It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: xuenchen
And the ironic punch line is:
"Hours before Hillary Clinton was set to deliver a major foreign policy address Thursday"
originally posted by: RickinVa
thehill.com...
That is sooo obviously a pro Hillary piece...lol
originally posted by: burntheships
originally posted by: RickinVa
thehill.com...
That is sooo obviously a pro Hillary piece...lol
I know, lol. Totally spun, as if the RNC somehow
is responsible for the signed disclosures and the
illegal server.
originally posted by: butcherguy
The RNC 'Goon Squad' forced Hillary and her people to break all the rules (AT GUNPOINT!) !!
Except so far there's not a shred of evidence to show that that info was ever at risk or that the system was unsecured. So where is your incorrect information coming from?
With regard to encryption, Secretary Clinton’s website states that “robust protections were put in place and additional upgrades and techniques employed over time as they became available, including consulting and employing third party experts.”150
Although this report does not address the safety or security of her system, DS and IRM reported to OIG that Secretary Clinton never demonstrated to them that her private server or mobile device met minimum information security requirements specified by FISMA and the FAM.
Diplomatic Security, Secretary Clinton had an obligation to discuss using her personal email account to conduct official business with their offices, who in turn would have attempted to provide her with approved and secured means that met her business needs.
...officials all stated that they were not asked to approve or otherwise review the use of Secretary Clinton’s server and that they had no knowledge of approval or review by other Department staff.
Type 1 encryption in a mobile phone
Regular and secure calls from the same phone both domestically and abroad with GSM worldwide coverage
NSA certified for Top Secret codeword and below
Approved for the encryption of all levels of NATO classified information
Features and conveniences of a commercial wireless phone
Secure Communications Interoperability Protocol (SCIP) compliant and interoperable
originally posted by: Sillyolme
a reply to: jadedANDcynical
Although the report does not address the safety or security of her system....
And she didn't ask them.
She's said in retrospect it wasn't a good idea. But none of that says anything about her computer being compromised or hacked..
Why not? After all, "it's not terribly long and is not written in legalese so it's easy for non lawyers to understand."
I didn't read the entire report
... but I read the conclusions and it didn't recommend disciplinary action against the Secretary.
Through her counsel, Secretary Clinton declined OIG’s request for an interview. 7
...
7
In addition to Secretary Clinton, eight former Department employees declined OIG requests for interviews: (1) the Chief of Staff to Secretary Powell (2002-05); (2) the Counselor and Chief of Staff to Secretary Clinton (2009-13); (3) the Deputy Chief of Staff for Policy to Secretary Clinton (2009-11) and the Director of Policy Planning (2011-13); (4) the Deputy Chief of Staff for Operations to Secretary Clinton (2009-13); (5) the Deputy Assistant Secretary for Strategic Communication (2009-13); (6) the Director of the S/ES Office of Information Resources Management (2008-13); (7) a Special Advisor to the Deputy Chief Information Officer (2009-13) who provided technical support for Secretary Clinton’s personal email system; and (8) a Senior Advisor to the Department, who supervised responses to Congressional inquiries (2014-15). Two additional individuals did not respond to OIG interview requests: the Deputy Secretary of State for Management and Resources (2011-13) and an individual based in New York who provided technical support for Secretary Clinton’s personal email system but who was never employed by the Department.
Failed attempts and Hillary didn't fail to report any nd because they didn't happen. In both instances the system was shut done and the break in prevented. The rules were to report break ins not attempted break ins.
Department policy requires employees to report cyber-security incidents to IRM security officials when any improper cyber-security practice comes to their attention. 12 FAM 592.4 (January 10, 2007). Notification is required when a user suspects compromise of, among other things, a personally owned device containing personally identifiable information. 12 FAM 682.2-6 (August 4, 2008). However, OIG found no evidence that the Secretary or her staff reported these incidents to computer security personnel or anyone else within the Department.
Did you read the IAG report?
originally posted by: Sillyolme
a reply to: shooterbrody
Except so far there's not a shred of evidence to show that that info was ever at risk or that the system was unsecured. So where is your incorrect information coming from?
"These details supplement defendant’s showing that it conducted a reasonable search, but cannot be disclosed on the public record without compromising information that the FBI seeks to protect," Justice Department lawyers wrote, citing FOIA exemption for ongoing government investigations and enforcement actions. Read more: www.politico.com... Follow us: @politico on Twitter | Politico on Facebook
originally posted by: Sillyolme
a reply to: RickinVa
I have now read the entire report.
Classified Information will not be processed on any equipment unless it has been certified and accredited for classified processing (refer to DHS Policy Publication 4300B, DHS National Security Systems Handbook).
Personally owned equipment and software shall not be used to process, access, or store sensitive information without the written prior approval of the AO.
Secretary Clinton used mobile devices to conduct official business using the personal email account on her private server extensively, as illustrated by the 55,000 pages of material making up the approximately 30,000 emails she provided to the Department in December 2014. Throughout Secretary Clinton’s tenure, the FAM stated that normal day-to-day operations should be conducted on an authorized AIS,147 yet OIG found no evidence that the Secretary requested or obtained guidance or approval to conduct official business via a personal email account on her private server.According to the current CIO and Assistant Secretary for Diplomatic Security, Secretary Clinton had an obligation to discuss using her personal email account to conduct official business with their offices, who in turn would have attempted to provide her with approved and secured means that met her business needs. However, according to these officials, DS and IRM did not—and would not—approve her exclusive reliance on a personal email account to conduct Department business, because of the restrictions in the FAM and the security risks in doing so.
During Secretary Clinton’s tenure, the FAM also instructed employees that they were expected to use approved, secure methods to transmit SBU information and that, if they needed to transmit SBU information outside the Department’s OpenNet network on a regular basis to non-Departmental addresses, they should request a solution from IRM.148 However, OIG found no evidence that Secretary Clinton ever contacted IRM to request such a solution, despite the fact that emails exchanged on her personal account regularly contained information marked as SBU.