Another Illegal and an Unimaginable Triple Murder

Ft. Myers, Florida: Family member charged in ‘extremely violent’ triple homicide

The Lee County Sheriff’s Office announced Thursday that Brian Omar Hyde has been charged in the deaths of Dorla Pitts, 37, her daughter Starlette Pitts, 17, and Michael Kelly, Jr., 19.

Deputies were called to the home in the 3507 21st Street SW shortly before noon Tuesday. It all started when Dorla Pitts walked in on the scene while she was on the phone with her husband. Her scream was the last thing Dorrien Pitts heard. He then called a family friend who went to the home and discovered the bodies.

– VIDEO: Watch the full LCSO press conference

The 18-month-old daughter of Starlette and Michael was found unharmed. Detectives are not sharing details on whether the child was near the bodies.

Hyde, 19, is charged with three counts of second-degree murder and faces a charge in the death of Starlette Pitts’ unborn child. He was arrested Tuesday for driving without a license. At the time of his arrest, he had blood on his body and clothes, according to LCSO.

– DOWNLOAD: Brian Omar Hyde arrest report

Michael’s mother, Sherri Flemming, said Hyde is Starlette’s cousin and Dorla’s nephew who had been staying at the home after recently moving here from Belize. According to LCSO, Hyde is in the country illegally and is awaiting a court hearing as an illegal immigrant, having crossed the Texas border earlier this year.

Lt. Matt Sands said it was an “extremely violent scene, even for us. All homicide scenes are normally violent, but this scene was what we considered unimaginable.”

He said there is evidence all the victims tried to defend themselves.

At the same time deputies were working the Lehigh scene, Fort Myers Police received a call for a reckless driver. Hyde was pulled over in a white Range Rover for driving on the opposite side of the road, at which time he was arrested for driving with no license. The Range Rover was registered to the Lehigh address, as were two other sets of keys Hyde had with him. Detectives say a bloody palm print found at the scene matched Hyde’s.

LCSO is still investigating a motive.

Investigators are not releasing specific details on the murder weapon, only stating that the victims were hit several times with a sharp object.

FAMILY LEFT TO PICK UP THE PIECES

Michael’s mother, Sherri Flemming, said Thursday that when she met Brian Hyde, she felt something was off, but accepted him because he is Starlette’s cousin. She said the young couple took him in because they were good, caring people.

“This could happen to anybody, so be careful who you bring into your house. It could be your own family member,” Flemming said.

She said Hyde was made to feel like family by Starlette and Michael, who invited him to his family’s gatherings, but Flemming said she felt uncomfortable when Hyde came around.

While it helps to know how they died, it’s the why that leaves Flemming emotional. “They was innocent people, how could you do this?”

Michael’s sister, Derquiasha Henderson, said they were just picking out baby names for the new baby. “We were just doing all of that, we were supposed to hang out.”

She said now they’ll have to show the surviving 18-month-old, found unharmed in a bedroom, how much her parents loved her.

“I can picture her trying to go to her mom and my brother and wake them up, because that’s the type of baby she is. She love her parents, she loved them and they loved her,” Henderson said.

The surviving grandparents from both families are in the process of figuring out how to care for the little girl, and say what they need most right now is time to heal.

WHO IS BRIAN HYDE?

Authorities in Brian Hyde’s native country of Belize say he is no stranger to them.

Hyde was recently wanted in connection to a recent robbery of a cell phone store there before fleeing the country.

Hyde first came to the U.S. in January, illegally entering through Texas, according to investigators.

– VIDEO: Who is Brian Hyde?

Since then, Hyde had been staying with his relatives, the Pitts, in Lehigh Acres.

According to Belize media outlets, Hyde was also arrested in November of last year for assaulting a police officer, a charge he later disputed.

Other reports show Hyde and two other men were suspects in a double murder case dating back to October 2013. He was only charged with a lesser crime of “handling stolen goods.”

A newspaper reporter said Hyde comes from a known “criminal” family.

His uncle, Russell Hyde, was considered a suspect in the brutal murders of two Belize nationals in May. Both men were found decapitated and dismembered.

To date, Russell Hyde has not been charged with their murders.

According to sources in Belize, police do not have the technology to analyze DNA and other forensic evidence like the U.S. does, which may be one reason they had such a hard time connecting Russell Hyde to those deaths.

As for Brian Hyde, he remains in Lee County Jail and faces trial here.

Attorney Michael Raheb said if Hyde is found not guilty, he’ll face an immigration judge and most likely be deported.

But if found guilty, “then he may be serving life in prison, in which case the whole point of deportation becomes moot because he won’t be released from Florida state prison,” Raheb said.

Officials at the Department of Immigration and Customs Enforcement have not yet responded to NBC2’s requests for comment.

Smoke Coming From the Hillary Server Fire is Worse

Strip the security clearance from this woman. There are many calling for this exact action and the State Department will not comment if she in fact still has it. At least during this investigation, her clearance should be suspended.

Posted on this site was a timeline and factual information when it comes to the Hillary Servergate affair. A few hours have passed and there of course is more to report.

More factual intrigue is listed below and it is not in any real date order given what and how information is being obtained. This comes as the FBI begins the data and material investigations.

1. Barack Obama drafted and signed a lengthy Executive Order #13526 spelling out the comprehensive conditions of all classified and top secret information. The Democrats and those supporting the Hillary camp in Severgate can NO longer claim restrictive laws are passed AFTER her term as Secretary of State. Further and quite important, Hillary was ONE of 20 who were designate with authority to apply classified codes to documents making it all the more curious on how she can claim ignorance in top secret or restricted documents.

2, It is now confirmed, the second server in question which held the material involved in Servergate, located in New Jersey and seized by the FBI was stripped of data. The FBI does in fact have the skills to rebuild and retrace all administrative actions in the server.

3, Now another at the core of this investigation is Huma Abedin who was and is Hillary’s personal confidant and aide de camp. To date, she has not signed nor turned over as order by Judge Sullivan the certification under penalty of perjury or the email materials which hovers in the range of 7000 communication transmissions.

4. As discussed before, not only was there 3 thumb drives of the Hillary email transaction surrendered to the FBI and 3 servers, but the FBI will likely need to obtain or gain a search warrant for 3 additional communication devices held by Hillary, those being her Blackberry, her iPhone and her iPad.

5. When it comes to the SIGINT or geo-spatial top secret email in question, it appears it was relating to a drone image of terror groups in Pakistan. This speaks to sources and methods such that the top secret designations would have originated with the original transmission of the critic (critical communications).

6. Platte River was NOT an approved facility to house or support classified material. Outside vendors are to be approved in the case of top secret material that have hardened rooms preventing espionage or eavesdropping.

7. There will be more Hillary personnel caught up in the investigation snare and those likely will include Mike Morrell, Deputy Director of the CIA; Phillippe Reines, Hillary’s gatekeeper; Jeremy Bash, former Chief of Staff for Leon Panetta; Andrew Shapiro, Hillary’s Policy Advisor; and several others now at Beacon Global Strategies, Hillary’s personnel policy think tank.

8. The contracted server company, Platte River is now raising deeper questions due in part to a lawsuit and investigation from November 2014. The lawsuit document is found here. They stole phone numbers and metadata from White House military advisors.

The Internet company used by Hillary Clinton to maintain her private server was sued for stealing dozens of phone lines including some which were used by the White House.

Platte River Networks is said to have illegally accessed the master database for all US phone numbers.

It also seized 390 lines in a move that created chaos across the US government.

Among the phone numbers which the company took – which all suddenly stopped working – were lines for White House military support desks, the Department of Defense and the Department of Energy, a lawsuit claims.

Others were the main numbers for major financial institutions, hospitals and the help desk number for T2 Communications, the telecom firm which owned them.

A lawsuit filed on behalf of T2 claims that the mess took 11 days to fix and demands that Platte River pay up $360,000 in compensation.

More to come for sure…..stay tuned.

 

Cyber-attack on Power Grid Paralysis

Cyber Attacks on the Power Grid: The Specter of Total Paralysis

Posted in General Security, Hacking, Incident Response on July 27, 2015

The Incidents

Imagine that one day you wake up and trading is halted on the New York Stock Exchange (NYSE) floor; meanwhile systems at United Airlines and the Wall Street Journal newspaper appear out of order.

It is not a scene from a movie; it happened on July 8, when trading at the NYSE stopped around 11:30 a.m. ET.

According the media, the temporary interruption of the services mentioned was a fateful coincidence and the events are unrelated, but the incidents have raised once again the question of the real security of critical infrastructure.

White House spokesperson Josh Earnest confirmed that the incidents weren’t caused by cyber-attacks. President Obama had briefed on the glitch at NYSE by White House counterterrorism and Homeland Security adviser Lisa Monaco as well as Chief Of Staff Denis McDonough.

“It appears from what we know at this stage that the malfunctions at United and at the stock exchange were not the result of any nefarious actor,” said Department of Homeland Security Secretary Jeh Johnson. “We know less about the Wall Street Journal at this point except that their system is back up again as is the United Airline system.”

Which is the impact of a cyber-attack on a critical infrastructure? Are critical infrastructure actually secure?

A major attack on a critical infrastructure like a power grid would cause chaos in the country by interrupting vital services for the population.

The current scenario

The Stock Exchange, transportation, and media are critical to the infrastructure of a country. A contemporary failure of these systems could cause serious problems to the nation, especially when the incident is caused by a cyber-attack.

“I think the Wall Street Journal piece is connected to people flooding their web site in response to the New York Exchange to find out what’s going on.” FBI Director James Comey told the Senate Intelligence committee. “In my business we don’t love coincidences, but it does appear that there is not a cyber-intrusion involved.”

Sen. Bill Nelson, D-FL, the top Democrat on the cyber-security subcommittee, told Fox News that the NYSE incident has “the appearance” of a cyber-attack and noted the coordination of multiple sites.

Thus far, the temporary outage at the New York Stock Exchange, United Airlines and the Wall Street Journal’s website were the results of tech glitches, but we have to consider the US infrastructure remains vulnerable to cyber-attacks that would cause serious problems and would be costly.

To compound the scenario, there is the rapid increase in the number of cyber-attacks, at least of those we fail to detect, and its complexity.

The DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued its new ICS-CERT MONITOR report related to the period September 2014 – February 2015. The ICS-CERT MONITOR report

According to the report, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) received and responded to 245 incidents in Fiscal Year 2014, more than half of the incidents reported by asset owners and industry partners involved sophisticated APT. ICS/SCADA system were also targeted by other categories of threat actors, including cyber criminals, insider threats and hacktivists.

“Of the total number of incidents reported to ICS-CERT, roughly 55 percent involved advanced persistent threats (APT) or sophisticated actors. Other actor types included hacktivists, insider threats, and criminals. In many cases, the threat actors were unknown due to a lack of attributional data.” states the report.

Analyzing incidents reported by sector, it is possible to note that the majority of the attacks involved entities in the Energy Sector followed by Critical Manufacturing. About 30 percent of the incidents hit infrastructures in the energy sector, meanwhile Critical Manufacturing (i.e. manufacturing of vehicles and aviation and aerospace components) accounted for 27 percent.

The threat actors used a significant number of zero-day vulnerabilities to compromise industrial control systems through the exploitation of web application flaws.

The most common flaws exploited by attackers include authentication, buffer overflow, and denial-of-service . Noteworthy among ICS-CERT’s activities included the multi-vendor coordination that was conducted for the ”

“Noteworthy among ICS-CERT’s activities included the multi-vendor coordination that was conducted for the “Heartbleed” OpenSSL vulnerability. The team worked with the ICS vendor community to release multiple advisories, in addition to conducting briefings and webinars in an effort to raise awareness of the vulnerability and the mitigation strategies for preventing exploitation” states the ICS-CERT report to explain the coordination activities sustained by the agency to address principal vulnerabilities.

The ICS-CERT MONITOR report confirmed that the attackers used a vast range of methods for attempting to compromise control systems infrastructure, including:

Figure 1 – ICS -CERT Attack Methods

Unfortunately, it is quite difficult to attribute an incident to a specific threat actor. In the majority of cases, these offensives have gone under the radar over the years due to high level of sophistication of the Tactics, Techniques, and Procedures (TTPs).

The victims were not able to identify the threat actors. Neither the attack vector exploited by hackers for 38 percent of the reported incidents,

“Many more incidents occur in critical infrastructure that go unreported,” states the ICS-CERT MONITOR report. “Forensic evidence did not point to a method used for intrusion because of a lack of detection and monitoring capabilities within the compromised network”.

US power grid vulnerable to cyber attacks

The US power grid is a privileged target for various categories of attackers, terrorists, cyber criminals, and state-sponsored hackers. Daily, they threaten the backbone of the American society. Security experts and US politicians are aware that the national power grid is vulnerable to a terrorist attack.

“It’s possible; and whether it’s likely to happen soon remains to be seen,” explained by the former Secretary of Defense William Cohen on “The Steve Malzberg Show.”

Attackers have several options to hit a power grid, from a cyber-attack on SCADA systems to an EMP attack, according to Cohen.

“You can do it through cyber-attacks, and that’s the real threat coming up as well. We have to look at cyber-attacks being able to shut down our power grid, which you have to remember is in the private sector’s hands, not the government’s. And we’re vulnerable,” Cohen added. “It’s possible and whether it’s likely to happen soon remains to be seen.”

“That’s because the technology continues to expand and terrorism has become democratized. Many, many people across the globe now have access to information that allows them to be able to put together a very destructive means of carrying out their terrorist plans. We’re better at detecting than we were in the past. We’re much more focused in integrating and sharing the information that we have, but we’re still vulnerable and we’ll continue to be vulnerable as long as groups can operate either on the margins or covertly to build these kind of campaigns of terror.” said Cohen.

Former Department of Homeland Security Secretary Janet Napolitano shared Cohen’s concerns. A major cyber-attack the power grid was a matter of “when,” not “if.”

State-sponsored hackers, cyber terrorists are the main threat actors, but as confirmed by a recent research conducted by TrendMicro, also the cybercrime represents a serious menace.

Former senior CIA analyst and EMP Task Force On National Homeland Security Director, Dr. Peter Vincent Pry, told Newsmax TV that that a cyber attack against the power grid could cause serious destruction and loss of life.

Not only US power grid are under attack. In January 2015, the British Parliament revealed that UK Power Grid is under cyber-attack from foreign hackers, but the emergency is for critical infrastructure worldwide.\

Figure 2 – SCADA control room

Arbuthnot confirmed the incessant attacks on national critical infrastructure and he doesn’t exclude a major incident, despite the enormous effort spent at the National Grid.

“Our National Grid is coming under cyber-attack not just day-by-day but minute-by-minute,” Arbuthnot, whose committee scrutinized the country’s security policy, told a conference in London last year. “There are, at National Grid, people of very high quality who recognize the risks that these attacks pose, and who are fighting them off,” he said, “but we can’t expect them to win forever.”

The power grid is a vital system for our society and the cyber strategy of every government must consider its protection a high priority, a terror attack would leave entire countries sitting in the dark.

A hypothetical attack scenario and estimation of the losses

What will happen in case of a cyber-attack on a critical infrastructure in the US? Which is the economic impact of a cyber-attack against a power grid?

According to a poll conducted by researchers at the Morning Consult firm from May 29 to May 31, cyber-attacks are just behind terrorism attacks on the list of biggest threats to US. The research allowed the experts to estimate that the insurance industry could face losses of about $21 billion. That poll was conducted by interviewing a national sample of 2,173 registered voters.

Nearly 36 percent of voters consider acts of terrorism at the top of a list of major security threats, followed by cyber-attacks at 32 percent.

Figure 3- Morning Consult firm poll results

The Lloyd’s of London has conducted a very interesting study, Business Blackout, that describes the impacts of a cyber-attack on the national power grid.

It is the first time that the insurance industry has elaborated on a similar report. Obviously, the estimates provided are merely indicative due to the large number of factors that can influence the costs.

According to the report prepared by Lloyd’s of London in a joint effort with the University of Cambridge’s Centre for Risk Studies, cyber-attacks would have a catastrophic impact on multiple types of insurance.

The attack scenario described by Business Blackout illustrates the effects of a malware-based attack on systems that controls the national power grid. The attack causes an electrical blackout that plunges 15 US states and principal cities, including New York City and Washington DC, into darkness. Nearly 93 million people will remain without power in the scenario hypothesized by the study.

The attackers spread the ‘Erebos’ Trojan through the network with the effect of compromising the electricity generation control rooms in several locations in the Northeastern United States.

According to the researchers, the attack will cause health and safety systems to fail, disrupting water supplies as electric pumps fail. The chaos will reign causing the failure of main services, including transportation. The malware is able to infect the Internet and search and compromise 50 generators that it will destroy, causing prolonged outages in the region.

The total of claims paid by the insurance industry has been estimated to be included in the interval comprised between $21.4b and $71.1b, depending on the evolution of the scenarios designed by the researchers.

The researchers involved in the simulation have calculated the economic losses could range from $243 million to $1 trillion, depending on the number of components in the power grid compromised by the attack.

“Economic impacts include direct damage to assets and infrastructure, decline in sales revenue to electricity supply companies, loss of sales revenue to business and disruption to the supply chain. The total impact to the US economy is estimated at $243bn, rising to more than $1trn in the most extreme version of the scenario.” states the report.

The experts analyzed the historical outages, estimating that currently the power interruptions, most of which last five minutes or less, already cost the US about $96 billion. The cost related to a prolonged outage is likely to be included in the range of $36 billion to $156 billion. The Commercial and industrial sectors are the sectors most impacted by the attack on the power grid due to their dependency on the electricity supply.

“Evidence from historical outages and indicative modelling suggests that power interruptions already cost the US economy roughly $96bn8 annually.9 However, uncertainty and sensitivity analysis suggest this figure may range from $36b to $156b.” continues the report. “Currently over 95% of outage costs are borne by the commercial and industrial sectors due to the high dependence on electricity as an input factor of production.”

As explained in the report, it is important to identify the risks related to a possible cyber-attack and adopt all the necessary measures to mitigate them. The protection of critical infrastructure like a power grid is an essential part of the cyber strategy of any Government.

America has Been Latinized

Census: Record 42.1 million immigrants in U.S., Mexicans drive latest surge

by Paul Bedard

A new analysis of legal and illegal immigrant counts by the Census Bureau revealed Thursday that there is a record 42.1 million in the United States, an explosion that is being driven by Mexicans flooding across the border.

In a report provided to Secrets by the Center for Immigration Studies, the total immigrant population surged 1.7 million since 2014. The growth was led in the last year by an additional 740,000 Mexican immigrants.

The 42.1 million tabulated by Census in the second quarter represent over 13 percent of the U.S. population, the biggest percentage in 105 years.

What’s more, the numbers of immigrants coming and going from the U.S. is actually higher since many return home every years, said the report. “For the immigrant population to increase by one million means that significantly more than one million new immigrants must enter the country because some immigrants already here return to their homeland each year and natural mortality totals 250,000 annually,” said the Center.

The stunning growth is sure to pour fuel on the already white-hot immigration debate in Congress and on the presidential campaign trail.

“Illegal immigration came up in the presidential debates, but there has been little discussion of the level of immigration; this at a time when total immigration is surging according to the latest data,” said Steven Camarota, co-author of the report and the Center for Immigration’s director of research.

“The rapid growth in the immigrant population was foreseeable given the cutbacks in enforcement, our expansive legal immigration system, and the improvement in the economy. But the question remains, is it in the nation’s interest?” he added.

Some key findings in the new report:

• The nation’s immigrant or foreign-born population, which includes legal and illegal immigrants, grew by 4.1 million from the second quarter of 2011 to the second quarter of 2015 — 1.7 million in just the last year.

• Growth in the last year was led by a rebound in the number of Mexican immigrants, which increased by 740,000 from 2014 to 2015 — accounting for 44 percent of the increase in the total immigrant population in the last year.

• The total Mexican immigrant population (legal and illegal) reached 12.1 million in the second quarter of 2015 — the highest quarterly total ever.

• The Department of Homeland Security and other researchers have estimated that eight in 10 illegal immigrants are from Mexico and Latin America, so the increase in immigrants from these countries is an indication that illegal immigration has begun growing again.

Much of the new immigration is due to the explosion of green cards and the flood of younger Latin Americans leaving troubled situations back home.

Many companies, meanwhile are taking advantage of the immigrants and replacing higher paid Americans with cheaper immigrant labor, even in skilled jobs.

Polls, meanwhile, show that the public wants action to stop the surge of illegal immigrants, an issue picked up by some of the Republicans running for president such as Sen. Ted Cruz and Donald Trump.

Additional numbers assessments and trends:

When it comes to the U.S. population, the “mainstream” is shifting from white to multicultural. In 1980, the U.S. was 80% white/non-multicultural. By 2012, that proportion had decreased to 64%. And in the years to come, the multicultural, non-white population will account for larger and larger percentages of the population.

Multicultural America is becoming more Latino. Hispanics, African-Americans, and Asians represented just 20% of the population in 1980. By 2012, that percentage nearly doubled to 36%. Over that more than twenty year period, Hispanics have grown to represent a much larger proportion of the multicultural population. They were 32% of the multicultural segment in 1980 — and grew to 47% in 2012.

By 2050, there will be as many young Latinos in the U.S. as white non-Hispanics. Unlike waves of past immigrants, Hispanics will grow to be equal in size to the host population. In 1980, non-Hispanic whites were 74% of the under-18 population and Hispanics were 9%. By 2050, the two groups will be even, with both projected to represent 36% of the population under 18.

Already, Hispanics are the engine of growth for the 18-34 demographic. From 2015 to 2020, Hispanics 18-34 are projected to increase by over 1.8 million. Over that same period for that age group, non-Hispanic whites will decrease in size by nearly 1.3 million. Blacks and Asians will also grow – but on a much smaller scale (by 84,000 and 267,000, respectively).

The youth population is very Latino. Today, Hispanics represent more than 1 in 5 people under 35. And that proportion rises when it comes to the very young: Latinos account for almost 1 in 4 births in the U.S.

Growth fueled by the second generation. Hispanic population increases are expected to come from immigration and births in the US — but the majority will come from US births. The Census projects that from 2012 to 2050, the US-born Hispanic population will increase at 5 times the rate of foreign-born Hispanics. And while today the US-born group is about 65% larger than foreign-born, in 2050 there will be nearly 4 times more US-born Hispanics than foreign-born.

The second generation is already taking over the 18-34 demographic – and the pace is only going to pick up. Hispanics 18-24 skew heavily US-born, while more than half of 25-29s and 30-34s are foreign-born. By 2020, 85% of 18-24s and 61% of 25-29s will be US-born (and 30-34s will still be more foreign-born (55%).

A mega wave of second-generation Latinos is heading into the key advertiser demos. More than 90% of Hispanic kids under 11 were born in the US – and 6 million of them are second generation. As they get older, they will shape the market in new ways. Every year, nearly 550,000 second-generation Latinos are entering the teen demographic.

Hillary Email Server Timeline and Facts

Like everyone else, tracking the pieces of this scandal takes imagination and could require a spreadsheet that includes names and dates. So, below will be some facts and dates and for sure could be amended as more developments are realized.

1. Bill Clinton had/has his own server dedicated to Clinton business, Foundation operations and speeches.

2. Hillary needed an IT based system during the time she was running for president in 2008, could not use the existing server due to capacity limitations, so she bought yet another which came with an IT person.

3. Server 2 was installed in the basement of the Chappaqua home and managed by a person listed as Eric Hoteham. Likely the real name is Eric Hothem, who was a DC stockbroker and a Democrat fundraiser that worked for Bill. Eric was also an aide to Hillary during her time as First Lady.

4. Several email addresses were created on the 2nd server where they had some numbers assigned like [email protected]. Several identified run from 18-22 but leads to a question ‘were there email addresses created 1-17? There is also a strange email address on the server known as [email protected]. It should be noted that Guccifer hacked the email address of hdr22.

5. Hillary used several communications devices: a Blackberry which is government issued, an iPad and an IPhone. Questions include, were any of these fitted with encryption features, including her server(s)? So far that answer is no.

6. In the handful of emails released to date as required by the Judge via the State Department, Hillary did not know how to use email and there was a time when the server was down which caused issues for Huma Abedin.

7. In June of 2013, the Hillary team went to an outside IT provider known as Platte River, located in Denver. All electronic communications were moved to Platte River and the Hillary server was moved to a data center in New Jersey and subsequently wipe clean. Now the question is what the Denver IT company Platte River providing redundant services and or an encryption platform to protect classified data for the emails? So far the company is not responding to media questions. The decision to transfer the server services was at the same time the emails that included Sidney Blumenthal were hacked by Guccifer.

6. Two weeks ago, the FBI made a call to Platte River to determine the basis of their work for the Hillary communications platform. On Thursday of last week, Hillary’s lawyer, David Kendall surrendered the 3 thumb drives to the FBI. On Wednesday of this week, the FBI took control of the server located in New Jersey.

7. The recent 2 of 4 emails in question that were marked with the top secret classifications due in part that they included geo-spatial information were sent via a compartmentalized system to the State Department. From State Dept., they were then removed from the protected compartmentalized system and sent to the uncertified Hillary system. All the top secret designations were removed, which is a felony.

8. David Kendall, the Hillary lawyer who maintained the 3 thumb drives was also the lawyer of record for General David Petraeus during his email investigation.

9. All of government uses the same ‘sensitive compartmented information security procedures and there is a manual.

10. Additional details on Hillary email server scandals can be found here.

11. Hillary Clinton statements on the email scandals proving the lies so far.

12. Wrap up to date on the server and the law.

13. Huma Abedin, Hillary’s personal aide and confidant has lawyered up with Karen Dunn on two fronts, the overpayment of $10,000 and for the email scandals.

14. In a recent batch of Hillary emails released was an inquiry about a book describing how to delete emails and the consequences that could result in a jail term.