It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Hillary Clinton’s use of a private email server has faded for some, but not Platte River Networks, which on Thursday learned a congressional committee wants the government to prosecute its CEO, Treve Suazo.
“Instead of cooperation, the Committee was met with obstruction and refusal to comply with subpoenas and requests for transcribed interviews. These actions, taken together, as well as Mr. Suazo’s false statements to the Committee, made through counsel, support the pattern of obstruction. If left unaddressed, Mr. Suazo’s conduct in ignoring lawful congressional subpoenas, misleading the Committee through false statements, and bald refusal to respond to reasonable requests could gravely impair Congress’s ability to exercise its core constitutional authorities of oversight and legislation,” reads the letter, signed by Smith.
...[a]ll PRN employees will be ceasing voluntary cooperation with your committee pursuant to their rights under the Fourth and Fifth amendments."
originally posted by: jadedANDcynical
While people have been screaming about the scary Russians, other things have been going on without notice.
To whit:
Hillary Clinton’s use of a private email server has faded for some, but not Platte River Networks, which on Thursday learned a congressional committee wants the government to prosecute its CEO, Treve Suazo.
Everyone remembers PRN, right? The company to which Hillary's email was migrated to after being moved off of her homebrew server. Well, it turns out they've been stonewalling for quite some time and the chair of the House Committee on Science, Space & Technology is not too happy about it:
“Instead of cooperation, the Committee was met with obstruction and refusal to comply with subpoenas and requests for transcribed interviews. These actions, taken together, as well as Mr. Suazo’s false statements to the Committee, made through counsel, support the pattern of obstruction. If left unaddressed, Mr. Suazo’s conduct in ignoring lawful congressional subpoenas, misleading the Committee through false statements, and bald refusal to respond to reasonable requests could gravely impair Congress’s ability to exercise its core constitutional authorities of oversight and legislation,” reads the letter, signed by Smith.
He's ready to take it to a grand jury and compel Platte River Networks to allow them access to the the server and associated systems. But, the attorney for PRN has responded in a manner which indicates they are not going to make this easy; see below.
Denver Post
From the letter to AG Sessions:
...[a]ll PRN employees will be ceasing voluntary cooperation with your committee pursuant to their rights under the Fourth and Fifth amendments."
DOJ PRN referral (direct .pdf link)
Related threads:
Reddit post apparently related to Clintons email coverup
DoJ granted immunity to tech who wiped server
Immunity deals stopped FBI from investigating BleachBit use in Clinton email case
The FBI Files - Hillary R. Clinton
Comey: FBI looked 'hard' for obstruction of justice in Clinton email probe
What says ATS?
Looks like there is an earlier thread on this form the time the original article was posted, but I did not see it until now.
"House panel seeks charges for company in Clinton email case"
THIS IS AN EMAIL BETWEEN PODESTA AND A COMPUTER SCIENTIST: en.wikipedia.org... I believe that this is a more serious situation than perhaps Secretary Clinton and her aides realize.Fortunately, there is a positive step that can and should be taken. The problem. There is a very real risk that the system was broken into, possibly by Republican operatives (or China or some other country or organization). If this has happened and if there is anything that might appear problematic in those emails, whether or not it actually is, the relevant emails might be released to the press shortly before the election. Even if the system was not broken into, there is the threat that opponents might release forged emails that are difficult to impossible to distinguish from real ones. In addition, there are questions that any computer security expert will ask, such as was the system backed up regularly. If so, then it might be possible at least to respond to forged emails. Of course the claim that the server has been wiped clean (was that also done with any backups that were created?) suggests that there may not be adequate backups.
Incidentally, depending on how the deletions on the server were done, it might be possible for the email to be recovered by a forensics expert. What should be done. Unfortunately, nothing can be done to prevent the risks described above. Given that, it's important to know how real those risks might be. Therefore, I recommend that a forensics investigator be hired to examine the server and any backups and logs that might still exist to see if there may have been a break-in. Jeremy Epstein is a prominent computer security expert who has recommended a company called Mandiant. (Neither Jeremy nor I have any involvment with Mandiant of any kind, including financial). According to Jeremy, they are frequently brought in after major corporate breakins. They are verydiscrete and, in his view, competent. I can put anyone who is interested in touch with Jeremy, whoives in Virginia. In my opinion it is critical that a highly qualified forensics expert examine the system as soon aspossible. It is important to know if there may be a problem or if an attack may have occurred, so that there can be a well thought out response prepared beforehand. Finally, if nothing serious is uncovered by a forensics examination, that does not prove that nothing happened. Regrettably, the absence of proof of a break-in is not proof of the absence of a break-in. THIS EMAIL WAS SENT 2015-04-15 DURING THE BENGAHZI #STORM! ZOMG!!! ZOMG: The companies are Fidelis Cybersecurity and Mandiant.
They base their analysis on five malware samples used in the hacking attack. Fidelis executive Michael Buratowski says, “Based on our comparative analysis, we agree with CrowdStrike and believe that the Cozy Bear and Fancy Bear…groups were involved in successful intrusions at the DNC [Democratic National Committee] . […] The malware samples matched the description, form and function that was described in the CrowdStrike blog post. In addition, they were similar and at times identical to malware that other [research firms] have associated to these actor sets.” www.thompsontimeline.com... Mandiant is one of the firms blaming RUSSIA! Coincidence? I think not!
conducting a comprehensive investigation into the security of former Secretary of State Hillary Clinton's private server and e-mail arrangement used during her tenure at the US Department of State.
According to the aides, Datto asked Platte River to take steps to encrypt the information on the server, which was stored at a data center in New Jersey.
“We didn’t see any evidence that those encryption measures were taken,” the aides said.
The aides also said that a Platte River technician, Paul Combetta, received at least 50 alerts about hacking attempts on Clinton’s server originating from Korea, Germany, France and the U.S.
The aides said that Combetta responded to those email alerts by asking to be removed from the alert system.
Combetta also lied to the FBI during one of his interviews about his work on Clinton’s server. Despite that, he was granted immunity from the Justice Department in order to cooperate with the investigation.
originally posted by: jadedANDcynical
I can find nothing more recent than early May regarding this issue. It's like it has completely disappeared.