Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Clinton aides vow not to destroy emails
Politico ^ | August 12th, 2015 | By JOSH GERSTEIN

Posted on 08/12/2015 9:55:31 PM PDT by Mariner

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-93 last
To: Mariner

“The 2016 Republican hopeful [Bobby Jindal], one of several bashing the latest development in the email saga, said that Clinton is one email away from going to prison, adding that she should start taking advice from her pal Martha Stewart, who served time behind bars. ‘Orange really is the new black,’ he joked.”

http://www.cnn.com/2015/08/12/politics/republicans-clinton-emails-investigation/


81 posted on 08/13/2015 6:21:09 AM PDT by mlizzy (America needs no words from me to see how your decision in Roe/Wade has deformed a great nation. -MT)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mariner

Need to know more about this tech company in Colorado,did they have clearance to look at top secret material,do they have backups of Hillarys 30,000 she deleted?
Dud they donate to the Clinton foundation?
Did Hillary have any security on her server when she asked them to start taking care of it? She only went to this company AFTER she found out Sidney blumenthals emails were hacked,need to know what security she had besides the secret service standing outside the door.
With everything that’s out there on this scandal,can someone explain why someone in Hillarys inner circle would remove top secret markings from those two emails?Isn’t Hillary cleared to read such material,why would the markings be removed?
According to the law,it does not matter if there are markings anyway,as soon as the person reads it they know its not to be disseminated when they recognize it is at least confidential


82 posted on 08/13/2015 6:47:30 AM PDT by ballplayer (hvexx NKK c bmytit II iyijjhihhiyyiyiyi it iyiiy II i hi jiihi ty yhiiyihiijhijjyjiyjiiijyuiiijihyii)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Covenantor; CutePuppy; Aria; Mariner; Secret Agent Man; FredZarguna
wouldn’t the first step be establishing that the current hard drives are in fact the original and or logged replacement drives?

It is highly improbable that they are, or that there is any record of that, and it may be impossible to determine. If a third-party hosting service or services hosted her email on a "dedicated" server, as many claim to do, there is a very high probability that it was virtualized.

A virtual server on network attached storage [NAS] would not have used a hard-drive in the sense that you mean. The entire environment could have been imaged when clintonmail was moved [it is believed to have been moved at least once before it wound up at PRN, it may have also been imaged again when the move to PRN was made.] That means there could well be multiple copies of the clintonmail "server" in existence. It also means an unscrupulous operator [which clintonmail's second hosting service is rumored to be] could have copied virtual copies of the server and sold them.

Anyone from an owner, admin, developer, or even network technician in a lax environment might have had access to the clintonmail "server," might have made images, and those images could be sold to anyone in the world. And there would be no trace of such an operation. It's not even a hack: just getting your hands on the backup of a virtual machine image containing the "server" gives you everything. No IP addresses, no potential NSA logs of what happened.

Nothing. Only the seller and buyer would know the image was ever made.

And, a compressed virtual server image holding a relatively small operation like clintonmail could easily fit on removable media as small as 16 GB.

There is another aspect of this which makes no sense. The .pst files referred to by David Kendall are not server-side files. Those are Microsoft Outlook databases for personal email. Those .pst files were on somebody's desktop, and they could very easily have been tampered with. Any decent coder could put together a program to remove every email from, say, Giustra@UraniumOne in about an hour, and every thread of a conversation to particular recipients in an afternoon at the most.

That David Kendall has that material on removable media tells you that at least one person had access to the desktop -- the person who made the copy. And that person might well have created a very "special" copy before turning it over to the Clintons' lawyer.

83 posted on 08/13/2015 9:02:27 AM PDT by FredZarguna ( "I pulled the lever on the machine, but the Clark Bar didn't COME OUT!!!")
[ Post Reply | Private Reply | To 77 | View Replies]

To: FredZarguna

Got it.


84 posted on 08/13/2015 9:13:20 AM PDT by Mariner (War Criminal #18 - Be The Leaderless Resistance)
[ Post Reply | Private Reply | To 56 | View Replies]

To: FredZarguna

Thanks for the very lucid explanation.

So it’s pretty clear that there will be no media “SPECIAL REPORT - Hillary’s e-mails revealed” with its own theme music and graphics any time soon.


85 posted on 08/13/2015 9:19:19 AM PDT by Covenantor ("Men are ruled-...by liars who refuse them news, and by fools who cannot govern." Chesterton)
[ Post Reply | Private Reply | To 83 | View Replies]

To: FredZarguna
"It is highly improbable that they are, or that there is any record of that, and it may be impossible to determine."

But there are likely contracts in place indicating who can initiate change and workorders on behalf of the client. And, what services were purchased.

Whether in a shared virtual environment or a dedicated server, there's an admin trail.

Were back-up part of the contract, if so, what type?

Was a request received from the client's authorized agent to permanently delete all data/files? If so, who and what date?

Does Iron Mountain have the back-up tapes?

There's not a service provider in the country that would want to be in these guy's shoes right now.

86 posted on 08/13/2015 9:20:54 AM PDT by Mariner (War Criminal #18 - Be The Leaderless Resistance)
[ Post Reply | Private Reply | To 83 | View Replies]

To: Mariner
Clinton aides vow not to destroy emails

Hitler VOWS to stop the murder of Jews. /s

87 posted on 08/13/2015 9:31:49 AM PDT by VideoDoctor
[ Post Reply | Private Reply | To 1 | View Replies]

To: MNDude

Or will they give them over to Hildabeast or someone else so that they are no longer “in their possession” and will then be destroyed?


88 posted on 08/13/2015 9:36:33 AM PDT by rfreedom4u (Chris Stevens won't be running for president.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Mariner
Not necessarily, and that is the problem.

First, if an unscrupulous operator at JoesHosting.com decides to copy a client's server, it is certainly possible to do that with no record of it happening whatsoever. As we say in the life "Physical Access is Total Access."

I can go into any number of my client's machine rooms or desktops as soon as I drive over there, plug a 3TB USB 3.1 portable disk into their server racks, and steal anything I want, from any server I want, and their operation's staff will not even look twice a me, except maybe to talk about our gun collections or what the weather is like when I came in.

Why?

Because I am the admin. And there is no admin trail unless the admin wants there to be one.

Second, I can do anything I want with my own account at FredsFlybyNightHosting.net, including tell them I want an image of my server to set up a redundant backup or move to a new hosting provider. While that image is in my possession there is no limit to what I can do. And I can guarantee you that when I delete emails on my hosting service, the record of that is not kept for four years. Even for very complete hosting contracts that keep backups going back over years, at some point they are rolled off into less frequent intervals, meaning, the older any two archives are, the more likely it is that there are gaps in inserted and deleted materials that cannot be detected.

Consequently the claim implied by this rhetorical question is naive:

Was a request received from the client's authorized agent to permanently delete all data/files? If so, who and what date?

In many hosting environments there are no "requests" and there are no "authorized agents." The client has a supposedly "dedicated" [usually virtualized unless specifically contracted otherwise] machine that he is the sole administrator of. No one in the hosting service does any admin except on the hypervisor side, and they know little or nothing of what is being done on the equipment in their server farm.

Finally, there is always the claim of "inadvertent" destruction of material, which can only be used in the totality of a circumstantial case. So far, that excuse has worked very well for the IRS.

89 posted on 08/13/2015 9:59:15 AM PDT by FredZarguna ( "I pulled the lever on the machine, but the Clark Bar didn't COME OUT!!!")
[ Post Reply | Private Reply | To 86 | View Replies]

To: Covenantor
So it’s pretty clear that there will be no media “SPECIAL REPORT - Hillary’s e-mails revealed”

Actually, there might be.

And the reason is that there are different markets for this kind of material. Foreign intelligence services are not likely to reveal they have any of it -- that is part of the intelligence game. [Although at this point I would say it is a very safe assumption that every country North of Sub Saharan Africa has all of it.]

But aside from the market of people who will not reveal they have it, there are plenty of people who have a desire to reveal that have it. News organizations will and do pay for hacked material. Wikileaks also pays for this kind of stuff. And they have a reputation for leaking it at the most damaging time...

90 posted on 08/13/2015 10:06:54 AM PDT by FredZarguna ( "I pulled the lever on the machine, but the Clark Bar didn't COME OUT!!!")
[ Post Reply | Private Reply | To 85 | View Replies]

To: FredZarguna

Hope springs eternal

91 posted on 08/13/2015 10:17:32 AM PDT by Covenantor ("Men are ruled-...by liars who refuse them news, and by fools who cannot govern." Chesterton)
[ Post Reply | Private Reply | To 90 | View Replies]

To: Ann Archy
Those signs that said: "Karma: Not just a good idea--It's the law! were right after all.
92 posted on 08/13/2015 1:12:52 PM PDT by PhilDragoo (Hussein: Islamo-Commie from Fakistan)
[ Post Reply | Private Reply | To 68 | View Replies]

To: Former Proud Canadian

IIRC, Clinton and her staff made a narrow claim that the server was not used for State Depart business.

Therefore, in Clinton speak, the server was used for others purposes


93 posted on 08/13/2015 5:33:35 PM PDT by Steven Tyler
[ Post Reply | Private Reply | To 76 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-93 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson