{"id":110857,"date":"2017-11-30T13:15:00","date_gmt":"2017-11-30T13:15:00","guid":{"rendered":""},"modified":"2023-01-08T11:04:42","modified_gmt":"2023-01-08T11:04:42","slug":"you-read-it-here-first","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/11\/30\/you-read-it-here-first\/","title":{"rendered":"You Read it Here First"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><h3 class=\"post-title entry-title\" itemprop=\"name\"><\/h3>\n<div class=\"post-header\"> <\/div>\n<p>It remains one of the unanswered questions of Hillary Clinton&#8217;s e-mail  scandal: how did classified information make its way onto messages  stored and transmitted by her &#8220;home brew system. <\/p>\n<p>Now, federal investigators are working to confirm a theory that we first identified months ago.&nbsp; From today&#8217;s edition of the <a href=\"http:\/\/nypost.com\/2016\/01\/24\/hillarys-team-copied-intel-off-top-secret-server-to-email\/\"><i>New York Post<\/i><\/a>:<\/p>\n<p><span style=\"font-size: xx-small;\">The FBI is investigating whether members of Hillary  Clinton\u2019s inner circle \u201ccut and pasted\u201d material from the government\u2019s  classified network so that it could be sent to her private e-mail  address, former State Department security officials say.<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><\/span><span style=\"font-size: xx-small;\">Clinton and her top aides had access to a Pentagon-run  classified network that goes up to the Secret level, as well as a  separate system used for Top Secret communications.<\/span><\/p>\n<p><span style=\"font-size: xx-small;\">The two systems \u2014 the Secret Internet Protocol Router Network  (SIPRNet) and Joint Worldwide Intelligence Communications System (JWICS)  \u2014 are not connected to the unclassified system, known as the  Non-Classified Internet Protocol Router Network (NIPRNet). You cannot  e-mail from one system to the other, though you can use NIPRNet to send  \u00ade-mails outside the government.<\/span><br \/><span style=\"font-size: xx-small;\"><\/span><br \/><span style=\"font-size: xx-small;\">Somehow, highly classified information from SIPRNet, as well as even  the super-secure JWICS, jumped from those closed systems to the open  system and turned up in at least 1,340 of Clinton\u2019s home e-mails \u2014  including several the CIA earlier this month flagged as containing  ultra-secret Sensitive Compartmented Information and Special Access  Programs, a subset of SCI.<\/span><\/p>\n<p><span style=\"font-size: xx-small;\">[snip]<\/span><\/p>\n<p><span style=\"font-size: xx-small;\">[Raymond Fournier, a former Diplomatic  Security Service special agent told the Post] it\u2019s clear from some of  the classified e-mails made public  that someone on Clinton\u2019s staff essentially \u201ccut and pasted\u201d content  from classified cables into the messages sent to her. The classified  markings are gone, but the content is classified at the highest levels \u2014  and so sensitive in nature that \u201cit would have been obvious to  Clinton.\u201d Most likely the information was, in turn, e-mailed to her via  NIPRNet.<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><\/span><span style=\"font-size: xx-small;\">To work around the closed, classified systems, which are accessible  only by secure desktop workstations whose hard drives must be removed  and stored overnight in a safe, Clinton\u2019s staff would have simply  retyped classified information from the systems into the non-classified  system or taken a screen shot of the classified document, Fournier said.  \u201cEither way, it\u2019s totally illegal.\u201d<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">We first <a href=\"http:\/\/formerspook.blogspot.com\/2015\/09\/how-and-why.html\">advanced the same theory on 28 September of last year<\/a>: <\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span><span>&#8220;&#8230;the  FBI is reportedly focusing on how classified information wound up on  Hillary&#8217;s private e-mail network.&nbsp; We&#8217;re guessing the bureau already  knows the answer to that one; files were either uploaded to the system,  or various users of the system simply copied sensitive data from reports  into their e-mails, minus the classification markings.&nbsp;&nbsp;<\/span><\/span><\/p>\n<p><span><span>We&#8217;ve  long favored that latter scenario, for two reasons.&nbsp; First, the  classified data almost certainly originated on networks set up to handle  that type of information, specifically SIPRNET (for secret-level  information) and JWICS, for material at the TS\/SCI level.&nbsp; In the wake  of the Manning and Snowden scandals, the government has made it  extremely difficult to upload or download files from those systems.&nbsp; In  many cases, moving a document from SIPRNET to JWICS requires the  assistance of a network administrator and must be approved in advance. &nbsp;<\/span><\/span><\/p>\n<p><span><span>On the  other hand, it would be very easy for Mrs. Clinton (or a member of her  cabal) to simply look at a classified report and then summarize the  important findings in an e-mail, created and disseminated on the  private, unsecure network.&nbsp; Ask anyone who has held a clearance and  worked with classified data and they will tell you: such practices are  unpardonable sins, deserving of prosecution and punishment to the full  letter of the law.&nbsp; The fact that the former SecState (and her senior  aides) held clearances for years&#8211;and deliberately chose to place  classified information on an open network&#8211;gives you some idea of the  contempt they hold for the nation&#8217;s secrets and our laws.<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span><span><span style=\"font-size: x-small;\">Obviously,  it wasn&#8217;t very hard for the FBI to figure it out.&nbsp; The Bureau utilizes  the same systems outlined above and their IT specialists, security  personnel and investigators are very familiar with how they work&#8211;and  the difficulty in transferring files from SIPRNET or JWICS to a private,  unsecure system.&nbsp;&nbsp;<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span><span><span style=\"font-size: x-small;\">We&#8217;ve  long believed that the bureau has been focusing on who originated the  various classified e-mails, and comparing those messages to the  original, classified traffic that appeared on the secure networks.&nbsp;  Determining the State Department staffer who created the message should  be fairly easy; determining where the information came from probably  takes a bit longer, since the classified sections of e-mails sent to  Mrs. Clinton are likely paraphrased from the original source document. &nbsp;<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span><span><span style=\"font-size: x-small;\">It  is also likely that FBI Director James Comey has instructed his agents  to build a detailed and compelling case, understanding the difficulties  that may arise in persuading the Justice Department to actually indict  HRC and her associates.&nbsp; <a href=\"http:\/\/www.nationalreview.com\/article\/430211\/hillary-clinton-email-fbi-department-justice-obama\">As Andrew McCarthy details at <i>National Review<\/i><\/a>,  the bureau is facing a major obstacle in its probe of Mrs. Clinton and  her e-mail system.&nbsp; So far, the Justice Department has not appointed  prosecutors to work with agents in building the case, and it has not  impaneled a grand jury to hear evidence and hand down potential  indictments.&nbsp; Until the DOJ becomes fully engaged, the investigation  really isn&#8217;t an investigation. &nbsp;<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span><span><span style=\"font-size: x-small;\">Mr.  Comey, a veteran Washington hand with an impressive resume as a  government lawyer, fully understands this.&nbsp; And that may explain those  recent, damaging revelations about the discovery of Special Access  Program (SAP) information in Mrs. Clinton&#8217;s e-mails.&nbsp; SAP is a form of  classification typically used to protect exceptionally sensitive  intelligence sources and collection methods.&nbsp; The number of individuals  with access to such programs may be limited to just a handful, depending  on what is being shielded.&nbsp; In some cases, SAP may protect extremely  well-placed human intelligence (HUMINT) sources.&nbsp; Disclosure of such  information often results in the death of foreign nationals working for  our intelligence community. &nbsp;<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span><span><span style=\"font-size: x-small;\">Look  for more details about HRC&#8217;s e-mails in the weeks ahead.&nbsp; The FBI is  reminding the Obama Administration of the seriousness of this scandal,  and the role the DOJ must play in bringing offenders to justice.&nbsp;  Officials at the bureau are providing the outline of a bullet-proof case  and putting the onus for action on Attorney General Loretta Lynch.&nbsp; We  will soon know if Ms. Lynch is prepared to engage the DOJ, and later  this year, if she is willing to bring charges against Hillary Clinton  and her associates.&nbsp; If Lynch declines, we will see a series of  resignations that will make the &#8220;Saturday Night Massacre&#8221; look like a  church picnic.&nbsp; There would likely be an attempt to impeach Ms.  Lynch&#8211;all in the middle of a presidential campaign. &nbsp;<\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Pundits  are already describing the 2016 election cycle as &#8220;unusual,&#8221; given the  entry (and performance) of Donald Trump.&nbsp; But Trump&#8217;s ascendancy in the  GOP race may take a backseat to the case against Hillary Clinton, and a  potential constitutional crisis in the late summer or early fall.&nbsp;&nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Buckle your seat belts.&nbsp; It&#8217;s going to be a bumpy ride.&nbsp; <\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It remains one of the unanswered questions of Hillary Clinton&#8217;s e-mail scandal: how did classified information make its way onto messages stored and transmitted by her &#8220;home brew system. Now, federal investigators are working to confirm a theory that we first identified months ago.&nbsp; From today&#8217;s edition of the New York Post: The FBI is [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110857"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=110857"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110857\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=110857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=110857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=110857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}