Secret Companies with Secret Objectives Near You

Is the nation’s largest online retailer part of a spy network? Have you given thought to the countless databases, harvesting data, human behavior, and all the interactions you have through the internet? Is Amazon now part of a larger incubation center for the federal government? You decide.

 Amazon network

Why Amazon’s Data Centers Are Hidden in US Spy Country

DefenseOne: Of all the places where Amazon operates data centers, northern Virginia is one of the most significant, in part because it’s where AWS first set up shop in 2006. It seemed appropriate that this vision quest to see The Cloud across America which began at the ostensible birthplace of the Internet should end at the place that’s often to blame when large parts of the U.S. Internet dies.

Northern Virginia is a pretty convenient place to start a cloud-services business: for reasons we’ll get into later, it’s a central region for Internet backbone. For the notoriously economical and utilitarian Amazon, this meant that it could quickly set up shop with minimal overhead in the area, leasing or buying older data centers rather than building new ones from scratch.

The ease with which AWS was able to get off the ground by leasing colocation space in northern Virginia in 2006 is the same reason that US-East is the most fragile molecule of the AWS cloud: it’s old, and it’s running on old equipment in old buildings.

Or, that’s what one might conclude from spending a day driving around looking for and at these data centers. When I contacted AWS to ask specific questions about the data-center region, how they ended up there, and the process of deciding between building data centers from scratch versus leasing existing ones, they declined to comment.

The fact that northern Virginia is home to major intelligence operations and to major nodes of network infrastructure isn’t exactly a sign of government conspiracy so much as a confluence of histories (best documented by Paul Ceruzzi in his criminally under-read history Internet Alley: High Technology In Tysons Corner, 1945-2005). To explain why a region surrounded mostly by farmland and a scattering of American Civil War monuments is a central point of Internet infrastructure, we have to go back to where a lot of significant moments in Internet history take place: the Cold War.

Postwar suburbanization and the expansion of transportation networks are occasionally overlooked, but weirdly crucial facets of the military-industrial complex. While suburbs were largely marketed to the public via barely concealed racism and the appeal of manicured “natural” landscapes, suburban sprawl’s dispersal of populations also meant increased likelihood of survival in the case of nuclear attack. Highways both facilitated suburbs and supported the movement of ground troops across the continental United States, should they need to defend it (lest we forget that the legislation that funded much of the U.S. highway system was called the National Interstate and Defense Highways Act of 1956).

Unlike Google and Facebook, AWS doesn’t aggressively brand or call attention to their data centers. They absolutely don’t give tours, and their website offers only rough approximations of the locations of their data centers, which are divided into “regions.” Within a region lies at minimum two “availability zones” and within the availability zones there are a handful of data centers.

I knew I wasn’t going to be able to find the entirety of AWS’ northern Virginia footprint, but I could probably find bits and pieces of it. My itinerary was a slightly haphazard one, based on looking for anything tied to Vadata, Inc., Amazon’s subsidiary company for all things data-center-oriented.

Facebook data-center

Google’s web crawlers don’t particularly care about AWS’ preference of staying below the radar, and searching for Vadata, Inc. sometimes pulls up addresses that probably first appeared on some deeply buried municipal paperwork and were added to Google Maps by a robot. It’s also not too hard to go straight to those original municipal documents with addresses and other cool information, like fines from utility companies and documentation of tax arrangements made specifically for AWS. (Pro tip for the rookie data-center mapper: if you’re looking for the data centers of other major companies, Foursquare check-ins are also a surprisingly rich resource). My weird hack research methods returned a handful of Vadata addresses scattered throughout the area: Ashburn, Sterling, Haymarket, Manassas, Chantilly. Much more of the report is here.

 Amazon’s Cloud center

CNBC: Palantir is notorious for its secrecy, and for good reason. Its software allows customers to make sense of massive amounts of sensitive data to enable fraud detection, data security, rapid health care delivery and catastrophe response.

Government agencies are big buyers of the technology. The FBI, CIA, Department of Defense and IRS have all been customers. Between 30 and 50 percent of Palantir’s business is tied to the public sector, according to people familiar with its finances. In-Q-Tel, the CIA’s venture arm, was an early investor.

Annual revenue topped $1.5 billion in 2015, sources say, meaning Palantir is bigger than top publicly traded cloud software companies like Workday and ServiceNow. It has about 1,800 employees and is growing headcount 30 percent annually, said the sources, who asked not to be named because the numbers are private.

Palantir serves up free meals for employees at 542 High Street, home to its cafeteria. A red sign reading “Private Company Meal” is attached to the window, and a neon blue sign on the inside says “Hobbit House.”

Other perks, according to people with knowledge of the company’s policies, include subsidized housing for employees who live in the neighborhood and help with monthly commuter Caltrain passes for those traveling down from San Francisco or up from San Jose. Employees who drive in get complimentary parking permits.

“They’re making a commitment here,” said Cannon.

“The idea is that it’s physically locked down and there’s no way you can take information out.” -Avivah Litan, Gartner analyst

For Palantir to stay, it has no choice but to spread out. Only one building in downtown Palo Alto even tops 100,000 square feet, and last year city officials limited total annual development in the commercial districts to 50,000 square feet.

There’s another benefit to having a disparate campus. In doing highly classified work for government agencies, some contracts require the use of particular types of units called Sensitive Compartmented Information Facilities, or SCIFs.

Avivah Litan, a cybersecurity analyst with Gartner, says qualities of a SCIF building include advanced biometrics for security, walls that are impenetrable by radio waves and heavily protected storage of both physical items and digital data.

“They have to make the walls so that no signals can be transmitted out of those walls,” said Litan, who is based in Washington, D.C. “The idea is that it’s physically locked down and there’s no way you can take information out.”

Having entirely separate facilities makes it easier to clear that hurdle, but even so, the vast majority of Palantir’s offices aren’t SCIFs. Read the full summary here.

Facts of the Guzman Re-Capture, Warning Graphic

Sean Penn is gonna make a movie? He used a Mexican actress as the go-between? Signals intelligence and cell (burn) phone tracking? Yes all of those but much more.

The region where el Chapo Guzman lives is well protected by all other residents in the area, they are on the Guzman payroll. We have known for years his location, at issue was crafting a well organized and well trained military style operation to re-capture him. There is some chatter that finally too, Mexico will extradite Guzman to the United States, but that could take at least a year. What is worse, Guzman was not taken to another prison with higher security but rather back to the very prison from which he escaped. What????

So, what role did the United States play in this recent capture of Guzman? A BIG one.

JSOC’s Secretive Delta Force Operators on the Ground for El Chapo Capture

Delta Force Operators on the Ground for El Chapo Capture

Murphy/SofRep: Mexico’s most notorious drug lord, Joaquín Guzmán Loera, better known as El Chapo, was recaptured following an intense firefight between Mexican Marines and Chapo’s goons in Sinaloa, Mexico, last Friday. Although Mexican officials claimed that the entire operation to recapture El Chapo after he escaped from prison for the second time was planned and executed by Mexico, multiple sources report to SOFREP that American law enforcement officers and JSOC operators were involved in the mission.

The operation, dubbed “Black Swan” by the Mexican government, was actually targeting Chapo’s lead sicario (assassin) but came across the cartel leader by chance. The Mexican Marines stormed the house, and in the ensuing firefight five cartel gunmen were killed and six were injured. One Marine was also injured. During the firefight, Chapo escaped through a series of tunnels and then tried to flee in a stolen vehicle. Federal agents caught sight of him and arrested him on the spot. According to one account, the arresting agents had not even been aware of the larger mission being carried out in the area by Mexican Marines. Arresting Chapo was simply a chance encounter, a stroke of good luck.

Rumors of American special operations personnel roaming around the badlands of Mexico have been floating around for well over a decade at this point, but the idea of bearded, ball cap- and Oakley-wearing American soldiers south of the border has been more fiction than fact. JSOC maintained a small analysis cell in Mexico, but the Mexican government has been extremely wary of an American military presence on the ground. Much of this has to do with fears of neocolonialism, as well as Latin American machismo—insecurity over the fact that Mexico cannot manage its own internal affairs.

chaporaid2

(Pics of the recent raid that resulted in the capture of El Chapo)

While America’s so-called “war on drugs” is perhaps at an all-time low socially and politically, with our focus on the Middle East, the capture of El Chapo is still a tactical win for the United States, even if it only gets us incrementally closer to securing the rule of law in Mexico.

In the lead for the capture were the Mexican Marines, who are the go-to preferred force for counter-drug cartel operations in a country where public officials are often hopelessly corrupt. It is interesting to see how, around 2006 or 2007, the Mexican Marines suddenly became very effective at direct-action (DA) raids. Such raids were responsible for capturing and killing high-value targets (HVTs), causing speculation that the Marines were receiving a little help from their North American neighbors. America has also leveraged its significant signals intelligence (SIGINT) capabilities to help the Mexican authorities track down drug cartel leaders.

chaporaid1

(Another Chapo goon killed in the raid that resulted in his capture)

In regards to the latest El Chapo capture, SOFREP has been told that it was actually the U.S. Marshals who had an important role in tracking down the drug lord. Also on the ground was the U.S. Army’s elite counterterrorism unit, Delta Force. Operators from Delta served as tactical advisors but did not directly participate in the operation.

This type of arrangement is hardly unprecedented, as Delta also worked in the shadows during the search for, and eventual killing of, Pablo Escabar in Colombia. They’ve also served in advisory capacities during hostage-rescue missions in places as diverse as Sudan and Peru. Delta Force has also remained behind the scenes in the capture of other HVTs, from Manuel Noriega in Panama during the 1989 invasion, to the killing of Uday and Qusay Hussein in Iraq in 2003. Also worth noting is the unit’s role in tracking down and arresting Bosnian war criminals in the 1990s.

Although Delta had some level of involvement in the operation, their presence is probably less interesting than many would assume.  Law enforcement agencies often request the presence of Delta operators as advisors to sensitive operations.  These operators are often there putting in face time to appease the request of a federal agency, but may have little if any actual participation in the planning and execution of events.  Such was the case when Delta was asked to consult on the Waco stand-off between the ATF, FBI, and the Branch Davidians in 1993.  Law enforcement agencies are said to regard the presence of a JSOC operator as a sort of lucky talisman.

The good news is that it is now unlikely that Chapo will be escaping from prison a third time as the Mexican government is signaling that he will be extradited to the United States to face prosecution.  When the black Chinook comes for Chapo, we will know that he will finally face the justice that he has long evaded.

 

 

 

 

SERCO, Unknown but Really Known….

Serco U.S. political donations found here. This is the exact type of company where spies…spy.

Further reading, Serco’s 2014 financial results and strategy review.

By Zerohedge: Serco. Chances are you’ve never heard of the company. If you have heard of the company, chances are you misunderstand the shear enormity of the global company and their contracts.

From transport to air traffic control, getting your license in Canada, to running all 7 immigration detention centers in Australia, private prisons in the UK, military base presence, running nuclear arsenals, and running all state schools in Bradford, Serco, somewhere, has played a part in moving, educating, or detaining people.

serco

New contracts awarded to Serco include a Saudi Railway Company, further air traffic control in the US and also IT support services for various European agencies. You can read more on their future projects below.

 

Serco HY15 Results SEA 11 August 2015

 

A Very Brief History

Serco’s history began in 1929 as a UK subsidiary, RCA Services Limited to support the cinema industry.

In the 1960s the company made a leap into military contracts to maintain the UK Air Force base Ballistic Missile Early Warning System. From there, the company continues to grow.

Now trading as Serco Group, 2015 trading as of August 11 2015, maintained a revenue of £3.5 billion, and an underlying trading profit of £90 million. The data was presented at JPMorgan in London.

In 2013 Serco was considered a potential risk, and became a representation of the dangers of outsourcing. The U.K. government developed contingency plans in case Serco went bankrupt. When the concerns came to light, Serco faced bans (along with G4S, another outsourcing contractor) from further bidding on new U.K. government work for six months. It wasn’t until Rupert Soames OBE – Sir Winston Churchill’s grandson – took on the job as Serco’s Chief Executive in 2014, that Serco turned a new corner of profit growth.

Serco Today

Serco today is one of the biggest global companies to exist. They have contracts with:

Alliant – the vehicle for IT services across the Federal IT market;

 

National Security Personnel System (NSPS) – For “(NSPS) training and facilitating services throughout the Department of Defense (DoD) and agencies that needs NSPS training and implementation services;”

 

Seaport – The NAVSEA SEAPORT Multiple Award contract focuses on “engineering, technical, and programmatic support services for the Warfare Centers.” This is inclusive of Homeland Security and Force Protection, Strategic Weapons Systems, and multiple warfare systems.

 

CIP-SP3 Services and Solutions (Cost $20 Billion, expiration date 2022) – biomedical-related IT services with the National Institutes of Health (NIH) with the main objective focused on Biomedical Research and Health Sciences extending to information systems throughout the federal government. Also implementation in several key areas of Biomedical Sciences including legislation and critical infrastructure protection.

The few contracts listed above are among the vast array of transport, detention center and private prison contracts.

Serco, the biggest company you’ve never heard of…..

 

Yes!, the FBI’s Successful Child Porn Sting

FBI hacks world’s largest child porn site, 1,300 arrested

The ‘unprecedented’ sting op saw 1,300 people arrested.

The site, known as ‘Playpen’, launched in August 2014 and allowed users to sign up and upload images, primarily for “the advertisement and distribution of child pronagraphy”. This websites isn’t like an adult pornography website as it’s on the dark web, adult pornography websites such as fulltube you can find simply by searching in your normal browser but sites like Playpen you need to access the dark web first.

Within a month of Playpen’s launch, the website had garnered nearly 60,000 members. By 2015 that number had jumped to almost 215,000, with 11,000 unique users visiting the site each week, and a total of 117,000 posts.

READ MORE: Hundreds of US military children sexually abused annually – report

Many of those posts contained some of the most extreme child abuse images one could imagine, according to FBI testimony seen byMotherboard.

Although the website also included advice on how users could avoid online detection, a sting operation began in February 2015 when the FBI hacked into the website’s server, but decided not to shut it down.

The bureau took the ‘unprecedented’ measure of running Playpen to spy on its users and hack their IP addresses, leading to the arrests.

READ MORE: Busted: US expat arrested in Peru for allegedly running child sex ring

According to Motherboard, a public defender for one of the accused called the operation an “extraordinary expansion of government surveillance and its use of illegal search methods on a massive scale.”

*** The Dark Web and the FBI

Motherboard: While it looks like several of those already charged will plead guilty to online child pornography crimes, one defense team has made the extraordinary step of arguing to have their client’s case thrown out completely. Their main argument is that the FBI, in briefly running the child pornography site from its own servers in Virginia, itself distributed an “untold” amount of illegal material.

“There is no law enforcement exemption, or statutory exemption for the distribution of child pornography,” Colin Fieman, one of the federal public defenders filing the motion to dismiss the indictment, claimed in a phone interview earlier this week. Jay Michaud, a Vancouver teacher arrested in July 2015, is also being represented by Linda Sullivan.

“THE GOVERNMENT’S OPERATION OF THE WORLD’S LARGEST ‘HIDDEN SERVER’ CHILD PORNOGRAPHY SITE AND ITS GLOBAL DISTRIBUTION OF UNTOLD NUMBERS OF PICTURES AND VIDEOS IS OUTRAGEOUS CONDUCT THAT SHOULD RESULT IN DISMISSAL OF THE INDICTMENT,” a court filing dated November 20, 2015 reads.

Fieman and Sullivan reason that if the methods of the investigation that supposedly identified his client “cannot be reconciled with fundamental expectations of decency and fairness,” then the indictment should be dismissed.

A section of the filing, which outlines the defense lawyers’ argument.

In February 2015, the FBI seized the server of “Playpen,” which court documents described as “the largest remaining known child pornography hidden service in the world.” Instead of shutting the site down straight away, however, the FBI moved Playpen to a government controlled server in Virginia, and deployed a network investigative technique (NIT)—the agency’s term for a hacking tool—in an attempt to identify people logging into the site. This NIT, according to other court documents, collected approximately “1300 true internet protocol (IP) addresses” between February 20 and March 4.

In their argument, Fieman and Sullivan point to the Department of Justice’s own view on the harm caused by the proliferation of child pornography. “Once an image is on the Internet, it is irretrievable and can continue to circulate forever,” the Department of Justice website reads. In an April 2015 press release, US Attorney Josh J. Minkler said that “Producing and distributing child pornography re-victimizes our children every time it is passed from one person to another.”

In essence, the lawyers’ point is that the FBI was, by running Playpen from its own servers, essentially distributing child pornography.

So, according to their argument, it is unclear how the “Government can possibly justify the massive distribution of child pornography that it accomplished in this case.”

They then posit that, rather than taking over the site to deploy a bulk hacking technique, and allowing the site to continue to distribute child pornography material in the process, the FBI could have posted individual links to malware-laden files on the site without running it from their own servers. Or, after seizing the site, the agency could have redirected users to a spoofed version of it, minus the child pornography material.

“We are in a protracted street fight with the Department of Justice and the FBI”

Instead, the FBI “continued to distribute thousands of illicit pictures and videos to thousands of visitors,” the filing states. It compares the case to “Operation Fast and Furious”: Between 2009 and 2011, law enforcement agents infamously proliferated illegal weapons in an attempt to trace them to Mexican drug cartels. Some of the weapons, however, ended up being used in the murder of a US Border Patrol agent.

The Department of Justice did not reply to repeated requests for comment. The FBI did not respond to a request for comment in time for publication, but a spokesperson previously told Motherboard, “We are not able to comment on ongoing investigations, or describe the use of specific investigative techniques.”

This argument to dismiss the indictment is just one of the more recent phases of a heated legal back-and-forth between Michaud’s lawyers and the government. Since October, dozens of documents have been filed in the case, including motions to seal documents, affidavits, modifications to protective orders, and delays to responses.

“We are in a protracted street fight with the Department of Justice and the FBI,” Fieman told Motherboard.

Some of the issues circle around evidence: the defense argues that its client has not had access to important discovery information. It has had some success on that front though: on December 10, the Government wrote that the defense counsel will be provided with the computer code of the NIT under a protective order. The defense is also expected to receive a detailed list of the number of child pornography materials on Playpen while it was being run from an FBI server.

The government’s response to the motion to dismiss the indictment is currently sealed. It’s unclear how the government has replied to the lawyer’s arguments, but this move to have the indictment against a suspected online child pornographer totally scraped is a surprising and dramatic turn in a case that continues to grow in scope.

 

11 20 2015 Motion to Dismiss Indictment

Sid and Hillary’s Personal Spy Network, ServerGate

There are only a handful of results of the FBI investigation into Hillary. 1. The DoJ’s Loretta Lynch will give Hillary as pass if there is a criminal referral. 2. Barack Obama will give Hillary full protection under ‘Executive Privilege’ under the excuse of national security. 3. There will be a full blown revolt by the whole intelligence community. 4. Leaks will come out forcing a criminal referral of Hillary Clinton and we could see a Bernie Sanders/Elizabeth Warren ticket.

Read more here on the FBI’s closely held Hillary investigation.

Hillary’s EmailGate Goes Nuclear

Does the latest release of Hillary’s State Department emails include highly classified U.S. intelligence?

Schlinder: Back in October I told you that Hillary Clinton’s email troubles were anything but over, and that the scandal over her misuse of communications while she was Secretary of State was sure to get worse. Sure enough, EmailGate continues to be a thorn in the side of Hillary’s presidential campaign and may have just entered a new, potentially explosive phase with grave ramifications, both political and legal.

The latest court-ordered dump of her email, just placed online by the State Department, brings more troubles for Team Hillary. This release of over 3,000 pages includes 66 “Unclassified” messages that the State Department subsequently determined actually were classified; however, all but one of those 66 were deemed Confidential, the lowest classification level, while one was found to be Secret, bringing the total of Secret messages discovered so far to seven. In all, 1,340 Hillary emails at State have been reassessed as classified.

Screen Shot 2016-01-09 at 5.06.46 PM

There are gems here. It’s hard to miss the irony of Hillary expressing surprise about a State Department staffer using personal email for work, which the Secretary of State noted in her own personal email. More consequential was Hillary’s ordering a staffer to send classified talking points for a coming meeting via a non-secure fax machine, stripped of their classification markings. This appears to be a clear violation of Federal law and the sort of thing that is a career-ender, or worse, for normals. The chairman of the Senate Judiciary Committee termed that July 2011 incident “disturbing,” and so it is to anyone acquainted with U.S. Government laws and regulations regarding the handling of classified material.

Screen Shot 2016-01-09 at 5.10.07 PM

Part 1

But the biggest problem may be in a just-released email that has gotten little attention here, but plenty on the other side of the world. An email to Hillary from a close Clinton confidant late on June 8, 2011 about Sudan turns out to have explosive material in it. This message includes a detailed intelligence report from Sid Blumenthal, Hillary’s close friend, confidant, and factotum, who regularly supplied her with information from his private intelligence service. His usual source was Tyler Drumheller, a former CIA senior official and veteran spy-gadfly, who conveniently died just before EmailGate became a serious problem for Hillary’s campaign.

Screen Shot 2016-01-09 at 5.11.03 PM

Part 2

However, the uncredited June 8 memo, which Mr. Blumenthal labeled as “Confidential” – his personal classification system, apparently – but which the State Department has labeled Unclassified, doesn’t appear to be from Drumheller, whose assessments were written just like CIA intelligence reports. This is not.

Screen Shot 2016-01-09 at 5.11.57 PM

Part 3

Remarkably, the report emailed to Hillary by “sbwhoeop,” which was Mr. Blumenthal’s email handle, explains how Sudan’s government devised a clandestine plan, in coordination with two rebel generals, to secure control of oil reserves in the disputed region of Abyei. This is juicy, front-page stuff, straight out of an action movie, about a region of Africa that’s of high interest to the American and many other governments, and the report is astonishingly detailed.

Screen Shot 2016-01-09 at 5.12.59 PM

Part 4

Its information comes from a high-ranking source with direct access to Sudan’s top military and intelligence officials, and Mr. Blumenthal’s write-up repeatedly states the sources – there turn out to be more than one – are well-placed and credible, with excellent access. It’s the usual spytalk boilerplate when you want the reader to understand this is golden information, not just gossip or rumors circulating on the street, what professionals dismiss as “RUMINT.” Needless to add, this is generating a lot of talk in Sudan, where the media is asking about this shady affair – and how Sid Blumenthal, who’s not exactly an old Africa hand, knew all about it.

Screen Shot 2016-01-09 at 5.13.46 PM

Part 5

But the most interesting part is that the report describes a conversation “in confidence” that happened on the evening of June 7, just one day before Mr. Blumenthal sent the report to Secretary Clinton. It beggars the imagination to think that Sid’s private intelligence operation, which was just a handful of people, had operators who were well placed in Sudan, with top-level spy access, able to get this secret information, place it in a decently written assessment with proper espionage verbiage, and pass it all back to Washington, DC, inside 24 hours. That would be a feat even for the CIA, which has stations and officers all over Africa.

In fact, the June 8, 2011 Blumenthal report doesn’t read like CIA material at all, in other words human intelligence or HUMINT, but very much like signals intelligence or SIGINT. (For the differences see here). I know what SIGINT reports look like, because I used to write them for the National Security Agency, America’s biggest source of intelligence. SIGINT reports, which I’ve read thousands of, have a very distinct style and flavor to them and Blumenthal’s write-up matches it, right down to the “Source Comments,” which smack very much of NSA reporting and its “house rules.”

But is this an NSA assessment? If so, it would have to be classified at least Secret/Sensitive Compartmented Information, a handling caveat that applies to most SIGINT, and quite possibly Top Secret/SCI, the highest normal classification we have. In that case, it was about as far from Unclassified as it’s possible for an email to be.

No surprise, NSA is aflutter this weekend over this strange matter. One Agency official expressed to me “at least 90 percent confidence” that Mr. Blumenthal’s June 8 report was derived from NSA reports, and the Agency ought to be investigating the matter right now.

There are many questions here. How did Sid Blumenthal, who had no position in the U.S. Government in 2011, and hasn’t since Bill Clinton left the White House fifteen years ago, possibly get his hands on such highly classified NSA reporting? Why did he place it an open, non-secure email to Hillary, who after all had plenty of legitimate access, as Secretary of State, to intelligence assessments from all our spy agencies? Moreover, how did the State Department think this was Unclassified and why did it release it to the public?

It’s possible this Blumenthal report did not come from NSA, but perhaps from another, non-American intelligence agency – but whose? If Sid was really able to get top-level intelligence like this for Hillary, using just his shoestring operation, and get it into her hands a day later, with precise information about the high-level conspiracy that was just discussed over in Sudan, the Intelligence Community needs to get him on our payroll stat. He’s a pro at the spy business.

*******

Hillary Clinton was battered with questions by CBS host John Dickerson on Sunday about new revelations from her private email server.

Appearing on Face The Nation, Clinton was asked about ordering an aide to send information through “nonsecure” channels and her hypocritical surprise that another State Department employee was not using a government account at the time.

The Free Beacon reported:

In the June 2011 email exchange, Jake Sullivan, then-Secretary Clinton’s deputy chief of staff, discussed forthcoming “TPs,” appearing to refer to talking points, that Clinton was waiting to receive.

“They say they’ve had issues sending secure fax. They’re working on it,” Sullivan wrote of the forthcoming information in an email dated June 17, 2011.

“If they can’t, turn it into nonpaper [with] no identifying heading and send nonsecure,” Clinton wrote Sullivan in response the same day.

“Aren’t you ordering him to violate the laws on handling classified material there?” Dickerson asked.

“No, not all, and as the State Department said just this week, that did not happen, and it never would have happened, because that’s just not the way I treated classified information,” Clinton said. “Headings are not classification notices, and so, oftentimes, we are trying to get the best information we can, and obviously what I’m asking for is whatever can be transmitted, if it doesn’t come through secure, to be transmitted on the unclassified systems. So, no, there is nothing to that, like so much else has been talked about in the last year.”

Dickerson said the email was “striking” because it suggested she knew how to get around restrictions for sending classified information.

“You’re saying there was never an instance, any other instance, in which you did that?” Dickerson asked.

“No, and it wasn’t sent,” Clinton said. “This is another instance where what is common practice, namely, I need information. I had some points I had to make, and I was waiting for a secure fax that could get me the whole picture, but oftentimes there’s a lot of information that isn’t at all classified, so whatever information can be appropriately transmitted, unclassified, often was. That’s true for every agency in the government and everybody who does business with the government.”

Clinton said the “important point” was she had “great confidence“ she wasn’t in breach of government regulations on classification.

“In fact, as the State Department has said, there was no transmission of any classified information, so it’s another effort by people looking for something to throw against the wall … to see what sticks, but there’s no ‘there’ there,” she said.

Dickerson wasn’t finished, though, pointing to a 2011 email showing Clinton expressing surprise that another State Department staffer wasn’t using a government account, even while she was flouting rules by using a private email to do business.

That was “what you were doing,” Dickerson said, so “why was that a surprise to you?”

“Well, I emailed two people on their government accounts, because I knew that all of that would be part of the government system, and indeed, the vast majority of all my emails are in the government systems, so that’s how I conducted the business,” she said. “I was very clear about emailing anything having to do with business to people on their government accounts.”

In other words, Clinton did not answer the question about her fairly blatant hypocrisy.