Posted on 03/20/2015 4:51:58 PM PDT by afraidfortherepublic
It was less than two weeks ago that former Secretary of State Hillary Clinton assured the nation that her homebrew email server was safely secure in her home in Chappaqua, New York. She insisted that the hardware was fortified behind a locked door and had a Secret Service detail mentoring it night and day, as though the greatest security threat that system faced was via a physical attack by a team of cartoonish cat burglars.
Nevertheless, Clinton insisted that the safeguards around the email system she constructed out of convenience were effective and secure. She added that there were no security breaches, as though she would even be able to know that that definitively. Well, subsequent reports cast doubt on the level of security that system enjoyed, but other reporters have begun to poke holes in the claim that the physical location of Clintons server is in her New York home.
In a March 12 report by Fox News journalist James Rosen, proficient hackers were asked to probe the security protocols in place that protected Clintons server today. They found that the system was vulnerable to a variety of hacking methods. Moreover, they noted that the server did not appear to be located in Chappaqua.
Now, working with publicly available tools that map network connectivity, experts have established that the last hop before the mail servers Internet Protocol, or IP, address (listed as 64.94.172.146) is Internaps aggregator in Manhattan (listed as 216.52.95.10).Thats odd. Well, maybe the physical server had been moved in the days following the revelation that Clinton used a private email system. According to an Ars Technica investigation, however, Clintons email server was located in Alabama at one point while she served as Americas chief diplomat. Moreover, its substandard security left it vulnerable to a series of common hacking techniques.
This is a very strong indication that the clintonemail.com server is in Manhattan, the source told Fox News.
Clinton has probably changed her e-mail address since the scandal beganparticularly since the hdr22 account she used has been widely published and has likely become a magnet for all sorts of unwanted messages. And the hosted Exchange server is certainly an upgrade from her original server configurationUntil October of 2010, based on historic DNS records viewed by Ars, Clintons e-mail server was in fact at a static IP address provided by Optimum, a Cablevision subsidiary, that corresponded to the Clintons Chappaqua address. The domain was registered on January 13, 2009, just days before Clintons confirmation as secretary of statebut it did not gain a certificate for secure client connections until March. The current certificate for clintonemail.com was issued by GoDaddy in 2013 just as the original certificate was about to expire.The report suggests that it would not be all that difficult to brute-force guess Clintons email password and infiltrate the system. It defies logic to believe that a high value target like the secretary of states electronic communications were not probed by foreign intelligence services over the course of her tenure in the presidents Cabinet, and reports increasingly suggest that those agencies did not encounter many obstacles in their effort to compromise her communications.At some point shortly after the home server was dropped in 2010, the mail exchange record for clintonemail.com was moved to a hosted Exchange server running out of a data center in Huntsville, Alabama. The server uses McAfees MXLogic e-mail filtering service to screen for malware and spam (though its not certain when the service was added).
There are a couple of potential hazards posed by the Clintons hosted mail server. First, Outlook Web App is enabled, and that offers an avenue for attackers to attempt to brute-force their way into mail accounts by guessing passwords. Exchange server offers some policies to block these sorts of password attacks, but using them runs the risk of denying users access at allall someone has to do to basically shut down a users e-mail is enter bad passwords a few times to activate the lockout.
At the very least, Clintons insistence that her email server is located in Chappaqua is another indication of her pathological compulsion to willfully mislead the public on even the most banal details of her tenure at State. It is increasingly clear that Hillary Clinton is, as William Safire once observed, a congenital liar. Since Democrats seem disinclined to demand more of their partys standard-bearer, it will be up to voters to determine whether the American government will be led by a habitual prevaricator in 2017.
Their house lost electricity for several days, and they didn’t have a UPS (uninterruptible power supply).
Well, that was not very goot planning, was it?
LOLOLOL! Those are all great cartoons.
Lol, thanks. Looks like you got a bunch of them in a row!
[She insisted that the hardware was fortified behind a locked door and had a Secret Service detail mentoring it night and day...]
All that to hide yoga lessons, birthdays and other minor junk?
Smacks of desperation and fear.
Ask Gowdy. Then watch him run his mouth and do nothing.
Try very hard not to juxtapose Hitlery with the famous GoDaddy/Danica Patrick adds of a couple of years ago.
Try VERY hard.
Buried in Fort Marcy Park.
Thanks, potlatch...will rerun next Fri.
Right next to Obama’s birth certificate.
Look under Betty Currie’s bed.
Have they checked her closet? They should ask Bill, he may have seen it while trying on one of her pantsuits.
The meaning of "was." It's a Clinton specialty, isn't it? As of the time of the presser, that server had been installed in Bubba's office, but perhaps had not remained there. The use of "was" seems to indicate that its whereabouts changed.
Thank YOU pookie!
I prefer to than the gal who actually did the animation...
Thank you again, it’s nice when someone appreciates my ‘hours’ of work. ;)
==========================================================
WHAT DID HILLARY DO WITH CLASSIFIED INFORMATION?
REFERENCE/EXCERPT The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001.
It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.[2]
The U.S. government specifies in some detail the procedures for protecting classified information. The rooms or buildings where classified material is stored or handled must have a facility clearance at the same level as the most sensitive material to be handled. Good quality commercial physical security standards generally suffice for lower levels of classification; at the highest levels, people sometimes have to work in rooms designed like bank vaults (see Sensitive Compartmented Information Facility - SCIF).
Classified U.S. government documents are typically required to be stamped with their classification on the cover and at the top and bottom of each page. It is often a requirement that each paragraph, title and caption in a document be marked with the highest level of information it contains, usually by placing appropriate initials in parentheses at the beginning of the paragraph, title, or caption.
It is common to require that a brightly colored cover sheet be affixed to the cover of each classified document to prevent observation of a possibly classified title by someone unauthorized (shoulder surfing) and to remind users to lock up the document when it is unattended. The most sensitive material requires two-person integrity, where two cleared individuals are responsible for the material at all times. Approved containers for such material have two separate combination locks, both of which must be opened to access the contents.[citation needed]
There are restrictions on how classified documents can be shipped. Top Secret material must go by special courier. Secret material can be sent within the U.S. via registered mail, and Confidential material by certified mail.
Electronic transmission of classified information largely requires the use of National Security Agency approved/certified "Type 1" cryptosystems utilizing NSA's unpublished and classified Suite A algorithms.
The classification of the Suite A algorithms categorizes the hardware that store them as a Controlled Cryptographic Item(CCI) under the International Traffic in Arms Regulations, or ITAR. CCI equipment and keying material must be controlled and stored with heightened physical security, even when the device is not processing classified information or contain a cryptographic key.
NSA is currently moving towards implementing what it's calling Suite B which is a group of commercial algorithms such as Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA), Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic curve DiffieHellman (ECDH). Suite B provides protection for data up to Top Secret on non-CCI devices. This is especially useful in high risk environments or operations needed to prevent Suite A compromise. These less stringent hardware requirements stem from the device not having to "protect" classified Suite A algorithms.[34]
Specialized computer operating systems known as trusted operating systems are available for processing classified information. These enforce the classification and labeling rules described above in software. However, as of 2005, they are not considered secure enough to allow uncleared users to share computers with classified activities. So if one creates an unclassified document on a secret device, the resultant data is classified secret until it can be manually reviewed. Computer networks for sharing classified information are segregated by the highest sensitivity level they are allowed to transmit, for example, SIPRNet (Secret) and JWICS (Top Secret-SCI).
The destruction of certain types of classified documents requires burning, shredding, pulping or pulverizing using approved procedures and must be witnessed and logged.
Classified computer data presents special problems.--snip-- (http://en.wikipedia.org/wiki/Classified_information_in_the_United_States)
======================================================
REFERENCE EXCERPT The Office of Inspector General (OIG) in response to the FY 1999 Intelligence Authorization Act, required the OIG to ". . . conduct a review of State Department Headquarters policies and procedures for handling classified information, and submit a report to the appropriate committees of Congress with any needed recommendations for improvements ...." Congress requested the audit as a result of several reported instances where highly classified information was unaccounted for.--SNIP--
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.