131 online
 
Most Popular Choices
Share on Facebook 25 Printer Friendly Page More Sharing Summarizing
OpEdNews Op Eds    H2'ed 6/3/16

Three Data Points Regarding Clinton's Email Server and the Law

By       (Page 1 of 3 pages)   No comments

Gaius Publius
Message Gaius Publius
Become a Fan
  (4 fans)

This piece was reprinted by OpEd News with permission or license. It may not be reproduced in any form without permission or license from the source.

.Lady Justice. atop the Old Bailey, carrying the scales of even-handedness and the sword of punishment, should it be needed. Some remember this as Rumpole's old hangout.
.Lady Justice. atop the Old Bailey, carrying the scales of even-handedness and the sword of punishment, should it be needed. Some remember this as Rumpole's old hangout.
(Image by deBurca)
  Details   DMCA

Reprinted from downwithtyranny.blogspot.com

I've been writing for weeks that there are two aspects to the Clinton "secret server" issue -- the way the server was handled, and the content of the messages it contained. Regarding the way the server was handled, almost everything needed to determine criminal liability is already in the public record and has been for a while.

So here are three data points, just three. They line up perfectly so the main idea is easy to grasp. (Consider this the first in a series, "The Clinton Server Story for Progressives." If events move too quickly, it will be the last, as everyone from Time to the Washington Post will be telling you what's what and you won't need me at all.)

-- The server's email system was apparently unencrypted for the first two months of use when Clinton was Secretary of State.

This means that email going to and from the server was unencrypted during transmission. Messages were sent and received in plain text. This is the Washington Post from last March (my emphasis):
The server was nothing remarkable, the kind of system often used by small businesses, according to people familiar with its configuration at the end of her tenure. It consisted of two off-the-shelf server computers. Both were equipped with antivirus software. They were linked by cable to a local Internet service provider. A firewall was used as protection against hackers.

Few could have known it, but the email system operated in those first two months without the standard encryption generally used on the Internet to protect communication, according to an independent analysis that Venafi Inc., a cybersecurity firm that specializes in the encryption process, took upon itself to publish on its website after the scandal broke.

Not until March 29, 2009 -- two months after Clinton began using it -- did the server receive a "digital certificate" that protected communication over the Internet through encryption, according to Venafi's analysis.

It is unknown whether the system had some other way to encrypt the email traffic at the time. Without encryption -- a process that scrambles communication for anyone without the correct key -- email, attachments and passwords are transmitted in plain text.

"That means that anyone could have accessed it. Anyone," Kevin Bocek, vice president of threat intelligence at Venafi, told The Post.

The system had other features that made it vulnerable to talented hackers, including a software program that enabled users to log on directly from the World Wide Web.

Four computer-security specialists interviewed by The Post said that such a system could be made reasonably secure but that it would need constant monitoring by people trained to look for irregularities in the server's logs.

"For data of this sensitivity... we would need at a minimum a small team to do monitoring and hardening," said Jason Fossen, a computer-security specialist at the SANS Institute, which provides cybersecurity training around the world.

The man Clinton has said maintained and monitored her server was Bryan Pagliano, who had worked as the technology chief for her political action committee and her presidential campaign. It is not clear whether he had any help. Pagliano had also provided computer services to the Clinton family. In 2008, he received more than $5,000 for that work, according to financial disclosure statements he filed with the government.
The Post article is much longer and contains a great deal of information. If this subject interests you, I encourage you to click through.

I hope you noticed the name "Bryan Pagliano" above. He's among the key people the FBI are talking to. In March, Pagliano was granted immunity in exchange for information. Pagliano is also the subject of a Judicial Watch FOIA request, and he's on the Judicial Watch deposition list. (For more on Pagliano, see below.)

Your first takeaway -- Unless there was encryption employed by Clinton's private email service that no one knows about, email communications to and from it were readable as plain text. Certainly not deliberately so, but a fact nonetheless.

Next Page  1  |  2  |  3

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Must Read 1   Valuable 1  
Rate It | View Ratings

Gaius Publius Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

A writer who contributes to a number of publications, including digby's Hullabaloo, Down With Tyranny, Naked Capitalism, Truthout and Alternet.

On Twitter — @Gaius_Publius

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Carl Bernstein: The White House Is Terrified the Clinton Campaign "Is In Freefall"

You Broke It, You Bought It": A Sanders Activist Challenges Clinton Supporters

Who Leaked the Podesta and DNC Emails? A Look at the Other Side

Could Endorsing Clinton Hurt Down-Ticket Democrats? Polling Says Yes.

What Would Happen If Sanders Ran for President in 2020?

What's the Cost to the American People of Keeping Senators Like Patty Murray in Office?

To View Comments or Join the Conversation:

Tell A Friend