An explosive new report suggests that former Secretary of State Hillary Clinton or her team may have instructed tech companies involved with managing and storing her emails to delete some records after she was told to turn them over to the State Department, which needed to comply with documents requests made by the Select Committee on Benghazi. One tech employee was suspicious that Clinton's team “really is covering up some shaddy (sic) (expletive).”
The new revelations are in addition to the FBI expanding its investigation to include a second data company, and serve as further evidence that Clinton’s unprecedented and exclusive use of a private, unsecure computer server and personal email account for official government business meant classified information related to foreign affairs and America’s national security was routinely exposed.
The U.S. Department of State Foreign Affairs Manual defines “classified information spillage” as “When classified data is processed or received on an information system with a lower level of classification.”
The Department of Homeland Security Sensitive Systems Handbook states that “Examples include e-mailing a classified document from an account authorized to process up to SECRET to another account only authorized to process unclassified material, or saving a SECRET document onto a thumb drive or CD on a secure workstation and uploading it to a sensitive but unclassified (SBU) workstation.”
Despite her denials, it has been well-established that there was lots of classified information in Clinton’s email:
- There was information that was later classified before being released by the State Department.
- There were emails that “contained classified information when they were generated,” according to the Inspectors General of the Intelligence Community and the State Department.
- There were emails that contained “Top Secret” information when they were received, according to the Central Intelligence Agency and the National Geospatial-Intelligence Agency.
- There were emails that contained “information shared in confidence by foreign government officials,” which “must be classified from the start, and handled through secure, government-controlled channels,” according to U.S. government regulations.
This classified information was not just located on a secret server in the Clintons’ private New York home, which Hillary Clinton had touted as secure because it was “property guarded by the Secret Service.” It has been digitally spilled around the Internet and physically moved to locations around the country:
- Stacks and stacks of boxes on a truck, which is how Clinton delivered all of the emails she chose to print and turn over to the State Department.
- The D.C. office of David Kendall, Clinton’s lawyer, where he kept a thumb drive with copies of her emails outside of a safe before one was installed. The thumb drive was eventually taken by the FBI.
- “A third party data center” in New Jersey, where the Clintons’ home server was warehoused in 2013. The server was eventually taken by the FBI.
- A Colorado-based company, Platte River Networks, which took over management of Clinton’s private email network in 2013.
- A Connecticut-based company, Datto Inc., which stored backups of Clinton’s emails on a “cloud” storage system and is now cooperating with the FBI’s investigation.
- The Clinton Foundation, where staff received classified information in emails from Clinton’s chief of staff, Cheryl Mills.
- Computers at the State Department, which the FBI seized several weeks ago.
- Servers at commercial email providers like Google and AOL, which were conduits for Clinton emails containing classified information.
- The personal email account of Sidney Blumenthal, who was hacked by Guccifer in 2013. Blumenthal did not have a security clearance and he was barred from working in the Obama administration by President Obama’s first chief of staff, but that didn’t stop Clinton from paying him as an unofficial, secret advisor on the side.
Where will the classified information spilled by Hillary Clinton turn up next?
The Associated Press reports that “Clinton's private email server … was the subject of attempted cyberattacks originating in China, South Korea and Germany after she left office in early 2013. … While the attempts were apparently blocked by a ‘threat monitoring’ product that Clinton's employees connected to her network in October 2013, there was a period of more than three months from June to October 2013 when that protection had not been installed[.]”
A separate report last week detailed how “Russia-linked hackers tried at least five times to pry into Hillary Rodham Clinton's private email account while she was secretary of state[.]”
And now The Washington Post reports that “A technology subcontractor that has worked on Hillary Rodham Clinton’s e-mail setup expressed concerns over the summer that the system was inadequately protected and vulnerable to hackers, a company official said Wednesday.”