What is the significance of “Email Traffic being compromised, rather than the server hacked”? Here is a speculative answer:
That sounds to me like they have discerned that data sent from Hillary’s Blackberry and/or iPad devices was being intercepted by someone before it ever got to her home brew server. The important thing is that her server wasn’t the weak point. The weak link was the Blackberry, and it’s user. That should not surprise anyone.
IIRC, some if not all of Hillary’s many Blackberry devices were NOT specially secure devices. She asked for one of Presidential timber and was turned down. Hillary was warned that Blackberry’s were susceptible to having the signal intercepted if used outside of secure settings, such as special areas at her office. She reportedly ignored this routinely, even using a Blackberry device in Russia to correspond with Obama.
The distinction you have focused upon is potentially the key to showing Clinton’s contempt for data security rules clearly laid out for her. Her crime was not “gross negligence” — it was deliberate misconduct.
On one hand, we understand completely it was deliberate misconduct, and was likely done for two main reasons: First, she wished to avoid communications that could be obtained for scrutiny via a Freedom of Information Act request. Secondly, she was lazy and arrogant, and didn't think she should be subject to the rigors of security the way the rest of us are.
But on a different level, we all knew she felt this way: Reading Gary Aldrich's excellent book "Unlimited Access" where he described in excruciating detail the attitude the Clintons and their associates had about security, from absolute top to absolute bottom, was abysmal to the point of traitorous.
They WANTED to flout security, and they WANTED security to fail. Security was part of "The Man".
Exactly, and if they (White Hats) had figured out the routing algorithms being used to shunt copies of traffic to alternate addresses (Cisco Routers, F7 algorithm) to hide it and create a sort of private network then we are in RICO territory, big time
Depends on link encryption. The traffic to and from is trivial to intercept and it is likely that 100% of her traffic was intercepted at every foreign hotel she stayed at. But whether the eavesdropper can do anything depends on link encryption. I'm pretty sure the blackberry used HTTPS to interact with the mail server. I'm not 100% sure, but I'll look for a reference.