Finally, Hillary’s Security Clearance in Jeopardy?

Humm –> Expect to undergo one or more interviews and often a polygraph as part of the clearance process. These steps are used by investigators to get a better understanding of your character, conduct and integrity. You might also have to answer questions designed to clear up discrepancies or clarify unfavorable data discovered during the background investigation. The ultimate goal is for government security personnel to determine your eligibility for a clearance, a decision based on the totality of the evidence and information collected.

August of last year: Intelligence community wants Clinton’s security clearance suspended

WashingtonTimes: Security experts say that if Hillary Rodham Clinton retained her government security clearance when she left the State Department, as is normal practice, it should be suspended now that it is known her unprotected private email server contained top secret material.

“Standard procedure is that when there is evidence of a security breach, the clearance of the individual is suspended in many, but not all, cases,” said retired Army Lt. Gen. William Boykin, who was deputy undersecretary of defense for intelligence in the George W. Bush administration. “This rises to the level of requiring a suspension.”

“The department does not comment on individuals’ security clearance status,” the official said.

Mrs. Clinton is the front-runner for the Democratic presidential nomination. A campaign spokesman did not reply to a query, but she did get a vote of support from a key congressional Democrat.

Sen. Dianne Feinstein, the top Democrat on the Senate intelligence committee, said Thursday there is no evidence Mrs. Clinton herself sent classified information and that the emails now under scrutiny were not marked classified at the time she sent them.

Clinton’s Security Clearance Is Under Scrutiny

Bloomberg: Now that several e-mails on Hillary Clinton’s private server have been classified, there is a more immediate question than the outcome of the investigation: Should the former secretary of state retain her security clearance during the inquiry? Congressional Republicans and Democrats offer predictably different answers.

The State Department announced Friday that it would not release 22 e-mails from Clinton’s private server after a review found they contained information designated as top secret. U.S. officials who reviewed the e-mails tell us they contain the names of U.S. intelligence officers overseas, but not the identities of undercover spies; summaries of sensitive meetings with foreign officials; and information on classified programs like drone strikes and intelligence-collection efforts in North Korea.

The FBI is investigating the use of Clinton’s home server when she was secretary of state, which the bureau now has. The New York Times reported in August that  Clinton is not a target of that investigation. We reported in September that one goal is to discover whether a foreign intelligence service hacked in.

 

Representative Adam Schiff, the ranking Democrat on the House Intelligence Committee, said Clinton should not lose her security clearance for receiving information that was not marked classified at the time. “I’m sure she does hold a clearance, and she should,” he told us.

Representative Mike Pompeo, a Republican member of that committee who also has read the e-mails, told us, “It’s important, given all the information we now know, that the House of Representatives work alongside the executive branch to determine whether it’s appropriate for Secretary Clinton to continue to hold her security clearances.”

Senate Intelligence Chairman Richard Burr told us the decision lies with the White House. “I think that’s up to what the National Security Council is comfortable with,” he said.

Burr, who has also read all 22 e-mails, said Clinton should have known to better protect the information they contain. “They are definitely sensitive,” he said. “Anybody in the intelligence world would know that the content was sensitive.”

His Democratic counterpart, Senator Dianne Feinstein, who also read them, told us that Clinton didn’t originally send any of the e-mails and that they were largely from her staff, although she did sometimes reply. Feinstein said the intelligence community is being overly cautious by designating the e-mails as top secret.

“There’s no question that they are over-classifying this stuff,” she said.

Clinton’s discussion of classified programs on an unclassified e-mail system is hardly rare. The issue, called “spillage,” has plagued the government for years. It can apply to anything from a spoken conversation about intelligence programs outside of a secure facility, to printing out a document with classified information on an unsecure printer.

Still, it is forbidden. The State Department’s Foreign Affairs Manual says “transmitting classified information over a communication channel that is unauthorized for the level of information being transmitted” is a “security violation.” Such violations must be investigated by the State Department’s own bureaus of human resources and diplomatic security. Punishment can vary from a letter of reprimand to loss of security clearance, according to the manual.

When asked about the status of Clinton’s security clearance, State Department spokesman John Kirby said: “The State Department does not comment on individuals’ security clearance status. We will say, however, that generally speaking there is a long tradition of secretaries of state making themselves available to future secretaries and presidents. Secretaries are typically allowed to maintain their security clearance and access to their own records for use in writing their memoirs and the like.”

The Clinton campaign declined to comment.

During the Obama administration, it has not been automatic for officials to lose their security clearance while an investigation is underway. Just last week, the Washington Post reported that the chief of naval intelligence, Vice Adm. Ted Branch, had his security clearance suspended because he is wrapped up in a Justice Department investigation into contracting corruption. He has not been able to read, see, or hear classified information since November 2013. Branch has not been charged with any crime and continues to serve in that post.

But when then-CIA director David Petraeus came under FBI investigation at the end of 2012, his security clearance was not formally revoked. After he resigned, his access to classified information was suspended, according to U.S. officials. In that case, Petraeus had provided notebooks with highly classified information to his biographer and mistress Paula Broadwell, whose security clearances did not permit her to receive it.

Unlike Broadwell, officials familiar with the e-mails tell us that Clinton and her e-mail correspondents were cleared to receive the information that has been classified after the fact. Steven Aftergood, who heads the project on government secrecy for the Federation of American Scientists, told us, “It’s entirely possible for information to start out as unclassified and to be classified only when the question of public disclosure arises.”

William Leonard, who oversaw the government’s security classification process between 2002 and 2008 as the director of the Information Security Oversight Office, told us this kind of “spillage” was common. “The bottom line is this, if you have the opportunity to pore through any cleared individual’s unclassified e-mail account, it’s almost inevitable you would find material that someone, some way would point out should be classified.” He also said that in Clinton’s case, “there is no indication that she deliberately disregarded the rules for handling classified information so I see no reason why she should not remain eligible for a security clearance.”

Nonetheless, Leonard added that Clinton’s decision to use the private e-mail server as secretary of state “reflected exceedingly poor judgment, and those that advised her on this did not serve her well.”

The FBI investigation may determine that neither Clinton nor her aides broke the law, but Clinton herself has said she used poor judgment. It’s an open question how that poor judgment will affect her access to state secrets, during and after the FBI’s investigation.

Epic Chinese Hacking is Forecasted

 

In 2015: Washington (CNN) A highly trained group of Chinese hackers is targeting defense, commercial and political organizations worldwide, pulling off sophisticated heists of sensitive information, according to new research out Wednesday.

Though Chinese cyberespionage has been well-documented, researchers from Dell SecureWorks Counter Threat Unit — a division of Dell tech company — say this group, nicknamed Emissary Panda by another research firm, has pulled off cyberattacks at a level of sophistication and specialization rarely seen before among Chinese hackers. More here.

Security Firm Warns of
New Chinese Cyber Attacks

FreeBeacon: China’s cyber attacks against U.S. government and private sector databases are part of a major intelligence-gathering operation and are likely to continue, according to a new report by a cyber security firm.

Chinese hackers stole health care data pertaining to some 80 million Americans last year, and the Office of Personnel Management cyber attacks netted sensitive records on 22 million federal workers, according to an annual threat report made public Wednesday by CrowdStrike, a cyber security and intelligence company. The company is widely consulted by both government and private sector organizations.

The gathering of personal data by the Chinese represents a new trend in Beijing’s aggressive cyber attacks.

“This targeting underscores that intrusion operations associated with nation-states pose a significant risk to all data, no matter how uninteresting it may seem,” the report said.

The 49-page “2015 Global Threat Report” also states that the U.S.-China agreement not to conduct commercial cyber theft has had little impact on Beijing’s cyber operations.

“Beneath the surface, however, China has not appeared to change its intentions where cyber is concerned,” the report said.

Any reduction in Chinese cyber attacks this year likely will be temporary, and an apparent reduction may result from the use of more clandestine methods for conducting attacks following a major military reorganization.

The military changes “will likely increase [China’s] reliance on its civilian intelligence agencies and associated contractors, all of which generally employ better tradecraft,” the report said.

“If observed campaigns in late 2015 were any indication, it is unlikely China will completely cease its cyber operations, and 2016 will show the new direction it is headed,” the report said.

More cyber attacks seeking personal data could take place in the future, and organizations that hold such data “should remain alert to the possibility of similar activity going into 2016,” the report said.

China’s cyber spies usually use cyber intrusions to steal strategic information, such as intellectual property, business operations data, and sensitive government documents.

Stolen personal data, on the other hand, “is typically used to facilitate identity theft or other types of financially motivated crimes,” the report said.

However, the compromised personal information from health insurance companies Anthem, Premera, and CareFirst last year could be used by the government or state-run companies.

The large data theft also appears to be part of Chinese efforts to “build out profiles on individuals to support future operations.”

The federal government data breaches were more damaging and included sensitive background investigation information on federal employees, the report said.

“Without doubt, access to this degree of [personally identifiable information] for both successful and unsuccessful applicants represents a treasure trove of information that may be exploited for counterintelligence purposes,” the report said.

The Chinese can now exploit millions of stolen records for intelligence operations.

“Knowledge acquired during these operations could be used to create more individualized, and therefore more effective, spear phishing campaigns, or also in more traditional, real-world espionage activity,” the report said, noting that the background investigation data “would be particularly useful to traditional [human intelligence] operations as it contains details of a very personal nature about current and former government employees, as well as private sector employees working on government contracts.”

The Chinese government, through the Ministry of Public Security, has launched a major domestic campaign to crack down on online dissent. The Ministry is conducting cyber operations against people and websites that post information opposed by communist authorities, including use of an offensive cyber security force called the “Great Cannon,” a supplement to the Great Firewall designed to block online users from accessing unapproved content.

In Russia, hackers linked to the government used malicious software for intelligence-gathering and for political coercion, such as against Ukraine. Moscow hackers also have conducted cyber reconnaissance—preparation of the cyber battlefield—in Europe and elsewhere.

“In February, widespread spear phishing … was detected and analyzed,” the report said. “These attacks targeted numerous entities in government, defense, and non-governmental organizations (NGOs) in the U.S., Europe, Asia, and South America.”

Russian hackers used stolen emails from a hack against the U.S. strategic consulting firm Stratfor, the report said, a tactic not typical of Russian hacking in the past.

International pressure on Moscow over its military activities, such as the annexation of Ukraine’s Crimea “portend increased intelligence collection by Russia-based adversaries particularly against regional targets and global energy companies,” the report said.

A Russian cyber intelligence operation, dubbed Berserk Bear, targeted oil and gas companies in the Middle East. Another operation, called Fancy Bear, targeted Chinese defense firms.

One Russian hacker group called CyberBerkut operating in Ukraine appears linked to Russian intelligence services.

North Korean cyber activities last year principally involved intelligence-gathering operations directed against South Korea.

Pressure from China could prompt Pyongyang to take a more aggressive cyber posture. And North Korean cyber activities also could expand into criminal activities to raise money for the regime, the report said.

Iran is expected to step up cyber attacks against Saudi Arabia. Regional tensions “increase the likelihood that Iran would use its proven cyber capabilities in 2016, targeting Saudi Arabia and regional governments that are becoming involved in the two countries’ dispute by choosing to align with Saudi Arabia.”

The report names more than 70 cyber adversaries and divides them into three types of attackers: Target intruders, such as nation states, cyber criminals, and “hacktivists.”

For cyber crime, attacks on banks and the use of ransom schemes increased during 2015.

“Phishing emails continued to dominate crimeware distribution throughout the year as the primary mechanism used for the aforementioned banking Trojans and ransomware threats,” the report said.

So-called hacktivist activities including politically motivated cyber attacks by groups like the Syrian Electronic Army and pro-ISIS hackers.

Several pro-Iranian hacker groups also were active last year, including Parastoo, Remember EMAD, and SOBH Cyber Jihad.

The group Remember EMAD—named after the Hezbollah terrorist Imad Mughniyah who was killed in a Damascus car bomb in 2009—claimed to have penetrated Pentagon networks and then threatened to release stolen data. No data was ever released.

ISIS hacking was very active last year and included campaigns of web defacement, the release of personal data—known as “doxing”—and the hijacking of social media accounts.

About that Mosque that Barack Visited Today

A deep investigation was performed on the Muslim Brotherhood and organizations in the United States under that umbrella. The full summary is here.

Mosque Obama Visiting Graduated Terrorist Who Targeted Federal Building

The Al-Rahmah School at Islamic Society of Baltimore as seen in 2007. The mosque is hosting President Obama on Wednesday. (AP) According to CIA Director John Brennan ‘jihad’ means struggle…..

InvestorsDaily: Islamophilia: President Obama is conferring legitimacy on a Baltimore mosque the FBI just a few years ago was monitoring as a breeding ground for terrorists, after arresting a member for plotting to blow up a federal building.

IBD has learned that the FBI had been conducting surveillance at the Islamic Society of Baltimore since at least 2010 when it collared one of its members for plotting to bomb an Army recruiting center not far from the mosque in Catonsville, Md.

Agents secretly recorded a number of conversations with a 25-year-old Muslim convert — Antonio Martinez, aka Muhammad Hussain — and other Muslims who worshipped there. According to the criminal complaint, Martinez said he knew “brothers” who could supply him weapons and propane tanks.

“He indicated that if the military continued to kill their Muslim brothers and sisters, they would need to expand their operation by killing U.S. Army personnel where they live,” FBI special agent Keith Bender wrote. Martinez said that in studying the Quran he learned that Islam counsels Muslims to “fight those who fight against you.”

Sentenced to 25 years in prison in 2012, Martinez also stated in a social media posting that he wanted to join the ranks of the “mujahideen” in “Pakistan or Afghanistan (a country that struggle[sic] for the sake of allah).” Most of ISB’s board members are from Pakistan.

To help disrupt the plot, the FBI reportedly put an undercover agent in the mosque, which upset the leadership there. After protests, the FBI sent an official to ISB to take questions and mollify concerns the bureau was spying on Muslims.

Members of the mosque complained that the FBI tried to “entrap” Martinez and other Muslim terrorism suspects by sending “spies with Muslim names” into the mosque.

“If I was the president of the mosque, I would not let you come here without strip(-searching) you,” one member angrily told the FBI official, “because you might drop something (like a bug) to hear what’s going on here.” “The Muslim Link” newspaper described the questioner as Pakistani.

This is the mosque that will be honored with a visit from Obama on Wednesday, the first U.S. mosque visit of his presidency.

It’s now abundantly clear the White House failed to properly vet the venue. Reportedly, it let the Council on American-Islamic Relations choose the site, even though the FBI has banned CAIR from outreach because of known ties to the Hamas terrorist group.

“For a number of years we’ve been encouraging the president to go to an American mosque,” CAIR spokesman Ibrahim Hooper said. “With the tremendous rise in anti-Muslim sentiment in our country, we believe that it will send a message of inclusion and mutual respect.”

As we reported Tuesday, ISB is affiliated with the Islamic Society of North America — which federal prosecutors in 2007 named a radical Muslim Brotherhood and Hamas front and an unindicted terrorist co-conspirator in a scheme to funnel more than $12 million to Hamas suicide bombers — and ISB has helped organize the terror-tied ISNA’s conferences.

The Shariah-compliant mosque was led for 15 years by a radical cleric — Imam Mohamad Adam el-Sheikh — who once represented a federally designated al-Qaida front group. El-Sheikh also has argued for the legitimacy of suicide bombings, according to the Washington Post.

We also first reported that ISB board member and vice president Muhammad Jameel has blamed American foreign policy — namely, U.S. support for Israel — for terrorism and the rise of Osama bin Laden.

“I hope (his death) does not camouflage the bigger picture, which is to look at what gave rise to OBL and what are the root causes of terror,” Jameel said in a local 2011 interview. “Just eliminating him does not resolve the longer-term problems, which I consider to be (U.S.) foreign policy.”

ISB board members are required to have “an in-depth understanding of the Shariah,” and “must take Islam as the way of life,” according to recently amended articles of incorporation papers filed with the state of Maryland.

We have also learned that ISB invited one of the imams of the Boston Marathon bombers’ mosque to headline a 2013 fundraiser for its Islamic school.

Then-Islamic Society of Boston imam Suhaib Webb spoke at the 25th anniversary banquet of ISB’s Al-Rahmah School — even though two days before 9/11, according to an FBI surveillance report, Webb was raising cash for a Muslim cop-killer together with al-Qaida cleric Anwar Awlaki, the hijackers’ spiritual leader.

So let’s recap. The mosque that is hosting the commander in chief, while receiving his historic benediction graduated a terrorist who plotted to blow up a local Army recruiting station, hired an imam who condoned suicide bombings and blames American “foreign policy” for terrorism.

Obama has to be willfully blind not to see all these ties to terror.

Rendition for Edward Snowden?

Edward Snowden did perform a duty and that was to expose the NSA programs and the associated intrusions. However, stealing documents and sharing them with roque nations and adversarial countries is best described as high crimes and misdemeanors. Would planning a rendition operation be altogether misguided?

Secret US flight flew over Scottish airspace ‘to capture Snowden’

TheNational: THE UK GOVERNMENT is facing demands to reveal the details of a secret flight through Scottish airspace which was at the centre of a plot to capture whistleblower Edward Snowden.

The plane, which passed above the Outer Hebrides, the Highlands and Aberdeenshire, was dispatched from the American east coast on June 24 2013, the day after Snowden left Hong Kong for Moscow. The craft was used in controversial US ‘rendition’ missions.

Reports by Scottish journalist Duncan Campbell claim the flight, travelling well above the standard aviation height at 45,000 feet and without a filed flight plan, was part of a mission to capture Snowden following his release of documents revealing mass surveillance by US and UK secret services.

That the flight passed over Scotland, airspace regulated by the UK, has raised questions over UK complicity in a covert mission to arrest Snowden and whether any police, aviation or political authorities in Scotland were made aware of the flight path.

Alex Salmond, the SNP foreign affairs spokesman and Scotland’s First Minister when the flight took place, has called for full transparency from the UK Government over the case.

He said: “As a matter of course and courtesy, any country, particularly an ally, should be open about the purposes of a flight and the use of foreign airspace or indeed airports.”

“What we need to know now is, was this information given to the UK Government at the time. If so, then why did they give permission? If not, then why not? As a minimum requirement, the UK authorities should not allow any activity in breach of international law in either its airspace or its airports.

“That is what an independent Scotland should insist on. Of course, since no rendition actually took place in this instance, it is a moot point as to whether intention can constitute a breach of human rights. However, we are entitled to ask what the UK Government knew and when did they know it.”

The flight took place after US federal prosecutors filed a criminal complaint against Snowden on June 14. Regular meetings with the FBI and CIA, convened by US Homeland Security adviser Lisa Monaco, then planned Snowden’s arrest for alleged breaches of the Espionage Act, according to The Washington Post.

New documents, revealed by Danish media group Denfri, confirm that the N977GA plane was held at a Copenhagen airport for “state purposes of a non-commercial nature”. Two days later Danish authorities received an “urgent notification” from the US Department of Justice to cooperate in arresting Snowden.

N977GA was previously identified by Dave Willis in Air Force Monthly as an aircraft used for CIA rendition flights of US prisoners. This included the extradition of cleric Abu Hamza from the UK. Snowden accused the Danish Government of conspiring in his arrest. In response to flight reports, he said: “Remember when the Prime Minister Rasmussen said Denmark shouldn’t respect asylum law in my case? Turns out he had a secret.”

Snowden was behind the largest leak of classified information in history, revealing spying activities that were later deemed illegal on both sides of the Atlantic. He was elected rector at the University of Glasgow in February 2014, yet is unable to fully carry out his duties.

Patrick Harvie, co-convener of the Scottish Green Party, echoed calls for an inquiry into the flight: “It will certainly raise suspicions that an aircraft previously identified as involved in rendition flew through UK airspace at that time. We have a right to know what UK and Scottish authorities knew about this flight given it is implicated in the US response to whistleblowing about global surveillance.”

ATTEMPTS to arrest Snowden have failed as Russian authorities refused to comply. However, pressure from US authorities made it dangerous for Snowden to travel from Russia to Latin America, where Ecuador, Nicaragua, Bolivia, and Venezuela have all offered him asylum.

The presidential plane of Bolivian leader Evo Morales was forced to ground in Vienna, after four EU nations refused airspace access on the mistaken belief that Snowden was hidden on board.

In 2013 Police Scotland launched an investigation into whether other US rendition flights – where prisoners were taken to blacklist torture sites – used Scottish airports or airspace.

In 2006 aviation expert Chris Yates said it was likely that a US rendition flight had passed through Scottish airspace to Syria, in a case where the prisoner, Maher Arar, said he was tortured.

In 2008 then foreign secretary David Miliband admitted that UK airports had been used for US rendition flights and apologised for previous government denials.

American politics lecturer John MacDonald, director of foreign policy group the Scottish Global Forum, said: “Given the constitutional arrangements, there are a number of areas in which the Scottish Government may well have interests or concerns but will be excluded because security arrangements with the US are deemed ‘out of bounds’ for Scotland.

“However, if you take serious the supposition that all responsible governments have a moral and legal obligation to raise questions about flights which may be involved in dubious security and intelligence activities, then the Scottish Government may well have an interest in – or even be obliged to –raise questions.

“Questions have already been raised about the nature of military and intelligence air traffic through Scotland and if this activity is raising concerns within Scottish civil society – and it seems to be – then it is surely incumbent upon the Scottish Government to raise the issue with London.”

National Air Traffic Control Systems (Nats), who control flight access to UK airspace, said rendition flights are an issue for the UK Government. In response to questions, the UK Government refused to provide details on attempts to arrest Snowden or on the passage of the N977GA flight.

The Scottish Government also avoided a direct statement on the case on legal grounds. A spokesman said: “There is already an ongoing Police Scotland investigation, directed by the Lord Advocate. This investigation will seek to gather all available evidence of rendition flights using Scottish airports. As this is a live investigation it would be inappropriate to comment further.”

During his two and a half years in Moscow, Snowden has caused diplomatic ruptures and a worldwide debate on privacy and state security. In October 2015 the European Parliament voted narrowly, in a non-binding motion, to drop charges against him in recognition of “his status as [a] whistle-blower and international human rights defender”.

A Private Computer System at State for Hillary?

Okay, it is coming out at a furious speed, so Bernie Sanders will enjoy this or will it be Biden or Bloomberg that are dancing? Where is lil’ Debbie Wasserman Schultz these days? Oh how about Barack, Huma, Cheryl, or Sid viscous or Cody? Tyler Drumheller is dead….but the Hillary clandestine network had huge discussions at the State Department to the point of issuing her own system. The problem is Hillary did not know how to use a computer, so that flippant statement about wiping a server with a cloth as I have said before was in fact innocent, she has no clue. Calling Brian Pagliano, call holding on line 3. What about all those mobile devices? What about all the hardcopies that Hillary asked to have digital communications printed for her?

Plans For Hidden IT Network To Help Clinton Skirt Rules Uncovered by Judicial Watch

‘We should … set up a stand-alone PC in the Secretary’s office, connected to the internet (but not through our system) to enable her to check her emails from her desk’

(Washington, DC) – Judicial Watch announced today that it recently received records from the Department of State disclosing plans by senior State Department officials to set up a “stand-alone PC” so that Clinton could  check her emails in an office “across the hall” through a separate, non-State Department computer network system. Referencing the special Clinton computer system, Under Secretary for Management Patrick F. Kennedy, writes Clinton Chief of Staff Cheryl Mills, “The stand-alone separate network PC is a great idea.”  The emails are from January 23-24, 2009, a few days after Clinton was sworn in as Secretary of State.

The new emails were obtained by Judicial Watch in response a court order in a Freedom of Information Act (FOIA) lawsuit for State Department records about Hillary Clinton’s separate email system  (Judicial Watch, Inc. v. U.S. Department of State (No. 1:15-cv-00689)).

In the email chain, Lewis Lukens, former deputy assistant secretary of state and executive director of the secretariat, responds to a request from Mills by informing her, top Clinton aide Huma Abedin, and Kennedy that the new personal computer “in the secretary’s office” would be “connected to the internet (but not through our system).” Abedin responds, “We are hoping for that if possible.”

The email exchange discussing plans to provide Clinton a separate computer to skirt the internal State Department computer network begins with a message from Mills to Lukens in which she requests Clinton being able to access her emails through “a non-DOS computer.” The email discusses how the stand-alone computer can be set up and why it is “a great idea’ and “the best solution:”

From: Cheryl Mills
Sent: Friday, January 23, 2009 6:45 AM
To: Lukens, Lewis A
Subject: Re: Series of questions

Lew – who can I talk to about:

  1. Can our email be accessed remotely through the web using a non-DOS computer like my laptop?
  2. I am traveling to the M-E – will my DOS bb work there and is there a cell phone attached?
  3. Spoke to Dan [Daniel B. Smith, former DOS executive secretary] re: bb for HRC (and reports that POTUS is able to use a super encrypted one which)
  4. Spoke to Dan re: setting up Counselor office for HRC so she can go across hall regularly to check her email

***

From: Lukens, Lewis A
To: cmills [REDACTED]
Cc: Habedin [REDACTED]; Kennedy, Patrick F; Smith, Daniel B
Sent: Saturday, Jan. 24, 19:10:33 2009
Subject: Re: series of questions

We have already started checking into the NSA bb. Will set up the office across the hall as requested. Also, I think we should go ahead (but will await your green light) and set up a stand-alone PC in the Secretary’s office, connect to the internet (but not through our system) to enable her to check her emails from her desk. Lew.

From: Kennedy, Patrick F [email protected]
To: Lukens, Lewis A <[email protected]>; Cheryl Mills
Cc: Huma Abedin; Smith, Daniel B <[email protected]>
Sent: Sat, Jan 24 19:48:25 2009
Subject: Re: Series of questions

Cheryl

The stand-alone separate network PC is [a] great idea

Regards

Pat

From: Huma Abedin
To: Kennedy, Patrick F; Lukens, Lewis A; Cheryl Mills
Cc: Huma Abedin; Smith, Daniel B
Sent: Sat Jan 24 19:48:27 2009
Subject: Re: Series of questions

Yes we were hoping for that if possible so she can check her email in her office.

***

From: Lukens, Lewis A
Sent: Saturday, January 24, 2009 8:26 PM
To: Kennedy, Patrick F
Subject: Re: Series of questions

I talked to Cheryl about this. She says a problem is hrc does not know how to use a computer to do email – only bb [Blackberry]. But, I said would not take much training to get her up to speed.

In separate litigation, the State Department told Judicial Watch and federal courts that Hillary Clinton was never issued secure State Department computing devices.

“These emails are shocking.  They show the Obama State Department’s plan to set up non-government computers and a computer network for Hillary Clinton to bypass the State Department network,” said Judicial Watch President Tom Fitton. “That these records were withheld from the American people until now is scandalous and shows the criminal probe of Hillary Clinton’s email system should include current and former officials of the Obama administration.”

Judicial Watch filed these new emails with U.S. District Court Judge Emmett Sullivan, who is now considering whether to grant discovery in a lawsuit seeking information on the “special government employee” status of Abedin. In its filing, Judicial Watch states:

[Judicial Watch] just recently received additional evidence that demonstrates that senior management at the State Department was well aware that Mrs. Clinton was using a “non-state.gov” system to conduct official government business. This evidence also shows that the senior management at the State Department knowingly aided Mrs. Clinton in establishing and using a “non-state.gov” system.

***

[T]his newly discovered email demonstrates that there is at least a “reasonable suspicion” that the State Department and Mrs. Clinton deliberately thwarted FOIA by creating, using, and concealing the “clintonemail.com” record system for six years.