It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Buried in a footnote and text of the scathing report by the State Department’s Inspector General (IG) about Hillary’s emails is evidence that the private email server that carried America’s top secret information to and from the Secretary of State was installed, maintained, and partially operated by a civilian aide to Bill Clinton who lacked any security clearance and did not even work for the government.
This extensive reliance on a close assistant to Bill Clinton raises questions about the handling of classified material by the Secretary of State. If General David Petraeus was held accountable to passing secret information to his biographer and mistress, what are we to make of the routine access to potentially all secret information granted to Hillary’s husband’s aide?
While not named in the report itself, the “non-Department” aide referred to is apparently Justin Cooper, longtime aide-de-camp to the former president. Cooper had no security clearance and no expertise whatsoever in safeguarding computers.
The IG Report states that on Jan. 9, 2011, the Bill Clinton aide who registered the clintonemail.com domain — who was Justin Cooper — “notified the Secretary’s Deputy Chief of Staff for Operations [Huma Abedin] that he had to shut down the server because he believed ‘someone was trying to hack us and while they did not get in I didn’t [sic] want to let them have the chance to.'”
Although Hillary publicly claimed that the server was originally installed for President Clinton's use and had many safeguards; that was not the case.
The server was actually purchased by her political action committee during the 2008 campaign and installed in her house. The PAC continued to control it. Bryan Pagliano, formerly the IT specialist for Hillary's campaign, was given responsibility for maintaining the PAC's server.
Hillary's leadership PAC paid Pagliano for his work during the first four months that Hillary was Secretary of State. He obviously had no security clearance at that time, either.
After April 2009, Pagliano was hired by the State Department and was responsible for the server. So, for several months, all of the Secretary of State's official emails were processed through a server in her house that was paid for and maintained by her political organization.
originally posted by: butcherguy
a reply to: IAMTAT
Whoa.
Not that I am surprised by it, just impressed that the info is out.
Clinton’s server, which handled her personal and State Department correspondence, appeared to allow users to connect openly over the Internet to control it remotely, according to detailed records compiled in 2012. Experts said the Microsoft remote desktop service wasn’t intended for such use without additional protective measures, and was the subject of U.S. government and industry warnings at the time over attacks from even low-skilled intruders.
Just in case any hackers missed the “Open House” sign on the unlocked front door, the Clintons left two back doors unlocked, too: Records show that Clinton additionally operated two more devices on her home network in Chappaqua, New York, that also were directly accessible from the Internet.
One contained similar remote-control software that also has suffered from security vulnerabilities, known as Virtual Network Computing, and the other appeared to be configured to run websites.
Although Hillary publicly claimed that the server was originally installed for President Clinton's use and had many safeguards; that was not the case.
The server was actually purchased by her political action committee during the 2008 campaign and installed in her house. The PAC continued to control it. Bryan Pagliano, formerly the IT specialist for Hillary's campaign, was given responsibility for maintaining the PAC's server.
Hillary's leadership PAC paid Pagliano for his work during the first four months that Hillary was Secretary of State. He obviously had no security clearance at that time, either.
After April 2009, Pagliano was hired by the State Department and was responsible for the server. So, for several months, all of the Secretary of State's official emails were processed through a server in her house that was paid for and maintained by her political organization.
One contained similar remote-control software that also has suffered from security vulnerabilities, known as Virtual Network Computing, and the other appeared to be configured to run websites.
originally posted by: jadedANDcynical
a reply to: IAMTAT
This perks up my ears:
One contained similar remote-control software that also has suffered from security vulnerabilities, known as Virtual Network Computing, and the other appeared to be configured to run websites.
I don't have the knowledge, but I bet someone around here does; using DNS records and other similar online research tools, one could find out which websites were running and then with the wayback machine see what was served up by that web hosting machine.
After April 2009, Pagliano was hired by the State Department and was responsible for the server. So, for several months, all of the Secretary of State's official emails were processed through a server in her house that was paid for and maintained by her political organization.