Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

For 3 months Hillary Clinton’s email access was unencrypted, vulnerable to spies
Fortune.com ^ | 3-11-2015 | Robert Hackett

Posted on 03/17/2015 11:24:49 AM PDT by servo1969

On Tuesday, former United States Secretary of State Hillary Clinton made her first extensive comments addressing her use of a personal email address and private email server while in office, saying that she did not use them to communicate anything confidential but that she wishes she had used a government-issued email address instead. She also sought the “convenience” of a single device.

Venafi, a Salt Lake City computer security firm, has conducted an analysis of clintonemail.com and determined that “for the first three months of Secretary Clinton’s term, access to the server was not encrypted or authenticated with a digital certificate.” In other words: For three months, Clinton’s server lay vulnerable to snooping, hacking, and spoofing.

“Without a certificate you have no assurances that a website you’re attached to or an email server you go to is the one you’re actually going to,” said Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. “There could easily be a ‘man in the middle’ who could easily intercept communications because they’re not being encrypted.”

(Excerpt) Read more at fortune.com ...


TOPICS: Business/Economy; Crime/Corruption; Government; Politics/Elections
KEYWORDS: hillary; hillaryemailgate; miraclewhip; nationalsecurity; server; washedupoldhag
Navigation: use the links below to view more comments.
first 1-2021 next last

1 posted on 03/17/2015 11:24:49 AM PDT by servo1969
[ Post Reply | Private Reply | View Replies]

To: servo1969

Ask Hillary to define ‘hacker’ and stand there amazed that she can’t do it. She’s part of the crowd with no understanding of email, modern technology, or the problems associated with the internet.


2 posted on 03/17/2015 11:28:32 AM PDT by pepsionice
[ Post Reply | Private Reply | To 1 | View Replies]

To: servo1969

Yeahbut the Secret Service is guarding it.


3 posted on 03/17/2015 11:31:00 AM PDT by Ray76 (Obama says, "Unlike my mum, Ruth has all the documents needed to prove who Mark's father was.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: servo1969

Related thread here:

http://freerepublic.com/focus/f-news/3268817/posts

Not that any of the faithful followers demanding her run for the office of POTUS will ever believe she ever did anything wrong.


4 posted on 03/17/2015 11:35:21 AM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
[ Post Reply | Private Reply | To 1 | View Replies]

To: servo1969

You can be sure Hillary did not sign form. And the server is not protected from hackers. And we will never see a working server, you can be sure of that. The communists Democrat machine has been working on America’s defeat for many years and finally have destroyed much of the Country.


5 posted on 03/17/2015 11:39:52 AM PDT by Logical me
[ Post Reply | Private Reply | To 1 | View Replies]

To: servo1969

I can’t believe that there’s already four replies but I’m the first person to ask what difference at this point does it make?


6 posted on 03/17/2015 11:40:35 AM PDT by Junk Silver
[ Post Reply | Private Reply | To 1 | View Replies]

To: pepsionice

so from January 21, 2009 - April 21, 2009

- Israel completes its withdrawal from the Gaza Strip
- The President of Guinea-Bissau is assassinated
- The Taliban releases a video of Polish geologist being beheaded.
- A Russian and an American satellite collide over Siberia
- Gunmen attack a bus carrying Sri Lankan cricketers in Lahore, Pakistan, killing eight people
- The President of Madagascar is overthrown in a coup d’état
- Albania and Croatia are admitted to NATO
- North Korea launches a rocket
- Cargo ship MV Maersk Alabama is captured by Somali pirates
- A political crisis begins in Fiji when President Josefa Iloilo suspends the nation’s Constitution
- Thirty-four heads of state and government meet in Port of Spain, Trinidad for the 5th Summit of the Americas.
- NATO expels two Russian diplomats from NATO headquarters in Brussels over a spy scandal in Estonia


7 posted on 03/17/2015 11:47:44 AM PDT by kidd
[ Post Reply | Private Reply | To 2 | View Replies]

To: servo1969
I imagine Condi Rice's and Colin Powell's emails were unencrypted for three months too so it's okay. With this 60s hippy crowd running the District of Corruption, TWO WRONGS DO make a right!
8 posted on 03/17/2015 11:54:46 AM PDT by FlingWingFlyer (Hillary 2016! Because we don't have anybody else! - The DNC donors)
[ Post Reply | Private Reply | To 1 | View Replies]

To: servo1969
hillary checking to ensure security....




9 posted on 03/17/2015 11:57:21 AM PDT by MeshugeMikey ("Never, Never, Never, Give Up," Winston Churchill ><>)
[ Post Reply | Private Reply | To 1 | View Replies]

To: servo1969

“Is this the party to whom I am speaking?” - Lily Tomlin as Ernestine, SNL

https://voicegal.wordpress.com/2010/09/19/is-this-the-party-to-whom-i-am-speaking/

From Voicegal’s blog...

“Nowadays, corporations are all too sensitive to the fact that astute measures must be taken to ascertain that the person on the line really *is* the person who should be listening to their automated message or outbound IVR — especially when it comes to sensitive, confidential matters such as debt collection, medical issues, school district issues, insurance companies and legal firm matters — areas in which consumers have the expectation of certain measures of privacy.”

She should have consulted for the clueless Dept of State under HDRC.


10 posted on 03/17/2015 12:21:28 PM PDT by muffaletaman (IMNSHO - I MIGHT be wrong, but I doubt it.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pepsionice

Of course, technology is for the little people to take car of. The queen can’t be bothered with details.


11 posted on 03/17/2015 12:37:55 PM PDT by JimSEA
[ Post Reply | Private Reply | To 2 | View Replies]

To: servo1969
According to a public log provided by the State Department’s office of the historian, Clinton had visited countries and places such as Japan, Indonesia, South Korea, China, Egypt, Israel, the Palestinian Authority, Belgium, Switzerland, Turkey and Mexico.

Fortunately none of those countries have any significant security challenges...

Who in the world set this thing up? Was this literally the first email server they'd ever built?

12 posted on 03/17/2015 12:50:13 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies]

To: servo1969

The Chinese were in there about five minutes after it came on line.

In fact, I will be the Chinese called them up to help walk through the settings.

The rest of the world is laughing at us.


13 posted on 03/17/2015 12:59:13 PM PDT by Vermont Lt (When you are inclined to to buy storage boxes, but contractor bags instead.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pepsionice

BS she new exactly what she was doing.

She’s an attorney and attorney’s always believe they can commit the perfect crime.

She and the jug eared clown were creating “plausible deniability”.


14 posted on 03/17/2015 1:31:42 PM PDT by IMR 4350
[ Post Reply | Private Reply | To 2 | View Replies]

To: servo1969

what happened to the story,
that the Hillary-email, for a time,
was using a commercial spam-filter service,
and that this service could read everything?

maybe it was a joke or something


15 posted on 03/17/2015 1:55:59 PM PDT by RockyTx
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

Clinton Server on route to Arkansas junk Yard


16 posted on 03/17/2015 4:21:00 PM PDT by Chauncey Uppercrust
[ Post Reply | Private Reply | To 15 | View Replies]

To: servo1969

17 posted on 03/17/2015 4:44:05 PM PDT by Paid_Russian_Troll
[ Post Reply | Private Reply | To 1 | View Replies]

To: servo1969

Any day now I expect some mis-administration talking head to claim that, taking into consideration all previous security breaches by the administration since 2009, clinton’s was relatively minor.


18 posted on 03/18/2015 12:35:05 AM PDT by clearcarbon
[ Post Reply | Private Reply | To 1 | View Replies]

To: All
At her UN presser last Tuesday, Hillary said she did not use her private server located in her home on Chappaqua to communicate anything confidential.......and that she did not send classified information over the unsecured server.

==========================================================

WHAT DID HILLARY DO WITH CLASSIFIED INFORMATION?

REFERENCE EXCERPT The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic.[1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001.

It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.[2]

The U.S. government specifies in some detail the procedures for protecting classified information. The rooms or buildings where classified material is stored or handled must have a facility clearance at the same level as the most sensitive material to be handled. Good quality commercial physical security standards generally suffice for lower levels of classification; at the highest levels, people sometimes have to work in rooms designed like bank vaults (see Sensitive Compartmented Information Facility - SCIF).

Classified U.S. government documents are typically required to be stamped with their classification on the cover and at the top and bottom of each page. It is often a requirement that each paragraph, title and caption in a document be marked with the highest level of information it contains, usually by placing appropriate initials in parentheses at the beginning of the paragraph, title, or caption.

It is common to require that a brightly colored cover sheet be affixed to the cover of each classified document to prevent observation of a possibly classified title by someone unauthorized (shoulder surfing) and to remind users to lock up the document when it is unattended. The most sensitive material requires two-person integrity, where two cleared individuals are responsible for the material at all times. Approved containers for such material have two separate combination locks, both of which must be opened to access the contents.[citation needed]

There are restrictions on how classified documents can be shipped. Top Secret material must go by special courier. Secret material can be sent within the U.S. via registered mail, and Confidential material by certified mail.

Electronic transmission of classified information largely requires the use of National Security Agency approved/certified "Type 1" cryptosystems utilizing NSA's unpublished and classified Suite A algorithms.

The classification of the Suite A algorithms categorizes the hardware that store them as a Controlled Cryptographic Item(CCI) under the International Traffic in Arms Regulations, or ITAR. CCI equipment and keying material must be controlled and stored with heightened physical security, even when the device is not processing classified information or contain a cryptographic key.

NSA is currently moving towards implementing what it's calling Suite B which is a group of commercial algorithms such as Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA), Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic curve Diffie–Hellman (ECDH). Suite B provides protection for data up to Top Secret on non-CCI devices. This is especially useful in high risk environments or operations needed to prevent Suite A compromise. These less stringent hardware requirements stem from the device not having to "protect" classified Suite A algorithms.[34]

Specialized computer operating systems known as trusted operating systems are available for processing classified information. These enforce the classification and labeling rules described above in software. However, as of 2005, they are not considered secure enough to allow uncleared users to share computers with classified activities. So if one creates an unclassified document on a secret device, the resultant data is classified secret until it can be manually reviewed. Computer networks for sharing classified information are segregated by the highest sensitivity level they are allowed to transmit, for example, SIPRNet (Secret) and JWICS (Top Secret-SCI).

The destruction of certain types of classified documents requires burning, shredding, pulping or pulverizing using approved procedures and must be witnessed and logged.

Classified computer data presents special problems.--snip-- (http://en.wikipedia.org/wiki/Classified_information_in_the_United_States)

======================================================

REFERENCE EXCERPT The Office of Inspector General (OIG) in response to the FY 1999 Intelligence Authorization Act, required the OIG to ". . . conduct a review of State Department Headquarters policies and procedures for handling classified information, and submit a report to the appropriate committees of Congress with any needed recommendations for improvements ...." Congress requested the audit as a result of several reported instances where highly classified information was unaccounted for.--SNIP--

19 posted on 03/18/2015 4:53:38 AM PDT by Liz
[ Post Reply | Private Reply | To 18 | View Replies]

To: Liz

——WHAT DID HILLARY DO WITH CLASSIFIED INFORMATION?——

She declassified it. If she sent it, it was by her definition unclassified


20 posted on 03/18/2015 5:02:18 AM PDT by bert ((K.E.; N.P.; GOPc.;+12, 73, ..... Obama is public enemy #1)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson