Image 01 Image 03

Hillary refusal to turn over server for months may have led people off the trail

Hillary refusal to turn over server for months may have led people off the trail

… which now leads to Colorado.

The Hillary email scandal gets curiouser and curiouser with the revelation that among the emails already identified were at least two emails containing top secret satellite and signals intelligence.

The Daily Beast reported yesterday, The Spy Satellite Secrets in Hillary’s Emails:

… There is no doubt that she, or someone on her State Department staff, violated federal law by putting TOP SECRET//SI information on an unclassified system. That it was Hillary’s private, offsite server makes the case even worse from a security viewpoint. Claims that they “didn’t know” such information was highly classified do not hold water and are irrelevant. It strains belief that anybody with clearances didn’t recognize that NSA information, which is loaded with classification markings, was signals intelligence, or SIGINT. It’s possible that the classified information found in Clinton’s email trove wasn’t marked as such. But if that classification notice was omitted, it wasn’t the U.S. intelligence community that took such markings away. Moreover, anybody holding security clearances has already assumed the responsibility for handling it properly.

Now it’s reported that Hillary’s original private server used to handle the classified information, which was turned over to a Colorado company in 2013, was in storage in New Jersey but contains no data, via WaPo:

The e-mail server used by Hillary Rodham Clinton when she served as secretary of state was turned over to the FBI late Wednesday afternoon from a private data center in New Jersey, according to an attorney familiar with the transfer….

Before it was taken to the data center in New Jersey, the server had been in the basement of the Clintons’ private home in Chappaqua, N.Y., during the time she was secretary of state, according to people familiar with the Clintons’ e-mail network.

After she left government service in early 2013, the Clintons decided to upgrade the system, hiring Platte River as the new manager of a privately managed e-mail network. The old server was removed from the Clinton home by Platte River and stored in a third party data center, which are set up to provide security from threats of hacking and natural disaster, Wells said.

Platte River Networks has retained control of the old server since it took over management of the Clintons’ e-mail system. She said that the old server “was blank,” and no longer contained useful data.

None of this makes sense.

Why would Hillary hide from the feds and refuse for months to turn over a server that was blank?

I noted at the time of Hillary’s UN press conference in March 2015 that Hillary’s email explanation is self-contradictory – here’s how:

The problem with Hillary Clinton’s explanation for her use of a personal email server and account for government business goes beyond the demonstrable falsehoods and suspicious nature of setting up such an arrangement.

Hillary explained that she turned over all work-related emails to the State Department, and “chose not to keep” (i.e., deleted) the personal emails on the server….

Thus, according to Hillary, the server now only has work related emails.

But Hillary says that she will not turn over the server to a neutral person for review, because the server has her personal emails on it.

But she already said the personal emails are not on it anymore.

Hillary’s explanation is self-contradictory.

Perhaps Hillary is worried that deleted personal emails could be recovered. That’s unlikely — Hillary’s technical advisers almost certainly used a safe delete (write-over) mechanism. In any event, that can be controlled for by having a neutral person, perhaps a retired judge, supervise the review process. But Hillary would not agree to that when asked at the press conference.

So Hillary says there are no personal emails on the server but she will not turn it over because there are personal emails on it.

Uh huh.

Now the server she was protecting from scrutiny is completely blank and has been so for almost two years?

As I mentioned in March, Hillary’s consciousness of guilt, Hillary has a pattern of volunteering information that seems designed to throw people off the trail of something.

If Hillary’s personal Yoga and family emails were deleted, it wasn’t from that original blank server, it was from someplace else, because the original server data was transferred in 2013.

Also, why would the Colorado company keep a server that was blank? And physically in New Jersey?

Why not destroy it completely? And why would Hillary refuse to turn over a blank server?

There must be a second server to which the data was transferred, possibly part of the Colorado company’s internal network.

This entire sequence of events raises serious questions as to possible illegal conduct, Official: Clinton ‘inner circle’ may have stripped email classification markings:

Hillary is hiding something. From day one I said that the Bigger Question was: Did Hillary use unsecured email for Classified Info?.

We know she did. Now we need to find out how extensive it was, and who at the State Department helped facilitate it. The answer may lie in Colorado, not in the blank server.

Has Hillary’s refusal for months to turn over the server served as a red herring?

A red herring is something that misleads or distracts from a relevant or important issue….

The origin of the expression is not known. Conventional wisdom has long supposed it to be the use of a kipper (a strong-smelling smoked fish) to train hounds to follow a scent, or to divert them from the correct route when hunting; however, modern linguistic research suggests that the term was probably invented in 1807 by English polemicist William Cobbett, referring to one occasion on which he had supposedly used a kipper to divert hounds from chasing a hare, and was never an actual practice of hunters. The phrase was later borrowed to provide a formal name for the logical fallacy and literary device.

DONATE

Donations tax deductible
to the full extent allowed by law.

Comments

I cannot imagine how the Secretary of State’s email, with or without attachments, would NOT be considered highly confidential.

I do no understand how it is possible for the Secretary of State of the United States of America to operate without relying on secret information. Even the blandest of general discussion on the ordinary topics of State Department business would rely on secret information. Even the timing of comments would have intelligence value.

Why don’t we just ask the NSA for her emails? What’s the point of collecting all that data unless you’re going to use it?

    Ragspierre in reply to windbag. | August 13, 2015 at 12:09 pm

    The Chinese probably have a better catalog and retrieval system…

      JimMtnViewCaUSA in reply to Ragspierre. | August 13, 2015 at 12:30 pm

      Rags is on-point. Not only are her policy positions and personal ethics awful, if she has a job with power she is vulnerable to blackmail.

      What will be her choice: betray the US, or do anything to avoid exposure by the Russians/Chinese? To ask the question is to answer it.

        Midwest Rhino in reply to JimMtnViewCaUSA. | August 13, 2015 at 2:03 pm

        yeah, that is a huge issue. And it is not just foreign entities, anyone in the loop can now hold her for ransom. And the same goes for all her dirty foundation quid pro quos. The only people that would be under attack by a President Hillary would be honest people that tried to blow the whistle, that might interfere with the DC cabal’s global expansion.

        Not A Member of Any Organized Political in reply to JimMtnViewCaUSA. | August 13, 2015 at 3:46 pm

        Maybe Madame SHillary has already been Blackmailed into giving nuclear bomb raw materials to Iran.

      no shit… the log files would be very telling. Also they should be going for the networking HW and going through those files and configs.

      JackRussellTerrierist in reply to Ragspierre. | August 13, 2015 at 11:53 pm

      Well, now, that’s what I’ve said several times. All of it could be stored on a flash drive or two no bigger than a fortune cookie.

      What I wish is that Vlad or the ChiComs would just come out and say, “Yeah, we got your stuff. We got everything we want. Sux for you.”

    JackRussellTerrierist in reply to windbag. | August 13, 2015 at 4:01 pm

    How do we know the server from the company from CO is really Hillary’s? because THEY said so? Because Hillary said so? Somebody, perhaps Judicial Watch, should research this CO company down to its shoelaces to see how else they’re connected to the Clintons. One might have to sort through the tentacles of a corporate hydra, but eventually you get there.

      Is this the person we want to entrust with the launch codes? Where might she store them?

        JackRussellTerrierist in reply to windbag. | August 13, 2015 at 11:46 pm

        Golly, that’s a good question. Where might she store those codes? In her yoga gear bag? A pocket of one of her pantsuits? Maybe the side flap of her handbag? Her cookie jar? Perhaps they could just be taped to the Thighmaster she never uses? A shoe box? Her underwear drawer?

I’m surprised the professor hasn’t impressed upon the readers that Hillary was a trial attorney who knows a thing or two about destroying incriminating evidence.

Isn’t Hillary’s history of duplicitous behavior (starting from her time as defense attorney for a child rapists to Travel Gate) ample material for a meme-able infographic?

Re: Valerie – It’s also impossible to suggest that a former FLOTUS for 8 years doesn’t know how to handle highly classified/secret information. Not to mention, a U.S. Senator for 6 years that served on:
◾Committee on Armed Services (2003-2009)
•Subcommittee on Airland
•Subcommittee on Emerging Threats and Capabilities
•Subcommittee on Readiness and Management Support

It’s beyond comprehension that one that worked daily around such sensitive info has not been fully briefed and trained on recognizing such info even if it’s not labeled properly by others, the proper handling of such info no matter how it’s labeled, and the consequences of handling such info improperly.

You say “red-herring”, I say …

It was Mrs. Hillary Eschewer, the sinister and political senator, with the lead pipe in the study.

Did I win?

If I were Vlad Putin, I’d be on the phone with Hillary. I’d tell her that I have a choice selection of emails from that server. I’d tell her that unless I get what I want for Mother Russia, those emails will be leaked to the western press in the most damaging way possible.

If Hillary says that I’m bluffing, I laugh and ask her to dare me. I’d especially do this if I was bluffing.

She won’t dare him. She’ll fold.

If I were the Chinese premier, I’d do the same thing for the same reason.

They could own the next President.

    buffalo in reply to stevewhitemd. | August 13, 2015 at 1:08 pm

    Ha. Who says they don’t already own the one we have? Oh, right. Iran owns him. But still, they prob’ly already own her. I can see Vlad now: “D’oh!!! Vy didn’t you fools tyell me that she vud be zuch a tyerrible kandidate!!!”

    Ragspierre in reply to stevewhitemd. | August 13, 2015 at 1:16 pm

    Your comment led my creative imagination to think of Hellary cooing to some Russian pol that she could be more flexible.

    Now I can’t see…

This is just getting started and is going to begin unraveling with incredible speed. Email servers are going to reveal not just security issues, but also influence peddling and all the rest of the Clinton crime family activities. The Clinton underlings are being pressed into self-preservation mode without any hope of political protection. Continued loyalty to HRC is not going to have an appreciable upside. Aside from possibly contributing to a few legal defense funds the Clintons simply do not have the political stroke to protect these people. The Clinton coattails are long gone.

The best Hillary can hope for is a deal with the White House to retire from public life quietly in exchange for a series of endlessly embarrassing investigations that eventually conclude in a terminal lack of interest. At this point the Obama folks own Hillary Clinton completely and her value to them as a successor is nil. She has to decide just how much battle damage she’s willing to take before surrendering.

What’s Patrick Fitzgerald up to these days?

Appears to be a clear case of “spoliation of evidence” to me.

I am betting it was Huma who stripped the Top Secret classifications off the emails.

For gov or mil hosting in the cloud or by any third party… hard drives do not leave the facility- they are smashed and destroyed via shredder.

There is a million security access issues that need to be nailed down… they aren’t even asking the right questions.

I am hoping for an October surprize with emails showing:

1) She received and rejected our Ambassador’s requests for security.

2) She created the lie about video protesters.

3) She sold SoS favors in exchange for $$.

4) Her contempt for Tyrant Obama the Liar and how she betrayed him.

5) Her affair with Huma.

All courtesy of one of the USA’s allies and friends.

    ConradCA in reply to ConradCA. | August 13, 2015 at 2:54 pm

    If she destroyed the hard drive to make sure the “personal” emails couldn’t be recovered would that indicate that she had violated the law and was attempting to hide the evidence? Sorta like those who free a crime scene are showing evidence of a guilty mind.

      Eskyman in reply to ConradCA. | August 14, 2015 at 4:23 am

      Wouldn’t it be delicious- if some of those emails were between Barry in the WH and Hitlery, detailing their plan to blame Benghazi on some video?- or even better, proving they had a plan to trade Ambassador Stevens for the Blind Sheik? (Which may actually be the truth!)

      Moar popcorn! I’m loving this show!

      I’d just love a happy ending, with both traitors in their orange jumpsuits, waiting for the blindfolds to be fitted… just before the long drop…

      Hey, I can dream. 😉

Just out of curiosity, is there any evidence whatsoever that the server that was turned over to that Colorado company and that has now been turned over to the feds, was actually the email server Hillary used?

Is there any evidence that the one server is the only one that Hillary used? (Personally, if I had my own in-house email domain, I would want a second server as a backup, as well as a third to hold backups from the other two, and probably another server to handle virus scanning, spam filtering and assorted admin)

Is there any evidence that Hillary kept no materials from that server on some other server or in some more accessible form? (For blackmail purposes or to augment her list of potential contributors, for example)?

Has there been a peep anywhere about the FBI looking for these other servers or other sources of data? (If the answer is no, then the appearance of a whitewash is hard to escape)

FBI in general is pretty secretive about what they do in investigations.