It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Picklesneeze
a reply to: seasonal
Trusting a person with connections to the muslim brotherhood to be anywhere near top secret info is like trusting Jeffrey Dahmer to babysit your young boys.
There is no part of the clinton's campaign that doesn't involve some sort of lies or crime.
originally posted by: schuyler
originally posted by: Jonjonj
originally posted by: schuyler
originally posted by: Jonjonj
a reply to: schuyler
She may have had her phone synced to her accounts and to her laptop. Any access to her accounts from the phone would sync the email account to the laptop.
I am guessing she wasn't paying attention to the recent windows 10 roll out.
True, but that would be just her stuff. This is 650K. She may be prolific in email writing, but I doubt she could pull that many off.
And if she simply, by accident, hadn't turned off OneDrive?
EDIT: With the server selected as a save folder, obviously.
In which case there would be yet another copy in the cloud. But I think we're in danger of too much complexity here. The file was still on the laptop. It got onto the laptop, cloud or no cloud, somehow. It wasn't just because of a synched phone that kept a copy of her personal emails on her laptop, one that was apparently shared with Wiener. If I assume correctly, it's the entire server email file. And that points to intention. You would need an extremely complex series of events to claim the entire email file "accidentally" copied to the laptop with no human intervention. To me, that's beyond believable.
So if it were intentional, who did it? Huma? I see no evidence that she is at all tech savvy. It's one thing to be "computer literate" and be able to use a word processor and a spreadsheet and deem yourself an expert. It's quite another to understand the complexities of Windows and understand the file structure of a server architecture enough to know where that one "email file" resides. And it's yet another skill set to move a file like that from one computer to another. I'm thinking Huma does not have those skills, therefore EITHER she was taught, i.e.: Given precise directions on how to do it, or someone else did it for her. I'm mindful of the old adage never to attribute to malice what can easily be explained by stupidity, but I just don't see how 650K emails could have migrated to a laptop by accident or a "configuration error." That strains credulity.
The question remains, WHY was it moved there? If we here on ATS have reasoned this far, surely the FBI has reached the same conclusions. This ought to be interesting.
It is not actually that hard to copy an Outlook PST file. Simply open your outlook properties for the Outlook Mailbox you would like to access, get the file location, it should be somewhere in the %appdata% local or roaming profiles. Once the full path is known, close outlook to ensure no file handles are left open and then copy the file. If the file was not secured by either the Outlook 2003 Encrypted Compressible format or by using Windows User security (setting password protection on the file itself or by using bitlocker for the newer Outlook Versions) then this PST file is considered highly portable and high risk. Chances are though, if there was a password, she would have it anyhow so no need to worry about how secure it was.
Either way Outlook typically depends on Windows Identity for security and unless steps were taken to augment the security, Outlook out of the box is not going to yield satisfactory security for a scenario where a PST file is copied.
These people were drunk with power. The had the whole government under their control. IRS, FBI, DOJ, DNC and many many more. I think they thought they were untouchable. Wrong...
originally posted by: bobs_uruncle
a reply to: schuyler
It is trivial, all you have to do is copy the entire /users directory in most cases. Add in program data and/or /program files, and you're done.
Combetta didn’t tell his Platte River colleagues that he had been transferring the old Clinton files to CESC until March 2015.
Her team had me do a bunch of exports and email filters and cleanup to provide a PST [personal storage file] of all of HRC’s emails to/from any .gov addresses,” Combetta wrote.
She SAID she kept no copies, so she either lied during the inquest or didn't know it was there. If she knew it was there it wasn't a CYA move on her part because she had already gone the other way.
originally posted by: evc1shop
It is not actually that hard to copy an Outlook PST file. Simply open your outlook properties for the Outlook Mailbox you would like to access, get the file location, it should be somewhere in the %appdata% local or roaming profiles. Once the full path is known, close outlook to ensure no file handles are left open and then copy the file. If the file was not secured by either the Outlook 2003 Encrypted Compressible format or by using Windows User security (setting password protection on the file itself or by using bitlocker for the newer Outlook Versions) then this PST file is considered highly portable and high risk. Chances are though, if there was a password, she would have it anyhow so no need to worry about how secure it was.
originally posted by: seasonal
a reply to: schuyler
She SAID she kept no copies, so she either lied during the inquest or didn't know it was there. If she knew it was there it wasn't a CYA move on her part because she had already gone the other way.
Could all that be on her computer and her not know it?
originally posted by: seasonal
a reply to: schuyler
She SAID she kept no copies, so she either lied during the inquest or didn't know it was there. If she knew it was there it wasn't a CYA move on her part because she had already gone the other way.
Could all that be on her computer and her not know it?
originally posted by: schuyler
originally posted by: evc1shop
It is not actually that hard to copy an Outlook PST file. Simply open your outlook properties for the Outlook Mailbox you would like to access, get the file location, it should be somewhere in the %appdata% local or roaming profiles. Once the full path is known, close outlook to ensure no file handles are left open and then copy the file. If the file was not secured by either the Outlook 2003 Encrypted Compressible format or by using Windows User security (setting password protection on the file itself or by using bitlocker for the newer Outlook Versions) then this PST file is considered highly portable and high risk. Chances are though, if there was a password, she would have it anyhow so no need to worry about how secure it was.
Really? Can you imagine Huma reading what you just wrote and making sense about what you just said? This is a SERVER, mind you, not your local /user/name/stuff file you would find using Outlook as a client. It is probably a file from Microsoft Exchange Server. The SERVER contains ALL the emails of EVERYONE. Are you claiming all the email for everyone on a server is in a single PST file? 650k is the entire enchilada. So 1. I don't buy your 'easy' explanation, and 2. IT DOESN'T MATTER because THAT'S NOT THE ISSUE! The issue isn't so much how easily it got there, but what it is doing there. Eye on the prize.
originally posted by: Riffrafter
a reply to: schuyler
Great points Schuyler.
My money as to how the 650k emails got there is that it was done by the same tech that did the bleachbitting of the original illegal server