Posted on 03/10/2015 9:00:22 PM PDT by 2ndDivisionVet
Ive raised in prior posts (here and here) the issue of physical security of the clintonemail.com e-mal server, which is why were it was located and how it was set up matters. Last night, Mitch LaKind who has experience setting up secure military e-mail servers wrote me about the detailed issues surrounding Clintons approach. Ill let him speak for himself (emphasis mine, though):
As a former contractor to the Air Force, I personally managed the Microsoft Exchange servers that were installed at Thule Air Base. My experience with Microsoft Exchange goes back to 1997, when the earliest versions were just being introduced. . . . So, I have a bit of knowledge myself when it comes to email.
Anyway, the point I wanted to make, and perhaps if you feel that it is noteworthy you can share my info to those that can get it out into the public eye, is about the Network that the email server was running on.
The US govt, and more specifically the DoD and State Department run the NIPRNet (non-classified Network) and SIPRNet (classified Network up to SECRET). Having a server, regardless of location would have to be on a network that met the rating for which classified material would be traveling over it.
It would be impossible for the Secretary of State to be effective at her job if she didnt correspond about topics that had classified material. We dont have to argue about whether or not she was effective .
So, if for example Clinton only dealt with SECRET materials and they were sent or received in her email, all of the equipment (routers, switches, etc.) would have to be rated for that SIPRNet connection. Also, the space in which the equipment and servers and client computers resided in would also have to meet the specifications for SECRET material. This would include various forms of physical access to the space in the form of secure cards, biometrics, etc. No space rated for SECRET opens with a key from the local hardware store.
That being said, if the room and equipment was rated for SECRET, it would leave a huge paper trail as all the equipment and effort to make the space secure would require procurement and assignment of goods and services. This would mean that the federal government was not only aware of the remote server, but also complicit.
Even a NIPRNet connection would have similar logistics behind it, because of the very nature the connection would have been some type of point to point to the server.
The biggest issue I see here would be is if the server was connected to the public Internet and it resided in a non-DoD-approved space.
Yeah, Ill say. Other have been pointing this out, and Ive touched upon it, but Mitch really gets to the heart of a key issue: either the Clinton server room wherever that was was SECRET-level secure, and the government was involved in setting it up, or it wasnt, and that end of the communications link was at risk.
Neither answer looks good for HRC.
I’ve done IT at various levels and still do websites and database code. There are mannnny security issues beyond the ones mentioned above.
Who was Hillary’s IT guy? Did he have a security clearance? What software did he use and was it maintained and patched at all times? Why is clintonemail.com pingable even now? What hardware was used and how robust? Was there backup power? A failover server? Was the email database replicated? What was the backup media? What routers were used and what version? Was the upchain service provider secure? Has anyone checked for packet sniffers? Were the emails encrypted?
The list goes far beyond even this.
Maybe she procured equipment, goods and services through private sources?
Was it revealed this was in fact a fedgov supported installation?
According to domaintools.com, that server is located on Tortola, in the British Virgin Islands.
But, lest you get too excited, domaintools.com claims there are 1,187,342 websites at that address. Moreover, for $11,873, domaintools will sell you the full the list! LOL! E.g., try pinging wesi.com and see what IP it goes to.
Obviously, it's been reconfigured. The last thing the Hildebeest needs is a million hackers slowing down her Netflix while trying to hack into her server. Let Confluence Networks or whoever deal with that!
I like the way she suddenly bolted from the room as questions started to fly.
Maybe these guys were from an SS data security snoop squad or contractors. But it still begs the question, how could they not know what Clinton is doing? And what specific system of security was she using?
Meaningless trivia just for fun:
Englewood NJ [as opposed to CO] is the town that Libyan dictator Qadaffi attempted to stay at but was refused by the town mayor, etc, back in 2009.
you need to ping mail.clintonemail.com
that information is not old
I think he may be in error due to what I found.
Call the number yet?
See post 51.
I agree...
Your link states:
Which IP numbers does clintonemail.com use?
CLINTONEMAIL.COM
uses the IP number208.91.197.27
only which alsoWESTERNLAWN.COM
,SHANKHASSICKFARM.COM
,MAIL.USOPENSHOP.ORG
and more than a million other use.
And indeed WESTERNLAWN.COM resolves to 208.91.197.27, as does clintonemail.com.
Where the server now is, is irrelevant.
Obviously, it needs to be someplace other than where it used to be, or else the Clintons' Netflix would be negatively impacted by all the hacker traffic. DNS is reconfigurable.
Read post 51.
That's the point.
The old location would have been where the server really was, guarded by those Glock-bearing, navy-blue Surban-riding dudes, who might have wondered in retrospect why that hard drive was so active.
Nowadays, that box needs to be somewhere else, or else the hacker traffic to 15 Old House Ln, Chappaqua, NY 10514 would overwhelm and impinge on the Hildebeest's Netflix experience, in stark violation of Net Neutrality!
The physical security is irrelevant if the machine was on a network, public or private, and even with Level 1 encryption.
It's laughable I know.
Indeed.
If you look at some of the lib sites, these retards are actually asking "What's the big deal?"
So many retards out there who forgive a 'D' anything. After all, she's working for the good of the people, you know. It's not like she's an evil Republican or, God forbid, a right-wing conservative Tea Party'er!
The yoga bit is nothing...What she REALLY doesn’t want us to find out is that she read Fifty Shades of Grey.
Nice house for someone that was broke when they bought it.
Imagine what they would have if they had money.
Well, now, that's interesting.
A quick nmap reveals an open port 443 ...
Surfing there brings up a browser warning page about SSL security, something about the certificate claiming to be for mail.clintonemail.com but not being able to prove it (IOW, probably self-signed).
If I blow past the warning, I see the following login page:
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.