It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
You seem like a fairly smart guy, are you telling me that there is no way a server could be hacked and it not be known by those who were hacked?
Pagliano was a barely qualified sysadmin who had way out of date certifications and from the bits and pieces that have come out about this whole scenario, I fail to comprehend how anyone can give Hillary the benefit of the doubt.
originally posted by: shooterbrody
a reply to: introvert
I disagree
I think you want to create similarities to defend Hillary and for no other purpose
originally posted by: introvert
a reply to: AlaskanDad
Yes, more questions that we cannot answer.
What does this prove? We need more information before coming to any conclusion.
Earlier this month, NBC’s Mitchell asked Clinton the following, “Any indication your private server was hacked by foreign hackers?” “No,” Clinton replied. “Not at all.”
However, the audit reveals that Clinton did have suspicions that someone had breached her email back in 2011. See footnote 159 from the audit:
In another incident occurring on May 13, 2011, two of Secretary Clinton’s immediate staff discussed via email the Secretary’s concern that someone was “hacking into her email” after she received an email with a suspicious link. Several hours later, Secretary Clinton received an email from the personal account of then-Under Secretary of State for Political Affairs that also had a link to a suspect website. The next morning, Secretary Clinton replied to the email with the following message to the Under Secretary: “Is this really from you? I was worried about opening it!” Department policy requires employees to report cybersecurity incidents to IRM security officials when any improper cyber-security practice comes to their attention. 12 FAM 592.4 (January 10, 2007). Notification is required when a user suspects compromise of, among other things, a personally owned device containing personally identifiable information. 12 FAM 682.2-6 (August 4, 2008). However, OIG found no evidence that the Secretary or her staff reported these incidents to computer security personnel or anyone else within the Department.
Clinton once again broke with department policy, she is a security risk.
Diplomatic Security, Secretary Clinton had an obligation to discuss using her personal email account to conduct official business with their offices, who in turn would have attempted to provide her with approved and secured means that met her business needs.
...OIG found no evidence that Secretary Clinton ever contacted IRM to request such a solution...
The Deputy Chief of Staff emailed the Secretary that “we should talk about putting you on state email or releasing your email address to the department so you are not going to spam.” In response, the Secretary wrote, “Let’s get separate address or device but I don’t want any risk of the personal being accessible.”
...
In August 2011, the Executive Secretary, the Under Secretary for Management, and Secretary Clinton’s Chief of Staff and Deputy Chief of Staff, in response to the Secretary’s request, discussed via email providing her with a Department BlackBerry to replace her personal BlackBerry, which was malfunctioning, possibly because “her personal email server is down.” The then-Executive Secretary informed staff of his intent to provide two devices for the Secretary to use: “one with an operating State Department email account (which would mask her identity, but which would also be subject to FOIA requests), and another which would just have phone and internet capability.” In another email exchange, the Director of S/ES-IRM noted that an email account and address had already been set up for the Secretary153 and also stated that “you should be aware that any email would go through the Department’s infrastructure and subject to FOIA searches.”154 However, the Secretary’s Deputy Chief of Staff rejected the proposal to use two devices, stating that it “doesn’t make a whole lot of sense.” OIG found no evidence that the Secretary obtained a Department address or device after this discussion.
...officials all stated that they were not asked to approve or otherwise review the use of Secretary Clinton’s server and that they had no knowledge of approval or review by other Department staff.
Secretary Clinton’s counsel advised OIG that the Senior Advisor “performed technology services for the Clinton family for which he was compensated” by check or wire transfer in varying amounts and various times between 2009 and 2013. In addition, the Senior Advisor’s direct supervisors in IRM from 2009 to 2013 told OIG they were unaware of his technical support of the Secretary’s email system. While working at the Department, the Senior Advisor reported directly to the Deputy Chief Information Officer (DCIO) for Operations, who in turn reported to the Chief Information Officer (CIO). The DCIO and CIO, who prepared and approved the Senior Advisor’s annual evaluations, believed that the Senior Advisor’s job functions were limited to supporting mobile computing issues across the entire Department. They told OIG that while they were aware that the Senior Advisor had provided IT support to the Clinton Presidential campaign, they did not know he was providing ongoing support to the Secretary’s email system during working hours. They also told OIG that they questioned whether he could support a private client during work hours, given his capacity as a full-time government employee.
... the newly posted Ambassador had drafted and distributed a revised mission policy concerning communications security that authorized him and other mission personnel to use commercial email for daily communication of official government business. That prompted senior DS management and cybersecurity staff to email the Ambassador to advise him that DS was dispatching an experienced Regional Computer Security Officer to provide expertise and advice in establishing procedures for handling SBU information that adhered to Department standards for the processing of sensitive material. DS further noted that this visit would be “especially timely in the wake of recent headlines concerning a significant hacking effort directed against the private, web-based email accounts of dozens of senior USG officials, which has generated substantial concern from the Secretary, Deputy Secretary Steinberg, and other Department principals.” Notwithstanding the Department’s concerns, the Ambassador continued to use commercial email for official business.
...
However, the Ambassador continued to use unauthorized systems to conduct official business. The Department subsequently initiated disciplinary proceedings against him for his failure to follow these directions and for several other infractions, but he resigned before any disciplinary measures were imposed.
I presume you utilize technology, the internet, smartphone, computers, and read news stories, etc.
That is a much more apt comparison than Powell.
Based on the article I'm more worried that this is common practice.
originally posted by: introvert
a reply to: amicktd
Based on the article I'm more worried that this is common practice.
Bingo.
I doubt this will result in any criminal indictment. More likely a whole week spent in classes learning how to handle communications if she ever makes it to another position.