Bernie Sanders
Related: About this forumState admits that there may have been successful hacks into Clinton server
Here's the clip:
http://www.c-span.org/video/?c4599146/hack-attemps-long
Also note the fact that the report itself says that when they thought they were being hacked they eventually unplugged the server... and then at some point just plugged it back in... Clinton never told anyone about the attempts or tried to get help from State.
Here's the relevant bits from the report:
On January 9, 2011, the non-Departmental advisor to President Clinton who provide technical support to the Clinton email system notified the Secretarys Deputy Chief of Staff for Operations that he had to shut down the server because he believed someone
was trying to hack us and while they did not get in i didnt [sic] want to let them have the chance to. Later that day, the advisor again wrote to the Deputy Chief of Staff for Operations, We were attacked again so I shut [the server] down for a few min. On
January 10, the Deputy Chief of Staff for Operations emailed the Chief of Staff and the Deputy Chief of Staff for Planning and instructed them not to email the Secretary anything sensitive and stated that she could explain more in person.
In another incident occurring on May 13, 2011, two of Secretary Clintons immediate staff discussed via email the Secretarys concern that someone was hacking into her email after she received an email with a suspicious link. Several hours later, Secretary Clinton received an email from the personal account of then-Under Secretary of State for Political Affairs that also had a link to a suspect website. The next morning, Secretary Clinton replied to the email with the following message to the Under Secretary: Is this really from you? I was worried about opening it! Department policy requires employees to report cybersecurity incidents to IRM security officials when any improper cyber-security practice comes to their attention. 12 FAM 592.4 (January 10, 2007). Notification is required when a user suspects compromise of, among other things, a personally owned device containing personally identifiable
information. 12 FAM 682.2-6 (August 4, 2008). However, OIG found no evidence that the Secretary or her staff reported these incidents to computer security personnel or anyone else within the Department.
--
Also - does this ^^ sound like the behaviour of people whose server wasn't hacked?
- technical support ... had to shut down the server because he believed someone was trying to hack us"
- Later that day... We were attacked again so I shut [the server] down for a few min.
- The next day people were told ...not to email the Secretary anything sensitive and stated that she could explain more in person.
- a few months later Clinton herself expressed concern that someone was hacking into her email after she received an email with a suspicious link
- "Several hours later, Secretary Clinton received an email from the personal account of then-Under Secretary of State for Political Affairs that also had a link to a suspect website."
Do these sound like people that can definitely say no one ever hacked into their email?? In fact I'd say it's pretty obvious that the server at least had some sort of virus or something... as it was sending automated phising emails.
Someone needs to ask her some hard questions about this and SOON!
Autumn
(45,114 posts)I think it might be nice to have it all in one place.
Happy to help
EdwardBernays
(3,343 posts)If you wanna read it instead of trusting the media to read it for you.
Start at page 39 (in the reader). It lambasts Clinton.
Edit: here's a direct download link:
https://assets.documentcloud.org/documents/2842460/ESP-16-03-Final.pdf
Thanks bob41213
Here's some of the relevant text from the report:
Secretary Clinton: By Secretary Clintons tenure, the Departments guidance was considerably more detailed and more sophisticated. Beginning in late 2005 and continuing through 2011, the Department revised the FAM and issued various memoranda specifically discussing the obligation to use Department systems in most circumstances and identifying the risks of not doing so. Secretary Clintons cybersecurity practices accordingly must be evaluated in light of these more comprehensive directives.
Secretary Clinton used mobile devices to conduct official business using the personal email account on her private server extensively, as illustrated by the 55,000 pages of material making up the approximately 30,000 emails she provided to the Department in December 2014.
Throughout Secretary Clintons tenure, the FAM stated that normal day-to-day operations should be conducted on an authorized AIS, yet OIG found no evidence that the Secretary requested or obtained guidance or approval to conduct official business via a personal email account on her private server. According to the current CIO and Assistant Secretary for Diplomatic Security, Secretary Clinton had an obligation to discuss using her personal email account to conduct official business with their offices, who in turn would have attempted to provide her with approved and secured means that met her business needs. However, according to these officials, DS and IRM did notand would notapprove her exclusive reliance on a personal email account to conduct Department business, because of the restrictions in the FAM and the security risks in doing so.
During Secretary Clintons tenure, the FAM also instructed employees that they were expected to use approved, secure methods to transmit SBU information and that, if they needed to transmit SBU information outside the Departments OpenNet network on a regular basis to non-Departmental addresses, they should request a solution from IRM. However, OIG found no evidence that Secretary Clinton ever contacted IRM to request such a solution, despite the fact that emails exchanged on her personal account regularly contained information marked as SBU.
Similarly, the FAM contained provisions requiring employees who process SBU information on their own devices to ensure that appropriate administrative, technical, and physical safeguards are maintained to protect the confidentiality and integrity of records and to ensure encryption of SBU information with products certified by NIST. With regard to encryption, Secretary Clintons website states that robust protections were put in place and additional upgrades and techniques employed over time as they became available, including consulting and employing third party experts. Although this report does not address the safety or security of her system, DS and IRM reported to OIG that Secretary Clinton never demonstrated to them that her private server or mobile device met minimum information security requirements specified by FISMA and the FAM.
In addition to interviewing current and former officials in DS and IRM, OIG interviewed other senior Department officials with relevant knowledge who served under Secretary Clinton, including the Under Secretary for Management, who supervises both DS and IRM; current and former Executive Secretaries; and attorneys within the Office of the Legal Adviser. These officials all stated that they were not asked to approve or otherwise review the use of Secretary Clintons server and that they had no knowledge of approval or review by other Department staff. These officials also stated that they were unaware of the scope or extent of Secretary Clintons use of a personal email account, though many of them sent emails to the Secretary on this account.
Secretary Clintons Chief of Staff also testified before the House Select Committee on Benghazi that she was unaware of anyone being consulted about the Secretarys exclusive use of a personal email address. OIG did find evidence that various staff and senior officials throughout the Department had discussions related to the Secretarys use of non-Departmental systems, suggesting there was some awareness of Secretary Clintons practices. For example:
In late-January 2009, in response to Secretary Clintons desire to take her BlackBerry device into secure areas, her Chief of Staff discussed with senior officials in S/ES and with the Under Secretary for Management alternative solutions, such as setting up a separate stand-alone computer connected to the Internet for Secretary Clinton to enable her to check her emails from her desk. The Under Secretarys response was the stand-alone separate network PC is great idea and that it is the best solution. According to the Department, no such computer was ever set up.
In November 2010, Secretary Clinton and her Deputy Chief of Staff for Operations discussed the fact that Secretary Clintons emails to Department employees were not being received. The Deputy Chief of Staff emailed the Secretary that we should talk about putting you on state email or releasing your email address to the department so you are not going to spam. In response, the Secretary wrote, Lets get separate address or device but I dont want any risk of the personal being accessible.
In August 2011, the Executive Secretary, the Under Secretary for Management, and Secretary Clintons Chief of Staff and Deputy Chief of Staff, in response to the Secretarys request, discussed via email providing her with a Department BlackBerry to replace her personal BlackBerry, which was malfunctioning, possibly because her personal email server is down. The then-Executive Secretary informed staff of his intent to provide two devices for the Secretary to use: one with an operating State Department email account (which would mask her identity, but which would also be subject to FOIA requests), and another which would just have phone and internet capability. In another email exchange, the Director of S/ES-IRM noted that an email account and address had alreadybeen set up for the Secretary and also stated that you should be aware that any email would go through the Departments infrastructure and subject to FOIA searches. However, the Secretarys Deputy Chief of Staff rejected the proposal to use two devices, stating that it doesnt make a whole lot of sense. OIG found no evidence that the Secretary obtained a Department address or device after this discussion.
OIG identified two individuals who provided technical support to Secretary Clinton. The first, who was at one time an advisor to former President Clinton but was never a Department employee, registered the clintonemail.com domain name on January 13, 2009. The second, a Schedule C political appointee who worked in IRM as a Senior Advisor from May 2009 through February 2013,156 provided technical support for BlackBerry communications during the Secretarys 2008 campaign for President. OIG reviewed emails showing communications between Department staff and both individuals concerning operational issues affecting the Secretarys email and server from 2010 through at least October 2012. For example, in December 2010, the Senior Advisor worked with S/ES-IRM and IRM staff to resolve issues affecting the ability of emails transmitted through the clintonemail.com domain used by Secretary Clinton to reach Department email addresses using the state.gov domain.
Two staff in S/ES-IRM reported to OIG that, in late 2010, they each discussed their concerns about Secretary Clintons use of a personal email account in separate meetings with the then-Director of S/ES-IRM. In one meeting, one staff member raised concerns that information sent and received on Secretary Clintons account could contain Federal records that needed to be preserved in order to satisfy Federal recordkeeping requirements. According to the staff member, the Director stated that the Secretarys personal system had been reviewed and approved by Department legal staff and that the matter was not to be discussed any further. As previously noted, OIG found no evidence that staff in the Office of the Legal Adviser reviewed or approved Secretary Clintons personal system. According to the other S/ES-IRM staff member who raised concerns about the server, the Director stated that the mission of S/ES-IRM is to support the Secretary and instructed the staff never to speak of the Secretarys personal email system again.
On January 9, 2011, the non-Departmental advisor to President Clinton who provided technical support to the Clinton email system notified the Secretarys Deputy Chief of Staff for Operations that he had to shut down the server because he believed someone was trying to hack us and while they did not get in i didnt want to let them have the chance to. Later that day, the advisor again wrote to the Deputy Chief of Staff for Operations, We were attacked again so I shut down for a few min. On January 10, the Deputy Chief of Staff for Operations emailed the Chief of Staff and the Deputy Chief of Staff for Planning and instructed them not to email the Secretary anything sensitive and stated that she could explain more in person.
ebayfool
(3,411 posts)for her Chief of Staff (Miller?)?
Secretary Clintons Chief of Staff also testified before the House Select Committee on Benghazi that she was unaware of anyone being consulted about the Secretarys exclusive use of a personal email address. OIG did find evidence that various staff and senior officials throughout the Department had discussions related to the Secretarys use of non-Departmental systems, suggesting there was some awareness of Secretary Clintons practices. For example:
In late-January 2009, in response to Secretary Clintons desire to take her BlackBerry device into secure areas, her Chief of Staff discussed with senior officials in S/ES and with the Under Secretary for Management alternative solutions, such as setting up a separate stand-alone computer connected to the Internet for Secretary Clinton to enable her to check her emails from her desk. The Under Secretarys response was the stand-alone separate network PC is great idea and that it is the best solution. According to the Department, no such computer was ever set up.
In November 2010, Secretary Clinton and her Deputy Chief of Staff for Operations discussed the fact that Secretary Clintons emails to Department employees were not being received. The Deputy Chief of Staff emailed the Secretary that we should talk about putting you on state email or releasing your email address to the department so you are not going to spam. In response, the Secretary wrote, Lets get separate address or device but I dont want any risk of the personal being accessible.
In August 2011, the Executive Secretary, the Under Secretary for Management, and Secretary Clintons Chief of Staff and Deputy Chief of Staff, in response to the Secretarys request, discussed via email providing her with a Department BlackBerry to replace her personal BlackBerry, which was malfunctioning, possibly because her personal email server is down. The then-Executive Secretary informed staff of his intent to provide two devices for the Secretary to use: one with an operating State Department email account (which would mask her identity, but which would also be subject to FOIA requests), and another which would just have phone and internet capability. In another email exchange, the Director of S/ES-IRM noted that an email account and address had alreadybeen set up for the Secretary and also stated that you should be aware that any email would go through the Departments infrastructure and subject to FOIA searches. However, the Secretarys Deputy Chief of Staff rejected the proposal to use two devices, stating that it doesnt make a whole lot of sense. OIG found no evidence that the Secretary obtained a Department address or device after this discussion.
corkhead
(6,119 posts)He never did put that money in my bank account like he promised.
EdwardBernays
(3,343 posts)he gave it to the Clinton Foundation!
HooptieWagon
(17,064 posts)EdwardBernays
(3,343 posts)I'm sure a lovely (and expensive) speech from Bill.
corkhead
(6,119 posts)HooptieWagon
(17,064 posts)She has been completely dishonest from the beginning, compromised national security, and refused to cooperate with the OIG investigation despite stating she would. Not at all Presidential character...more like Nixon in a pants suit.
EdwardBernays
(3,343 posts)this report really lays the whole thing bare...
They probably were hacked and she had the obligation to NOT use a personal server....
Talk about spin...
840high
(17,196 posts)vote for her.
Duval
(4,280 posts)And it only adds to her "untrustworthiness" as well as being "unliked". I can see the Republicans drooling over this and Trump is sure to use it. So, she thought she could get away with it and did it. Well, there are rules and laws we ALL must follow.
Bernin4U
(812 posts)So it doesn't actually matter.
mindwalker_i
(4,407 posts)snorting a line of network cables. That would hurt.
Bernin4U
(812 posts)Just to be sure, my joke was supposed to mean that the hacker(s) may or may not have breached her server, but the important thing is that they didn't inhale once they got there.
But your joke may be better...
Response to EdwardBernays (Original post)
artislife This message was self-deleted by its author.
sorechasm
(631 posts)up the law and other hindrances to Hillary's destiny.
According to the staff member, the Director stated that the Secretarys personal system had been reviewed and approved by Department legal staff and that the matter was not to be discussed any further. As previously noted, OIG found no evidence that staff in the Office of the Legal Adviser reviewed or approved Secretary Clintons personal system. According to the other S/ES-IRM staff member who raised concerns about the server, the Director stated that the mission of S/ES-IRM is to support the Secretary and instructed the staff never to speak of the Secretarys personal email system again.
Who does the FBI think they are for pursuing this? She said she was sorry. I once heard a President state that 'when the President does it, then it is legal'....Surely this statement applies to Predestined Presidents as well...Which President made that statement?...Nix...Oh...nevermind.
sorechasm
(631 posts)it seems laughable to think that Hillary's crew had saved valuable State Dept. secrets from a hacker because they 'unplugged it in time'. Whatever signal that alerted them of the problem could have been hidden for hours or days before they realized the breach.
Aren't we talking about multiple megabytes per second of top secret data being hacked by the world's greatest masterminds in China and Russia? I guess its okay because she 'shut down her server for a few minutes.'
Babel_17
(5,400 posts)The timing is pretty close, isn't it? I'm sure there are other factors but I can't imagine how the OIG report wouldn't get several references from the moderators if the Clinton campaign agreed to another debate before the voting took place in California.
mvd
(65,175 posts)He could have done it for sure. That shows his integrity and commitment to defeating Trump. He is just letting the State Department do its job.