Twitter Cutting off Intel Agencies

Perhaps we must be reminded that Twitter is the platform of choice for Islamic State. Through Twitter, connections and conversation can be cultivated and used to glean activity, locations, photos, videos, names and organizations. Perhaps it would be important to remember that during the bin Ladin raid in Abbottabad, a local used Twitter to describe what was happening real time. Journalists in areas of hostilities also use Twitter to report live action and terror movement.

Twitter with this decision will also likely affect the work of the FBI when it comes to solving other worldwide criminal activity such as child-trafficking, slavery and exploitation. Shameful. There is a volunteer team that searches Twitter daily for terror accounts and removes them since Twitter refuses to cooperate. There are an estimated 40,000 ISIS Twitter accounts daily. What about hostages and beheadings like James Foley?

Knowing the importance and success of Islamic State on Twitter, the U.S. State Department even launched their own Twitter strategy, now this decision by Twitter is aiding the enemy.

Twitter cuts intel agencies off from analysis service: report

Washington (AFP) – Twitter has barred US intelligence agencies from accessing a service that sorts through posts on the social media platform in real time and has proved useful in the fight against terrorism, the Wall Street Journal reported.

The newspaper, in its report Sunday evening, cited a senior US intelligence official as saying that Twitter seemed worried about appearing too cozy with intelligence services.

Twitter owns about a five percent stake in Dataminr, which uses algorithms and location tools to reveal patterns among tweets. It is a powerful tool for gleaning useful information from the unending stream of chatter on Twitter.

Dataminr is the only company that Twitter authorizes to access its entire real-time stream of public tweets and sell it to clients, the Wall Street Journal said.

The move was not publicly announced and the newspaper cited the intelligence official and people familiar with the matter.

Dataminr executives recently told intelligence agencies that Twitter did not want the company to continue providing services to them, the report said.

Dataminr information alerted US authorities to the November attacks in Paris shortly after the assault began, the Wall Street Journal said.

It has also been useful for real-time information about Islamic State group attacks, Brazil’s political crisis and other fast-changing events.

Twitter told the newspaper in a statement that its “data is largely public and the US government may review public accounts on its own, like any user could.”

The development comes as high-profile tech companies in the US face off against the government on how information should be shared in the fight against terrorism.

Earlier this year, the FBI paid more than $1 million (880,000 euros) to a third party to break into an iPhone used by one of the shooters in a killing spree in San Bernardino, California, after Apple refused to help authorities crack the device.

The tech giant cited concerns over digital security and privacy.

Facebook Suppression of Conservatives Revealed

Former Facebook Workers: We Routinely Suppressed Conservative News

Gizmodo: Facebook workers routinely suppressed news stories of interest to conservative readers from the social network’s influential “trending” news section, according to a former journalist who worked on the project. This individual says that workers prevented stories about the right-wing CPAC gathering, Mitt Romney, Rand Paul, and other conservative topics from appearing in the highly-influential section, even though they were organically trending among the site’s users.

Several former Facebook “news curators,” as they were known internally, also told Gizmodo that they were instructed to artificially “inject” selected stories into the trending news module, even if they weren’t popular enough to warrant inclusion—or in some cases weren’t trending at all. The former curators, all of whom worked as contractors, also said they were directed not to include news about Facebook itself in the trending module.

In other words, Facebook’s news section operates like a traditional newsroom, reflecting the biases of its workers and the institutional imperatives of the corporation. Imposing human editorial values onto the lists of topics an algorithm spits out is by no means a bad thing—but it is in stark contrast to the company’s claims that the trending module simply lists “topics that have recently become popular on Facebook.”

Related reading: I Asked a Privacy Lawyer What Facebook’s New Terms and Conditions Will Mean for You

These new allegations emerged after Gizmodo last week revealed details about the inner workings of Facebook’s trending news team—a small group of young journalists, primarily educated at Ivy League or private East Coast universities, who curate the “trending” module on the upper-right-hand corner of the site. As we reported last week, curators have access to a ranked list of trending topics surfaced by Facebook’s algorithm, which prioritizes the stories that should be shown to Facebook users in the trending section. The curators write headlines and summaries of each topic, and include links to news sites. The section, which launched in 2014, constitutes some of the most powerful real estate on the internet and helps dictate what news Facebook’s users—167 million in the US alone—are reading at any given moment.

“Depending on who was on shift, things would be blacklisted or trending,” said the former curator. This individual asked to remain anonymous, citing fear of retribution from the company. The former curator is politically conservative, one of a very small handful of curators with such views on the trending team. “I’d come on shift and I’d discover that CPAC or Mitt Romney or Glenn Beck or popular conservative topics wouldn’t be trending because either the curator didn’t recognize the news topic or it was like they had a bias against Ted Cruz.”

The former curator was so troubled by the omissions that they kept a running log of them at the time; this individual provided the notes to Gizmodo. Among the deep-sixed or suppressed topics on the list: former IRS official Lois Lerner, who was accused by Republicans of inappropriately scrutinizing conservative groups; Wisconsin Gov. Scott Walker; popular conservative news aggregator the Drudge Report; Chris Kyle, the former Navy SEAL who was murdered in 2013; and former Fox News contributor Steven Crowder. “I believe it had a chilling effect on conservative news,” the former curator said.

Another former curator agreed that the operation had an aversion to right-wing news sources. “It was absolutely bias. We were doing it subjectively. It just depends on who the curator is and what time of day it is,” said the former curator. “Every once in awhile a Red State or conservative news source would have a story. But we would have to go and find the same story from a more neutral outlet that wasn’t as biased.”

Stories covered by conservative outlets (like Breitbart, Washington Examiner, and Newsmax) that were trending enough to be picked up by Facebook’s algorithm were excluded unless mainstream sites like the New York Times, the BBC, and CNN covered the same stories.

Other former curators interviewed by Gizmodo denied consciously suppressing conservative news, and we were unable to determine if left-wing news topics or sources were similarly suppressed. The conservative curator described the omissions as a function of his colleagues’ judgements; there is no evidence that Facebook management mandated or was even aware of any political bias at work.

Managers on the trending news team did, however, explicitly instruct curators to artificially manipulate the trending module in a different way: When users weren’t reading stories that management viewed as important, several former workers said, curators were told to put them in the trending news feed anyway. Several former curators described using something called an “injection tool” to push topics into the trending module that weren’t organically being shared or discussed enough to warrant inclusion—putting the headlines in front of thousands of readers rather than allowing stories to surface on their own. In some cases, after a topic was injected, it actually became the number one trending news topic on Facebook.

“We were told that if we saw something, a news story that was on the front page of these ten sites, like CNN, the New York Times, and BBC, then we could inject the topic,” said one former curator. “If it looked like it had enough news sites covering the story, we could inject it—even if it wasn’t naturally trending.” Sometimes, breaking news would be injected because it wasn’t attaining critical mass on Facebook quickly enough to be deemed “trending” by the algorithm. Former curators cited the disappearance of Malaysia Airlines flight MH370 and the Charlie Hebdo attacks in Paris as two instances in which non-trending stories were forced into the module. Facebook has struggled to compete with Twitter when it comes to delivering real-time news to users; the injection tool may have been designed to artificially correct for that deficiency in the network. “We would get yelled at if it was all over Twitter and not on Facebook,” one former curator said.

In other instances, curators would inject a story—even if it wasn’t being widely discussed on Facebook—because it was deemed important for making the network look like a place where people talked about hard news. “People stopped caring about Syria,” one former curator said. “[And] if it wasn’t trending on Facebook, it would make Facebook look bad.” That same curator said the Black Lives Matter movement was also injected into Facebook’s trending news module. “Facebook got a lot of pressure about not having a trending topic for Black Lives Matter,” the individual said. “They realized it was a problem, and they boosted it in the ordering. They gave it preference over other topics. When we injected it, everyone started saying, ‘Yeah, now I’m seeing it as number one’.” This particular injection is especially noteworthy because the #BlackLivesMatter movement originated on Facebook, and the ensuing media coverage of the movement often noted its powerful social media presence.

(In February, CEO Mark Zuckerberg expressed his support for the movement in an internal memo chastising Facebook employees for defacing Black Lives Matter slogans on the company’s internal “signature wall.”)

When stories about Facebook itself would trend organically on the network, news curators used less discretion—they were told not to include these stories at all. “When it was a story about the company, we were told not to touch it,” said one former curator. “It had to be cleared through several channels, even if it was being shared quite a bit. We were told that we should not be putting it on the trending tool.”

(The curators interviewed for this story worked for Facebook across a timespan ranging from mid-2014 to December 2015.)

“We were always cautious about covering Facebook,” said another former curator. “We would always wait to get second level approval before trending something to Facebook. Usually we had the authority to trend anything on our own [but] if it was something involving Facebook, the copy editor would call their manager, and that manager might even call their manager before approving a topic involving Facebook.”

Gizmodo reached out to Facebook for comment about each of these specific claims via email and phone, but did not receive a response.

Several former curators said that as the trending news algorithm improved, there were fewer instances of stories being injected. They also said that the trending news process was constantly being changed, so there’s no way to know exactly how the module is run now. But the revelations undermine any presumption of Facebook as a neutral pipeline for news, or the trending news module as an algorithmically-driven list of what people are actually talking about.

Rather, Facebook’s efforts to play the news game reveal the company to be much like the news outlets it is rapidly driving toward irrelevancy: a select group of professionals with vaguely center-left sensibilities. It just happens to be one that poses as a neutral reflection of the vox populi, has the power to influence what billions of users see, and openly discusses whether it should use that power to influence presidential elections.

“It wasn’t trending news at all,” said the former curator who logged conservative news omissions. “It was an opinion.”

[Disclosure: Facebook has launched a program that pays publishers, including the New York Times and Buzzfeed, to produce videos for its Facebook Live tool. Gawker Media, Gizmodo’s parent company, recently joined that program.]

 

Illegal Border Crossings v. Visa Overstays

No one can get the image of the train carrying illegals out of their memory and with good reason. When anyone does a search on the internet to determine the actual and factual numbers of immigrants coming across the southern border by year, you will be disappointed, the charts and records are not there. Countless outlets and agencies report but with caveats and obscure labels. Still we are told the border is as secure as it has ever been.

Related reading: The Human Tragedy of Illegal Immigration: Greater Efforts Needed to Combat Smuggling and Violence

What is more chilling, are the reports that once again we are in a spike season of illegal entry due in part to threats of presidential candidates. Further, those already here are filing at an accelerated rate for citizenship for the exact same reason.

There is a clash however in the facts over which is worse, those coming across the border versus those coming in by air or other means possessing a vThe Visa Waiver Program (VWP) enables most citizens or nationals of participating countries* to travel to the United States for tourism or business for stays of 90 days or less without first obtaining a visa, when they meet all requirements explained below. Travelers must have a valid Electronic System for Travel Authorization (ESTA) approval prior to travel. If you prefer to have a visa in your passport, you may still apply for a visitor (B) visa.isa that has an expiration date. Take note that any international airport across the United States is a port of entry. Once a visa is issued by State Department contractors, it becomes the burden of the Department of Homeland Security to ensure compliance to dates. This is where the problem, yet another lays with fault.

One cannot overlook the Visa Waiver Program concocted by the U.S. State Department of which several in Congress are calling for a suspension.

Citizens or nationals of the following countries* are currently eligible to travel to the United States under the VWP, unless citizens of one of these countries are also a national of Iraq, Iran, Syria, or Sudan.

Andorra Hungary Norway
Australia Iceland Portugal
Austria Ireland San Marino
Belgium Italy Singapore
Brunei Japan Slovakia
Chile Latvia Slovenia
Czech Republic Liechtenstein South Korea
Denmark Lithuania Spain
Estonia Luxembourg Sweden
Finland Malta Switzerland
France Monaco Taiwan*
Germany Netherlands United Kingdom**
Greece New Zealand

There are an estimated 35 unique types of visa classifications under the management of the U.S. State Department.

 

Obama Admin Deported Less Than One Percent of Visa Overstays

Nearly half a million individuals overstayed visas in 2015, fewer than 2,500 deported

Kredo/FreeBeacon: The Obama administration deported less than one percent of the nearly half a million foreign nationals who illegally overstayed their visas in 2015, according to new statistics published by the Department of Homeland Security.

Of the 482,781 aliens who were recorded to have overstayed temporary U.S. visas in fiscal year 2015, just 2,456 were successfully deported from the United States during the same period, according to DHS’s figures, which amounts to a deportation rate of around 0.5 percent.

The sinking rate of deportations by the Obama administration is drawing criticism from Capitol Hill, where lawmakers are warning that the administration is ignoring illegal overstays and potentially opening the United States to terrorist threats.

The 482,781 figure accounts for aliens who entered the United States on a nonimmigrant visitor visa or through the Visa Waiver Program, which streamlines travel between the United States and certain other countries. The figure encompasses foreign nationals who were found to have remained in the United States after their visas expired or after the 90-day window allowed by the Visa Waiver Program.

The actual number of overstays could be higher. The latest figures published by DHS do not include overstays from other visa categories or overstays by individuals who entered the United States through land ports, such as those along the Mexican border.

Deportations by the Obama administration have decreased steadily since 2009, according to figures codified by the Senate’s Subcommittee on Immigration and the National Interest and provided to the Washington Free Beacon.

Since 2009, U.S. Immigration and Customs Enforcement has expelled 51,704 individuals who overstayed their visas. The total number of those expelled has decreased every fiscal year.

At least 12,538 illegal overstays were deported in fiscal 2009, while 11,259 were removed in 2010, 10,426 in 2011, 6,856 in 2012, 4,240 in 2013, 3,564 in 2014, and 2,456 in 2015, according to the committee.

The drop is being attributed by sources to an Obama administration policy directing DHS and ICE not to pursue visa overstays unless the offender has been convicted of major crimes or terrorism.

“The decision by the Obama administration not to enforce immigration laws by allowing those who have overstayed their visas to remain in the country has not gone unnoticed by the American people,” sources on the Senate subcommittee told the Free Beacon. “A Rasmussen Reports poll released earlier this year indicates that approximately 3 out of 4 Americans not only want the Obama administration to find these aliens who overstay their visas, but also to deport them.”

“The same poll indicates that 68 percent of Americans consider visa overstays a ‘serious national security risk,’ and 31 percent consider visa overstays a ‘very serious’ national security risk,” according to the sources.

Congress has long mandated the implementation of a biometric entry-exit system to track individuals who overstay their visas and ensure they leave the United States.

Sen. Jeff Sessions (R., Ala.), chair of the Senate’s immigration subcommittee, recently proposed an amendment aimed at speeding up implementation of this system. Senate Democrats blocked the amendment.

97d0ba07-f3c5-45eb-9b87-ba1ec93c169a

Immigration and Customs Enforcement has received substantially more taxpayer money in recent years despite the plummeting rate of deportations. At least 43 percent fewer aliens were removed from the United States from 2012 to 2015, according to DHS statistics.

Today: National Change Your Password Day, Why?

Russian Hackers Have 270 Million Email Logins, Including Gmail and Yahoo Accounts

Gizmodo: A report from Reuters suggests that over 270 million hacked email credentials—including those from Gmail, Hotmail and Yahoo—are circulating among Russian digital crime rings.

Reuters reports that an investigation by Hold Security revealed the huge stash of login details, that are said to be being traded among criminals. Many of the credentials relate to the Russian email service Mail.ru, but the team has also identified details from Google, Yahoo and Microsoft.

Update: There may, however, not be too much cause for concern, as Motherboard points out that the data may in fact be taken from a series of older hacks, which means the credentials are likely useless.

The team from Hold Security was offered a tranche of 1.17 billion email user records in an online forum, and asked to pay just $1 for a copy of the data. The team refused to pay for stolen data, but was given the information anyway when it offered to post positive comments about the hacker online.

The team has since sifted through the data set to remove duplicates, revealing that it contains 270 million unique records. Alex Holden, the founder of Hold Security, told Reuters that the data was “potent,” adding that the “credentials can be abused multiple times.”

Hold Security has apparently alerted all of the affected email providers. Mail.ru, Google, Yahoo and Microsoft are all now investigating the situation.

A Microsoft spokesperson told Gizmodo that “unfortunately, there are places on the internet where leaked and stolen credentials are posted,” adding that it “has security measures in place to detect account compromise and requires additional information to verify the account owner and help them regain sole access to their account.”

It may be that the stash is out of date and doesn’t present too much of a security threat—though, of course, it could be a new pool of data, in which case the accounts included in the tranche could be at risk. Initial reports to the BBC from Mail.ru suggest that, from a sample of the records, there may not be many live email-passwords combinations in the data.

But it may be a good time to refresh your password anyway.

****

In a Wednesday statement, Mail.ru said its early analysis suggests many username/password combinations contain the same username paired with different passwords.

“We are now checking whether any username/password combinations match valid login information for our email service, and as soon as we have enough information we will warn the users that might have been affected,” the Russian service said.

The cache reportedly included tens of millions of certificates for Google Gmail, Microsoft Hotmail, and Yahoo Mail, as well as German and Chinese email providers.

“Unfortunately, there are places on the Internet where leaked and stolen credentials are posted, and when we come across these or someone sends them to us, we act to protect customers,” a Microsoft spokeswoman told PCMag. “Microsoft has security measures in place to detect account compromise and requires additional information to verify the account owner and help them regain sole access to their account.”

Google declined to comment, while Yahoo did not immediately respond to PCMag’s request.

The junior hacker—either inexperienced in the art of haggling, or just too rich to care—asked for only 50 rubles in exchange for the “incredibly large set of data.” Equivalent to about 75 cents, the payment request did little to boost Hold Security’s confidence in the data’s credibility and value. The move was “similar to an expensive sports car being sold for pennies at auction,” the firm said.

Hold refused to pay and convinced the hacker to trade the data for likes/votes on his social media page.

“At the end, this kid from a small town in Russia collected an incredible 1.17 billion stolen credentials from numerous breaches that we are still working on identifying,” Hold Security said. More from PC Magazine.

*****

In a shocking report from FireEye Inc., a California security firm with top government connections, as well as three other reports, the existence of a Russian-based hacker group, which appears to be a joint effort by the Russian government and the Russian Mafia, has been revealed, The Wall Street Journal reports.

Terming the hacker attack “Safacy” or “APT28,” the computer anti-hacking firm’s report, called “A Window Into Russia’s Cyber Espionage Operations,” notes, “We assess that APT28’s work is sponsored by the Russian government” and is more technically sophisticated than Chinese-hacking efforts earlier detected and exposed by FireEye, the report states.
“I worry a lot more about the Russians” than about China, James Clapper, director of national intelligence, said at a University of Texas forum, the Journal reports. More from NewsMax.

Hillary Paid for Document/Hard Drive Destruction

Dates matter, so it would take some time to put the chronology together but certainly the subpoenas, FOIA requests and testimonies would clearly have occurred before February and March of 2016. It would appear obstruction of an FBI investigation and congressional procedures and law has entered a new realm by the Clinton camp.

We cant know the status at this point of the FBI investigation, but there are some great journalists that are doing some collateral investigations. It is clear there are known and unknown moving parts, such that Hillary are her team may not be able to survive this at all, even given the denials by her legal teams.

Clinton Campaign Made Payments to Hard Drive and Document Destruction Company

Payments could have purchased destruction of 14 hard drives

FreeBeacon: The Hillary Clinton campaign made multiple payments to a company that specializes in hard drive and document destruction, campaign finance records show.

The payments, which were recorded in February and March of 2016, went to the Nevada-based American Document Destruction, Inc., which claims expertise in destroying hard drives or “anything else that a hard drive can come from.”

“Our hard drive destruction procedures take place either at your site or at our secure facility in Sparks, NV,” the company’s website states. “This decision is yours to decide based on cost and convenience to you. In either situation, the hard drive will be destroyed by a shredding.”

“We have a dedicated machine for hard drive destruction,” the website continues. “We will also record the serial numbers of all drives to be destroyed to be kept in our records. A copy of this log can be provided to you as well.”

The routine services section of the site says that the company operates in 26 areas in Nevada and California, including Reno, Virginia City, Sparks, Tahoe City, and Carson City.

“Our equipment is powerful. Whether you require ON SITE or OFF SITE service, performed at our Sparks facility, large volumes can be quickly destroyed regardless of staples, clips or fasteners,” the site says. “Office paper, folders, binders and computer media can be destroyed in just minutes. As a result, we pass the savings on to you! A new service we also offer is computer hard drive destruction, either ON-SITE or OFF-SITE.”

“ADDNV, Inc. ensures that even small amounts are economical to have destroyed. ADDNV, Inc. encourages our clients to visit the Sparks facility to observe the shredding of your documents. The added bonus with ADDNV, Inc. is that we offer personal service whenever you need it. We can be reached locally and our customers are more than just account numbers in a large franchise.”

Transactions from Hillary for America to American Document Destruction, Inc. were made to the Sparks, Nevada location.

The first payment from the campaign to the destruction company came on Feb. 3 in the amount of $43, Federal Election Commission filings shows.

Two additional payments of $43 and $58 were made on Feb. 21. A fourth payment of $43 was made on March 26, bringing the amount paid to the destruction company to $187.

The Washington Free Beacon contacted American Document Destruction, Inc. to inquire about its rates.

An employee for the company said that it charges $10 per hard drive and $5 per cubic foot of paper. The Clinton campaign could have destroyed 14 hard drives or shredded 37.4 cubic feet of paper at those rates.

The Clinton campaign did not return a request for comment about what documents it paid to have destroyed.

*****

There is evidence that Marcel Lazar Lehel, (Guccifer) gained unauthorized access to Hillary’s server. Some in media are asking about his hacking the server. There is a distinct difference between entry and hacking. Guccifer has admitted to Fox News that he did gain entry and noticed several foreign IP addresses there as well as information about voting. It could be that he had no real interest in that kind of information on her server, so he chose not to exploit anything further in that regard to the media.

To date, there is nothing in Lehel’s responses that appear to be erroneous as compared to what has been determined in the official investigations.

Romanian hacker Guccifer: I breached Clinton server, ‘it was easy’

Fox EXCLUSIVE: The infamous Romanian hacker known as “Guccifer,” speaking exclusively with Fox News, claimed he easily – and repeatedly – breached former Secretary of State Hillary Clinton’s personal email server in early 2013.

“For me, it was easy … easy for me, for everybody,” Marcel Lehel Lazar, who goes by the moniker “Guccifer,” told Fox News from a Virginia jail where he is being held.

Guccifer’s potential role in the Clinton email investigation was first reported by Fox News last month. The hacker subsequently claimed he was able to access the server – and provided extensive details about how he did it and what he found – over the course of a half-hour jailhouse interview and a series of recorded phone calls with Fox News.

Fox News could not independently confirm Lazar’s claims.

In response to Lazar’s claims, the Clinton campaign issued a statement  Wednesday night saying, “There is absolutely no basis to believe the claims made by this criminal from his prison cell. In addition to the fact he offers no proof to support his claims, his descriptions of Secretary Clinton’s server are inaccurate. It is unfathomable that he would have gained access to her emails and not leaked them the way he did to his other victims.”

The former secretary of state’s server held nearly 2,200 emails containing information now deemed classified, and another 22 at the “Top Secret” level.

The 44-year-old Lazar said he first compromised Clinton confidant Sidney Blumenthal’s AOL account, in March 2013, and used that as a stepping stone to the Clinton server. He said he accessed Clinton’s server “like twice,” though he described the contents as “not interest[ing]” to him at the time.

“I was not paying attention. For me, it was not like the Hillary Clinton server, it was like an email server she and others were using with political voting stuff,” Guccifer said.

The hacker spoke freely with Fox News from the detention center in Alexandria, Va., where he’s been held since his extradition to the U.S. on federal charges relating to other alleged cyber-crimes. Wearing a green jumpsuit, Lazar was relaxed and polite in the monitored secure visitor center, separated by thick security glass.

In describing the process, Lazar said he did extensive research on the web and then guessed Blumenthal’s security question. Once inside Blumenthal’s account, Lazar said he saw dozens of messages from the Clinton email address.

Asked if he was curious about the address, Lazar merely smiled. Asked if he used the same security question approach to access the Clinton emails, he said no – then described how he allegedly got inside.

“For example, when Sidney Blumenthal got an email, I checked the email pattern from Hillary Clinton, from Colin Powell from anyone else to find out the originating IP. … When they send a letter, the email header is the originating IP usually,” Lazar explained.

He said, “then I scanned with an IP scanner.”

Lazar  emphasized that he used readily available web programs to see if the server was “alive” and which ports were open. Lazar identified programs like netscan, Netmap, Wireshark and Angry IP, though it was not possible to confirm independently which, if any, he used.

In the process of mining data from the Blumenthal account, Lazar said he came across evidence that others were on the Clinton server.

“As far as I remember, yes, there were … up to 10, like, IPs from other parts of the world,” he said.

With no formal computer training, he did most of his hacking from a small Romanian village.

Lazar said he chose to use “proxy servers in Russia,” describing them as the best, providing anonymity.

Cyber experts who spoke with Fox News said the process Lazar described is plausible. The federal indictment Lazar faces in the U.S. for cyber-crimes specifically alleges he used “a proxy server located in Russia” for the Blumenthal compromise.

Each Internet Protocol (IP) address has a unique numeric code, like a phone number or home address.  The Democratic presidential front-runner’s home-brew private server was reportedly installed in her home in Chappaqua, N.Y., and used for all U.S. government business during her term as secretary of state.

Former State Department IT staffer Bryan Pagliano, who installed and maintained the server, has been granted immunity by the Department of Justice and is cooperating with the FBI in its ongoing criminal investigation into Clinton’s use of the private server. An intelligence source told Fox News last month that Lazar also could help the FBI make the case that Clinton’s email server may have been compromised by a third party.

Asked what he would say to those skeptical of his claims, Lazar cited “the evidence you can find in the Guccifer archives as far as I can remember.”

Writing under his alias Guccifer, Lazar released to media outlets in March 2013 multiple exchanges between Blumenthal and Clinton. They were first reported by the Smoking Gun.

It was through the Blumenthal compromise that the Clintonemail.com accounts were first publicly revealed.

As recently as this week, Clinton said neither she nor her aides had been contacted by the FBI about the criminal investigation. Asked whether the server had been compromised by foreign hackers, she told MSNBC on Tuesday, “No, not at all.”

Recently extradited, Lazar faces trial Sept. 12 in the Eastern District of Virginia. He has pleaded not guilty to a nine-count federal indictment for his alleged hacking crimes in the U.S. Victims are not named in the indictment but reportedly include Colin Powell, a member of the Bush family and others including Blumenthal.

Lazar spoke extensively about Blumenthal’s account, noting his emails were “interesting” and had information about “the Middle East and what they were doing there.”

After first writing to the accused hacker on April 19, Fox News accepted two collect calls from him, over a seven-day period, before meeting with him in person at the jail. During these early phone calls, Lazar was more guarded.

After the detention center meeting, Fox News conducted additional interviews by phone and, with Lazar’s permission, recorded them for broadcast.

While Lazar’s claims cannot be independently verified, three computer security specialists, including two former senior intelligence officials, said the process described is plausible and the Clinton server, now in FBI custody, may have an electronic record that would confirm or disprove Guccifer’s claims.

“This sounds like the classic attack of the late 1990s. A smart individual who knows the tools and the technology and is looking for glaring weaknesses in Internet-connected devices,” Bob Gourley, a former chief technology officer (CTO) for the Defense Intelligence Agency, said.

Gourley, who has worked in cybersecurity for more than two decades, said the programs cited to access the server can be dual purpose. “These programs are used by security professionals to make sure systems are configured appropriately. Hackers will look and see what the gaps are, and focus their energies on penetrating a system,” he said.

Cybersecurity expert Morgan Wright observed, “The Blumenthal account gave [Lazar] a road map to get to the Clinton server. … You get a foothold in one system. You get intelligence from that system, and then you start to move.”

In March, the New York Times reported the Clinton server security logs showed no evidence of a breach.  On whether the Clinton security logs would show a compromise, Wright made the comparison to a bank heist: “Let’s say only one camera was on in the bank. If you don‘t have them all on, or the right one in the right locations, you won’t see what you are looking for.”

Gourley said the logs may not tell the whole story and the hard drives, three years after the fact, may not have a lot of related data left. He also warned: “Unfortunately, in this community, a lot people make up stories and it’s hard to tell what’s really true until you get into the forensics information and get hard facts.”

For Lazar, a plea agreement where he cooperates in exchange for a reduced sentence would be advantageous. He told Fox News he has nothing to hide and wants to cooperate with the U.S. government, adding that he has hidden two gigabytes of data that is “too hot” and “it is a matter of national security.”

In early April, at the time of Lazar’s extradition from a Romanian prison where he already was serving a seven-year sentence for cyber-crimes, a former senior FBI official said the timing was striking.

“Because of the proximity to Sidney Blumenthal and the activity involving Hillary’s emails, [the timing] seems to be something beyond curious,” said Ron Hosko, former assistant director of the FBI’s Criminal Investigative Division from 2012-2014.

The FBI offered no statement to Fox News.