are concerned that foreign spies could have penetrated the server as a gateway to breaking into other government systems, including classified communications.

"The real question is, what if any intelligence collection was being done on a private server somewhere?" Joyal said. "The only way to know is for the proper federal authorities to impound the server and do a forensic analysis."

"It would be possible for a hostile service to use the server as a platform to deliver other malware to other targets of their choosing, based on their knowledge of whom the former secretary and president were communicating with," Joyal said.

'Vast Deception Potential'

Foreign spies could use their access to Clinton's server to warp or distort information that government officials rely on. "If they're getting into her server, they're not just extracting stuff," said a senior former Defense Department official who spoke on condition of anonymity. "They're going to do things that could be planted from other sources."

"The denial and deception potential here is vast," said John Schindler, referring to intelligence tradecraft in which a spy service denies or conceals information, and seeks to deceive other countries. "Not to mention that any shady games played" by the Obama Administration "would be known to Moscow and Beijing — but not to the American public."

"It could affect a number of people within the U.S. government and, for that matter, people around the world," Joyal said. "It would behoove the federal government to conduct a forensic analysis of the server itself."

Until such a forensic analysis is done, he said, authorities simply will not know the answer.

"This should not be politicized," said Joyal. "It should be done with hard-nosed national security interests driving the forensic analysis."

• Waller is a senior reporter at the American Media Institute, a nonprofit news service.


Read More At Investor's Business Daily: http://news.investors.com/politics/040715-746883-hillary-clinton-email-server-vulnerable-to-china-russia-iran.htm#ixzz3Wo7nVb8w
Follow us: @IBDinvestors on Twitter | InvestorsBusinessDaily on Facebook

By using her own private server with email — which we now know was wholly unencrypted for the first three months of Hillary Clinton's tenure as secretary of state — she left this easily interceptable by any decent 21st century SIGINT service," said John Schindler, a former National Security Agency counterintelligence officer. SIGINT is shorthand for signals intelligence, or electronic spying.

. News reports indicate that the server's security configurations were done improperly, protecting Clinton's personal privacy and not national security, and that, even if everything was done by the book, that type of server and software package remains vulnerable to a good hacker.

"A 16-year-old can break into a server, and certainly a government sophisticated enough to break into the Sony (NYSE:SNE) system can break into Hillary Clinton's system," said Rep. Buck. "That's a no-brainer."


If more citizens were armed, criminals would think twice about attacking them, Detroit Police Chief James Craig

Florida currently has more concealed-carry permit holders than any other state, with 1,269,021 issued as of May 14, 2014

The liberal elite ... know that the people simply cannot be trusted; that they are incapable of just and fair self-government; that left to their own devices, their society will be racist, sexist, homophobic, and inequitable -- and the liberal elite know how to fix things. They are going to help us live the good and just life, even if they have to lie to us and force us to do it. And they detest those who stand in their way."
- A Nation Of Cowards, by Jeffrey R. Snyder

Tavis Smiley: 'Black People Will Have Lost Ground in Every Single Economic Indicator' Under Obama

white-privilege.jpg?resize=318%2C318

Democrats>Socialists>Communists - Same goals, different speeds.

#DeplorableLivesMatter

Link to comment
Share on other sites

Filed: Timeline

Government servers are so much better, right? Practically impenetrable.

15-Year-Old Admits Hacking NASA Computers
M I A M I, Sept. 22
By Catherine Wilson

A 15-year-old computer hacker caused a 21-day shutdown of NASA computers that support the international space station, and invaded a Pentagon weapons computer system to intercept 3,300 e-mails, steal passwords and cruise around like an employee.

The boy, known on the Internet as “c0mrade,” pleaded guilty today to juvenile delinquency in a sealed federal case.

http://abcnews.go.com/Technology/story?id=119423

Link to comment
Share on other sites

Filed: Timeline

Unsurprisingly, some still haven't grasped that they fell for one of the most ridiculous right wing nutjob hoaxes when they jumped onto the Benghazi scandal bandwagon. Some still believe that there is something there even though every actual investigation into the matter says otherwise. But Glenn Beck keeps telling them that it's a scandal - the right wing chamber echoes it - and thus, it must be true. How limited some allow themselves to be...

Link to comment
Share on other sites

Filed: K-1 Visa Country: China
Timeline

Government servers are so much better, right? Practically impenetrable.

So she gets a pass right

If more citizens were armed, criminals would think twice about attacking them, Detroit Police Chief James Craig

Florida currently has more concealed-carry permit holders than any other state, with 1,269,021 issued as of May 14, 2014

The liberal elite ... know that the people simply cannot be trusted; that they are incapable of just and fair self-government; that left to their own devices, their society will be racist, sexist, homophobic, and inequitable -- and the liberal elite know how to fix things. They are going to help us live the good and just life, even if they have to lie to us and force us to do it. And they detest those who stand in their way."
- A Nation Of Cowards, by Jeffrey R. Snyder

Tavis Smiley: 'Black People Will Have Lost Ground in Every Single Economic Indicator' Under Obama

white-privilege.jpg?resize=318%2C318

Democrats>Socialists>Communists - Same goals, different speeds.

#DeplorableLivesMatter

Link to comment
Share on other sites

Filed: Other Timeline

If Hillary becomes the next US president the Congress should make it a condition that Bill has to wear a body cam 24/7. They should also issue chastity belt to all the female interns. If they do that then everything should be ok, at least as far as unwanted sexual conduct is concerned ...

https://youtube.com/watch?v=dWwux8YDr7o

Link to comment
Share on other sites

I am mostly puzzled that our security apparatus would have let her even use private email and server. At least for her actual working communications. There is a whole lot to this story that seems a bit too convenient for the RWN blogosphere.

B and J K-1 story

  • April 2004 met online
  • July 16, 2006 Met in person on her birthday in United Arab Emirates
  • August 4, 2006 sent certified mail I-129F packet Neb SC
  • August 9, 2006 NOA1
  • August 21, 2006 received NOA1 in mail
  • October 4, 5, 7, 13 & 17 2006 Touches! 50 day address change... Yes Judith is beautiful, quit staring at her passport photo and approve us!!! Shaming works! LOL
  • October 13, 2006 NOA2! November 2, 2006 NOA2? Huh? NVC already processed and sent us on to Abu Dhabi Consulate!
  • February 12, 2007 Abu Dhabi Interview SUCCESS!!! February 14 Visa in hand!
  • March 6, 2007 she is here!
  • MARCH 14, 2007 WE ARE MARRIED!!!
  • May 5, 2007 Sent AOS/EAD packet
  • May 11, 2007 NOA1 AOS/EAD
  • June 7, 2007 Biometrics appointment
  • June 8, 2007 first post biometrics touch, June 11, next touch...
  • August 1, 2007 AOS Interview! APPROVED!! EAD APPROVED TOO...
  • August 6, 2007 EAD card and Welcome Letter received!
  • August 13, 2007 GREEN CARD received!!! 375 days since mailing the I-129F!

    Remove Conditions:

  • May 1, 2009 first day to file
  • May 9, 2009 mailed I-751 to USCIS CS
Link to comment
Share on other sites

Filed: Timeline

I am mostly puzzled that our security apparatus would have let her even use private email and server. At least for her actual working communications. There is a whole lot to this story that seems a bit too convenient for the RWN blogosphere.

Seems that there was another Secretary of State that used private emails for official business while in office. You won't hear the RWNJs complain about that, though.

Colin Powell relied on personal emails while secretary of state
Link to comment
Share on other sites

Filed: Other Country: United Kingdom
Timeline

Seems that there was another Secretary of State that used private emails for official business while in office. You won't hear the RWNJs complain about that, though.

People are both myopic and amnesiac when it comes to things like this.

Link to comment
Share on other sites

Filed: K-1 Visa Country: Canada
Timeline

Don't worry, according to the German's the US are the only ones spying on the communications of foreign officials... :rofl:

http://www.slate.com/articles/news_and_politics/war_stories/2014/07/nsa_german_american_relations_angela_merkel_is_angry_about_u_s_spying_we.html

Link to comment
Share on other sites

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
- Back to Top -

Important Disclaimer: Please read carefully the Visajourney.com Terms of Service. If you do not agree to the Terms of Service you should not access or view any page (including this page) on VisaJourney.com. Answers and comments provided on Visajourney.com Forums are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Visajourney.com does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. VisaJourney.com does not condone immigration fraud in any way, shape or manner. VisaJourney.com recommends that if any member or user knows directly of someone involved in fraudulent or illegal activity, that they report such activity directly to the Department of Homeland Security, Immigration and Customs Enforcement. You can contact ICE via email at Immigration.Reply@dhs.gov or you can telephone ICE at 1-866-347-2423. All reported threads/posts containing reference to immigration fraud or illegal activities will be removed from this board. If you feel that you have found inappropriate content, please let us know by contacting us here with a url link to that content. Thank you.
×
×
  • Create New...