Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI Admits Clinton Used Software Designed To "Prevent Recovery" And "Hide Traces Of" Deleted Emails
ZeroHedge ^ | August 25, 2016

Posted on 08/25/2016 2:32:14 PM PDT by Zakeet

South Carolina Representative Trey Gowdy appeared on Fox News today and disclosed new details about the Clinton email scandal that seem to indicate intent to destroy evidence. Per the clip below, Gowdy reveals that Clinton used "BleachBit" to erase the "personal" emails from her private server.

For those not familiar with the software, BleachBit is intended to help users delete files in a way to "prevent recovery" and "hide traces of files deleted." Per the BleachBit website:

Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster.

During his appearance on Fox, Gowdy clearly indicates that Clinton's use of BleachBit undermines her claims that she only deleted innocuous "personal" emails from her private server.

"If she considered them to be personal, then she and her lawyers had those emails deleted. They didn't just push the delete button, they had them deleted where even God can't read them.

"They were using something called BleachBit. You don't use BleachBit for yoga emails."

"When you're using BleachBit, it is something you really do not want the world to see."

Gowdy also questioned whether Hillary considered "Clinton Foundation" emails to be "personal" and, if not, asked why the FBI's investigation revealed minimal emails about Foundation-related topics.

Link to video in article Rep Gowdy Hillary Clinton is a 'habitual, serial liar' - Fox News

So Dear Reader, we leave it to you to decide whether - like FBI Director Comey - you see no "intent" to hide or obfuscate any of the deleted emails; or - like Rep. Gowdy - you see the facts as proving Hillary Clinton's intent to ensure no trace was left of these harmless emails about yoga routines or wedding plans.


TOPICS: Breaking News; Crime/Corruption; Government; News/Current Events; Politics/Elections
KEYWORDS: bananarepublic; clintonrico; comeyrico; coverup; emails; fbi; fbirico; hillary; hillarysemails; intent; nukes4iranrico; obamarico; scandal; software; soshillary; statedeptrico; treason; treasonrico
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140141-151 next last
To: Billthedrill

Why would it be hard to put it on her server? I don’t know how these things work?


121 posted on 08/25/2016 8:16:53 PM PDT by HollyB
[ Post Reply | Private Reply | To 36 | View Replies]

To: Zakeet

Please. Someone on her crack IT team will be blamed for this. Hillary never “touched” her server. It’s all someone else’s fault.


122 posted on 08/25/2016 8:34:41 PM PDT by Organic Panic (Hillary Clinton, the elderly woman's version of "I dindu nuffins.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: HollyB
Why would it be hard to put it on her server?

I was joking, (only maybe less than I thought). To put an application on a server like that requires administrative access. Somebody with that had to want it there. A hacker wouldn't bother - if he or she had administrative access there are FAR more interesting things to do than install a disk wiper.

This gets a bit technical, so forgive me. It was a Microsoft Exchange server, by all accounts. Deletion of individual emails doesn't actually involve file deletion - they're kept in a large database that is the mail store. If they're exported to a file for some reason, that's different. Mail administrators often do that to give the user a package of emails in a file, which remains on the server after it's copied to media that is given to the user. They'll do that to satisfy a subpoena, for example.

You'd use a wiper to delete those export files, if you needed to. Or, you can use this wiping software on the entire mail store, which is what I suspect happened. That's very naughty indeed. At that point all you have left is whatever emails you've already extracted and stored off for, say, a legal discovery process. If you didn't do that to all of them and you've wiped the mail store, you've covered your tracks very nicely. What the software they're describing actually does is delete files and write new bits over the old area, delete them, rewrite, delete, etc. It makes the original "fingerprint" impossible to recover...well, not impossible. Just very difficult and expensive, and you'd need somebody really good to do it. Which the FBI certainly has.

I hope that's not complete gibberish. There are other ways to recover email that entail access to outside routers and logs. Once it's sent, there are bits of it all over the Internet. Again, you'd have to have deep access and be very, very good to recover email that way. The NSA is very, very, very good.

123 posted on 08/25/2016 8:43:27 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 121 | View Replies]

To: Billthedrill

Thank you. That was really nice to take the time to explain this to me and whoever else wanted to understand. I also appreciate of you not making fun that I didn’t catch on to the joke/sarcasm. Blessings!


124 posted on 08/25/2016 9:01:53 PM PDT by HollyB
[ Post Reply | Private Reply | To 123 | View Replies]

To: Bullish
Those must be some really naughty Yoga positions.

Forget the BleachBit, now I need EYE BLEACH...!


125 posted on 08/25/2016 9:04:34 PM PDT by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: Chode
Just piling on, @Chode...


126 posted on 08/25/2016 9:12:10 PM PDT by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 61 | View Replies]

To: Bobalu

Excellent!


127 posted on 08/25/2016 9:33:33 PM PDT by Meet the New Boss
[ Post Reply | Private Reply | To 118 | View Replies]

To: Bullish
Those must be some really naughty Yoga positions.


128 posted on 08/25/2016 10:27:49 PM PDT by Stand Watch Listen ((NOT indicted all these YEARS, is perhaps Hillary's one accomplishment))
[ Post Reply | Private Reply | To 35 | View Replies]

To: Stand Watch Listen

You just broke my computer with my fist.


129 posted on 08/25/2016 10:42:05 PM PDT by Bullish (That establishment heads from both sides are exploding over Trump is the very best part.)
[ Post Reply | Private Reply | To 128 | View Replies]

To: All
We still don't know exactly what the IT guy got immunity for do we?
130 posted on 08/25/2016 11:12:33 PM PDT by az_gila
[ Post Reply | Private Reply | To 129 | View Replies]

To: CivilWarBrewing
Did the FBI ever get a search warrant on her residences and offices? I'll bet she has those files backed up on a thumb drive or some such. Possibly with one of her attorney's maybe.

Exactly. Comey mentioned that the lawyers wiped their laptops, but she gave the files to them on a thumb drive. Did they recover that from the lawyers offices or even ask them where it was ?

131 posted on 08/26/2016 2:01:37 AM PDT by TheCipher (Suppose you were an idiot and suppose you were a member of Congress. But I repeat myself. Mark Twain)
[ Post Reply | Private Reply | To 5 | View Replies]

To: grey_whiskers
LOLOLOL!!! 100%
132 posted on 08/26/2016 4:35:09 AM PDT by Chode (You Owe Them Nothing - Not Respect, Not Loyalty, Not Obedience, NOTHING!)
[ Post Reply | Private Reply | To 126 | View Replies]

To: proxy_user

Outlook uses .pst or .ost files in every environment I’ve seen.
https://support.office.com/en-us/article/Introduction-to-Outlook-Data-Files-pst-and-ost-6d4197ec-1304-4b81-a17d-66d4eef30b78


133 posted on 08/26/2016 5:01:00 AM PDT by jurroppi1 (The only thing you "pass to see what's in it" is a stool sample. h/t MrB)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Bullish

Karma Sutra (grin)


134 posted on 08/26/2016 6:38:42 AM PDT by MortMan (Let's call the push for amnesty what it is: Pedrophilia.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: Paine in the Neck
She made almost -no effort- to secure the server from hackers; almost like she was inviting certain parties to avail themselves of the contents.

I have wondered this often. It is so neglegent that it is an embarrassment to anyone who would be in I.T.

I am beginning to think it was deliberate so information could be sold but instead of a briefcase of money and microfilm its a donation to the Clinton Foundation and you receive an IP address to a insecure server that just happens to have the info you need.

Plausible deniability - seems to have worked so far.

The next link we need is the payouts to the super delegates and how that all worked.

  1. Scary Foriegn Donors
  2. Canadian Charity to Launder
  3. Clinton Foundation
  4. ???
  5. Super Delegates Re-election campaigns.

It was a foregone conclusion she had the supers delegates from the get go.

To me its pretty obvious how you make things happen - you pay money for it - just like anything else in life.

Money Makes it Happen

I can almost guarantee you she didn't leave that to chance.

135 posted on 08/26/2016 7:15:50 AM PDT by datricker (Its morning in America! Sorry Rush, Jim Robinson is the new mayor of Realville)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Billthedrill; HollyB

>
Why would it be hard to put it on her server?

I was joking, (only maybe less than I thought). To put an application on a server like that requires administrative access. Somebody with that had to want it there. A hacker wouldn’t bother - if he or she had administrative access there are FAR more interesting things to do than install a disk wiper.
>

Actually, it *should* be QUITE hard. In the ‘real world’, this would be a classified server and subject to the limitations thereof...no papers in\out of security, certainly no ‘unapproved’ apps installed on the server (let alone the documentation and sign-off required to even BEGIN that discussion).

IOW, it should have been almost IMPOSSIBLE to do what she did (or had done) w/out SOMEONE coming down on her\gang for those violations.


136 posted on 08/26/2016 7:22:54 AM PDT by i_robot73 ("A man chooses. A slave obeys." - Andrew Ryan)
[ Post Reply | Private Reply | To 123 | View Replies]

To: Zakeet

Intent much?


137 posted on 08/26/2016 7:24:23 AM PDT by Georgia Girl 2 (The only purpose of a pistol is to fight your way back to the rifle you should never have dropped)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Zakeet

Now, now, you know all she did was what every good housewife would do and that was to use bleach on that rag to wipe it clean.


138 posted on 08/26/2016 7:39:01 AM PDT by bgill (From the CDC site, "We don't know how people are infected with Ebola")
[ Post Reply | Private Reply | To 1 | View Replies]

To: i_robot73

Yep, only now we learn that the guy who did have administrative access may not even have had a security clearance at all. This just keeps getting better and better. Well, the FBI’s on it. That’s a relief...not...


139 posted on 08/26/2016 8:51:45 AM PDT by Billthedrill
[ Post Reply | Private Reply | To 136 | View Replies]

To: Zakeet

The head of BleachBit is supposed to be on Stuart Varney’s show on Fox Business Channel on Monday. Varney’s show starts at 6 a.m. Pacific and 9 a.m. east coast time. He covered it a bit today and they’re discussing it on Outnumbered on FNC now.


140 posted on 08/26/2016 9:15:11 AM PDT by Seattle Conservative (God Bless and protect our troops)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140141-151 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson