Could Loretta Lynch Decide Hillary’s Fate?

Truth be known, Hillary was ONLY allowed to use a specially designed Blackberry as was the policy at the State Department. But lil miss Hillary admitted to finessing that policy by also using an iPhone, iPad, and other tablets. She is shown here in her own words.

It must be included in this EmailGate affair as the Clinton server resides in their home in New York which is currently under the legal jurisdiction of AG Loretta Lynch and she is slate to be confirmed next week by the Senate to replace the now resigned U.S. Attorney General Eric Holder. Lynch is a legal protective firewall of the White House and all government employees, so Hillary’s fate could necessarily be placed in the lap of Loretta Lynch, which means that Hillary could be on the good receiving end of the Department of IN-Justice.

So this begins to add more gasoline to the fire and more comes out where it could be that Hillary committed a felony. Everyone at the State Department assigned directly to Hillary’s inner circle knew about her exclusive email server and private emails. This server should be considered either a proxy server under the ownership of the State Department and hence part of official government property or it could be called an alias server still part of government property. It would be also prudent at this juncture to ask who else uses private emails….alas that of Lisa Jackson the formerly of the EPA and are there other alias servers out there as well. Digressing….

One of the defenses that Hillary Clinton offered at yesterday’s press conference was that she had complied with federal records laws because those laws leave it up to her, as the employee who created or received an e-mail, to decide whether that e-mail must be preserved under the Federal Records Act. But while Clinton is correct that every employee has to make some initial determination of whether a particular document is an official “record,” the ultimate determination is most definitely not up to the employee, but rather to the agency and its records-management officials. Bear with me through some bureaucratic mumbo-jumbo for a moment, because the payoff is pretty significant. That Mrs. Clinton is not the ultimate arbiter of whether her records must be preserved is made very clear in the Department of State’s own records-management manual. Under a provision titled “Removal Procedures,” the manual sets forth the process that each Department of State employee must go through upon separation (i.e., resignation or retirement) from the department. In addition to relinquishing classified materials, all employees are required to clear the removal of any unclassified materials through records-management officials.

First, the “departing official or a staff member must prepare an inventory of personal papers and nonrecord materials proposed for removal.” The departing official must then “request a review of the materials proposed for removal.” Lest Mrs. Clinton claim she was not subject to this rule, the manual provides that this review process is specifically required for “Presidential appointees confirmed by the Senate.” The purpose of this independent review by records officials (as opposed to simply accepting the say-so of the departing official) is “to certify that the documentary materials proposed for removal may be removed without diminishing the official records of the Department; violating national security, privacy or other restrictions on disclosure; or exceeding normal administrative economies.” The process “generally requires a hands-on examination of the materials to verify the accuracy of the inventory.” (5 FAH-4 H-217.2(b)). Finally, there is a formal certification by the State Department records official authorizing the employee to remove the documents from State’s custody: “Once the reviewing official is satisfied that documentary materials proposed for removal comply with Federal law and regulations the reviewing official completes Form DS-1904, Authorization for the Removal of Personal Papers and Non-Record Materials, and forwards the form and the inventory to the Department of State records officer.” These “nonrecord materials” may be removed only “when authorized by the Department and only to the extent that their removal does not: (1) Diminish the official records of the Department; (2) Violate confidentiality required by national security, privacy or other restrictions on disclosure (e.g., commercial or financial information, personnel files or investigative records); (3) Exceed normal administrative economies.” Despite her repeated protestations at yesterday’s press conference that she followed all applicable rules, it is pellucid that she did not. Mrs. Clinton plainly did not just remove personal e-mails without clearing that removal with records officials; she also did not even return official records. Her defense now is that returning the documents two years later is good enough. But the same records manual emphatically rebuts that post-hoc justification. The department’s records manual requires that departing officials “must ensure that all record material that they possess is incorporated in the Department’s official files and that all file searches for which they have been tasked have been completed, such as those required to respond to FOIA, Congressional, or litigation-related document requests.” And lest the employee not get the message, the manual adds that “fines, imprisonment, or both may be imposed for the willful and unlawful removal or destruction of records as stated in the U.S. Criminal Code (e.g., 18 U.S.C., section 2071).” I have already discussed here the question of whether Mrs. Clinton may have violated that criminal prohibition on willful concealment of government records, and the evidence to date — especially her disclosure yesterday that she deleted any document that she determined to be personal in nature (without permission of the Department under the records-removal guidelines) — suggests a strong possibility that she did. But might she have lied to department records officials when she separated from service? The department’s records manual (5 FAH-4 H-217.1(a)) requires that records officials “remind[] all officials, about to leave the Department or a post, of the requirements for the removal of personal papers and nonrecord materials.” Critically, the department enforces “compliance with these procedures for the removal of documentary materials prior to execution of the Separation Statement (Form OF-109).” And what is Form OF-109? It is a formal separation statement, in which the departing official certifies the return of any classified materials, and, more relevant for present purposes, that the departing official has “surrendered to responsible officials all unclassified documents, and papers relating to the official business of the Government acquired by me while in the employ of the Department.” The form makes very clear that a false statement in the certification is punishable as a crime, including under 18 U.S.C. § 1001, which makes it a crime to knowingly and willfully falsify or conceal facts in statements made to federal agencies concerning a matter within its jurisdiction. According to the department’s procedures, then, every departing official is required to certify the return of all government documents under penalty of law. Did Hillary Clinton sign such a certification upon her separation from government? Did she knowingly swear that she had returned all records, when in fact she had retained at least 55,000 pages of official e-mails (and perhaps more)? And if she did not sign such a certification, why not? Every other departing employee and official of the State Department is required to do so. Did she ignore her obligations to return the records and thus avoid a false certification? It seems that the one document in all of this that we need to see, if it exists, is Hillary Clinton’s Form OF-109.
**** Get some popcorn, there is more…

Besides exclusively using a secret email account to conduct official government business, it’s likely that Hillary Clinton also used unauthorized electronic equipment—an iPad and an iPhone—as Secretary of State after being warned not to, a veteran State Department official told Judicial Watch this week.

On at least half a dozen occasions Clinton’s top aides asked the State Department’s Office of Security Technology to approve the use of an iPad and iPhone, according to JW’s inside source. Each time the request was rejected for security reasons, the source confirms. The only mobile device that meets the agency’s security standards is the BlackBerry, JW’s source said, adding that the Office of Security Technology—Bureau of Diplomatic Security’s Directorate  of Countermeasures must approve all equipment such as cameras, phones and communication devices for all officials.

Evidently set on using the popular Apple devices, Clinton repeatedly challenged the ban and asked management in the Office of Security Technology to allow their use. The executive secretariat responsible for all communications and information technology always rejected the requests, JW’s source affirms. “From day one Hillary was trying to get the iPhone and the iPad approved,” the State Department official told JW. “She kept trying and trying to get us to approve the iPhone and the iPad, but we wouldn’t do it. Technology security experts tested the iPhone and the iPad several times because she constantly wanted them approved, but it never happened.”

The longtime State Department employee reveals that it’s common knowledge among government security tech experts that Apple devices don’t meet strict security standards so agency insiders were puzzled that the Secretary of State was hell-bent on using them. “There was a lot of head-scratching,” JW’s source revealed. Every State Department employee goes through a rigorous security training that includes strict warnings about using non approved equipment or personal email like Clinton did throughout her tenure as the president’s chief foreign affairs officer, the agency insider said.

Clinton’s persistent efforts to persuade the State Department’s technology security experts to approve the use of her favorite Apple devices led those in the division to conclude that she did in fact go through with it. “My guess is she did it and wanted approval after the fact,” JW’s source said. “But no waivers were ever issued.” JW reached out to the State Department for a comment on this latest potential scandal surrounding its former leader, but failed to get a response.

In the meantime, JW has launched a full-scale investigation into Clinton’s secret email system and has filed a number of Freedom of Information Act (FOIA) requests that will likely end up being litigated in federal court. Prior to the email scandal JW already had nearly a dozen active lawsuits in federal court that could be affected by Clinton and her staff’s use of secret email accounts to conduct official government business. Among them is a public-records request for communications between the former Secretary of State and her Chief of Staff, Huma Abedin with Nagla Mahmoud, wife of ousted Egyptian President Mohammad Morsi.

Hillary was Hacked, Data Virgin Islands/Ukraine

EmailGate courtesy of Hillary Clinton’s home server has taken on a life of its own.

From the Blaze:

Clinton Email Domain Hosted by a Company That Was Hacked in 2010 and Had Data Redirected to Ukraine — and IP Address Reveals Link to British Virgin Islands

As news of Hillary Clinton using a private email during her tenure as Secretary of State continues to emerge, TheBlaze has learned that the email domain was hosted by a “consumer grade” company whose data was hacked in 2010, with information being sent to Ukraine. Additionally, data reveals that the domain was hosted at one point in the British Virgin Islands. This, experts say, is a big security no-no.

Domain history data reveals Clintonemail.com was registered in 2009 with Network Solutions, shortly after Clinton was appointed as the nation’s top diplomat. But the decision to host the domain for such a high-profile person on a consumer registrar like Network Solutions is questionable to security experts.

Bill Sweetman, a domain registration expert based in Canada who describes himself as part of the “left-leaning camp,” told TheBlaze Friday that the whole Clinton email controversy has struck him as “naive on the part of the players.”

Image source: DomainTools.com
.

“If you’re someone that is concerned about security of your data, you don’t go and register your domain name with a consumer-oriented registrar like Network Solutions or GoDaddy,” Sweetman said.

Image source: DomainTools.com

“You would work either with a corporate domain registrar like MarkMonitor or CVSC, or you would talk to your employer – in this case the government – about their internal solutions that would protect the domain name and would protect the data associated with it.”

Sweetman isn’t alone in thinking this.

Rod Rasmussen, a leading expert on the abuse of domain name systems, wrote in a 2013 column for the trade publication Security Week, that any domain managers using a consumer-grade registrar for a “major enterprise” should lose their jobs. Rasmussen wrote the piece after Network Solutions was hacked in 2010, resulting in thousands of domains being transferred to Confluence Networks, a domain registrar traced to the British Virgin Islands.

“When it comes to Internet security, there is absolutely no way major corporations would use consumer grade anti-malware and anti-phishing solutions as a one-stop security solution. So why would major organizations – we’re talking major Fortune 500 companies, government agencies, financial services and critical infrastructure organizations – put their domains in the hands of consumer grade registrars?” Rasmussen wrote.

Among the companies whose domains were moved offshore at the time of Rasmussen’s column were organizations like LinkedIn, Fidelity, Craigslist, Yelp and the U.S. Postal Service

“We have received reports that Network Solutions customers are seeing malicious code added to their websites, and we are really sorry for this experience,” company spokesman Shashi Bellamkonda wrote in a company blog post at the time. Aside from that admission, Rasmussen wrote that Network Solutions has been “tight-lipped” about the details, only adding that the websites of a “small number” of customers were “inadvertently affected for up to several hours.”

Computer World reported in 2010 that throughout the course of the attack, users of up to 50 domains hosted by Network Solutions were redirected to a Ukrainian attack server.  Historical domain data associated with Clintonemail.com reveals the last recorded change to a Clintonemail.com IP address occurred Dec. 22, 2011. A simple lookup of that particular IP address shows it is hosted in Road Town, British Virgin Islands, although its unclear whether the offshore IP address is a direct result of the Network Solutions hack.

What’s also unclear is whether Clintonemail.com was one of the domains directly involved in the same attack that redirected to a Ukrainian attack server. What is evident, however, is that the security threat posed by Hillary Clinton using a “consumer-grade registrar” for her private email domain, potentially containing classified information, was greater than the threat that could have been posed had she decided to use the State.gov domain.

Since the New York Times broke the story, questions surrounding Clinton’s use of private email have circulated throughout the media and even some members of her own party. Republicans, especially those who are expected to be considering a 2016 presidential run, have also pounced on the issue. After days of silence, Clinton finally tweeted a response to the controversy Thursday.

Clinton’s successor, Secretary of State John Kerry, told the press during a visit to Saudi Arabia that the review would be conducted “as rapidly as possible,” Reuters reported.

But the review of the nearly 55,000 emails Clinton sent from her private email could take some time, as one State Department official acknowledged: ”The review is likely to take several months given the sheer volume of the document set.”   ***    SIX YEARS

Hillary Clinton was in violation of State Department rules governing the use of non-governmental email accounts during her entire tenure as secretary of state and for nearly two years after she left the job, ABC News has learned.

A senior State Department official tells ABC News that under rules in place while Clinton was secretary of state, employees could only use private email accounts for official business if they turned those emails over to be entered into government computers. They were also forbidden from including sensitive but unclassified information on private email, except under some very narrow exceptions.

This policy is still in place, according to the Department. Until any private emails are entered into government computers, the official says, an employee is in violation of the rules.

Clinton used a private email account for her entire tenure as secretary — and did not even have a government-issued email. She only turned over some 55,000 pages of emails to be entered into government computer systems late last year, nearly two years after she stepped down from the State Department.

 

 

Hillary’s Emails, no Encryption and False Names

There was also stolen White House furniture and then Wall Street. The makings of a Hollywood movie in the text below:

Is the Mysterious ‘Eric Hoteham’ Actually Longtime Clinton Aide Eric Hothem? 

The name of the mysterious individual who registered the servers for Hillary Clinton’s private email address used at the State Department bears a striking resemblance to a longtime Clinton aide.

Clinton and her top aides in the State Department were using email addresses on a private server registered to the Clinton’s home in Chappaqua, New York, according to Internet records reviewed by the Associated Press.

The customer listed in records registering the Internet address to the Chappaqua home was “Eric Hoteham.” The AP, however, was unable to identify an “Eric Hoteham,” stating that the “name does not appear in public records databases, campaign contribution records, or Internet background searches.”

But the name is similar to that of Eric Hothem, who worked as a staff assistant for Clinton during her time as First Lady.

Hothem was involved in multiple personal matters during his service to Clinton and played a role in the controversy surrounding the pardon given to former President Bill Clinton’s half-brother Roger Clinton.

A congressional investigation into Clinton’s clemency decisions found that as Roger Clinton refused to testify to the committee in March 2001, he received a $15,000 wire transfer from a Citibank account in the care of Hothem.

The name of the account was “E.C. 934(A) c/o Eric Hothem.” Lawyers told the committee that “the account is a personal Citibank account of former President and Senator Clinton” and that the money was a loan for Roger Clinton to obtain legal counsel for the investigation.

The congressional report points out that the “payment occurred at the height of public outcry and investigative activity regarding the pardons and at a time when Roger Clinton was deciding whether to provide testimony.”

According to accounts of the final days of the Clinton administration, Hothem told chief White House usher Gary Walters that multiple items of furniture were “the Clintons’ personal property” even though they were not.

The Clintons would later have to return or pay for more than $100,000 in furnishings stolen from the White House.

Hothem also received a special acknowledgement in Hillary Clinton’s book Living History.

Hothem went to work for Citigroup, then moved to JP Morgan Chase in 2013, according to public disclosure reports accessed through the Securities and Exchange Commission.

The documents indicate that Hothem began his financial career in 2002, just a year after his last documented work as an aide to Clinton.

Members of Hothem’s JP Morgan office in Washington, D.C., said on Wednesday that they had “no comment” to any questions regarding Hothem and directed the Washington Free Beacon to the company’s media relations department.

Inquiries made to media relations were not answered by press time. An email sent to an account believed to be Hothem’s was also not returned.

An analysis of Clinton’s personal financial disclosure forms shows she maintained accounts worth millions of dollars at Citibank throughout her years in the Senate. She moved her largest accounts to JP Morgan in 2009.

Her most recent available public financial disclosure in 2012 shows that she holds up to $25 million worth of assets in a JP Morgan account. Hothem did not make the switch to JP Morgan until Clinton was out of federal office in May 2013.

Hothem has maintained ties to Democratic campaigns. His wife, Sue Hothem, has “raised millions of dollars in political contributions,” and helped found a political action committee worth nearly $1 million. She was also the director of development Democratic Leadership Council and the Progressive Policy Institute.

The Clinton Foundation did not respond to a request for comment by press time.

***    

Clinton’s E-Mail System Built For Privacy Though Not Security

No Encryption or protections and once the emails are gone…well they ARE gone?

A week before becoming Secretary of State, Hillary Clinton set up a private e-mail system that gave her a high level of control over communications, including the ability to erase messages completely, according to security experts who have examined Internet records.

“You erase it and everything’s gone,” Matt Devost, a security expert who has had his own private e-mail for years. Commercial services like those from Google Inc. and Yahoo! Inc. retain copies even after users erase them from their in-box.

Although Clinton worked hard to secure the private system, her consultants appear to have set it up with a misconfigured encryption system, something that left it vulnerable to hacking, said Alex McGeorge, head of threat intelligence at Immunity Inc., a Miami Beach-based digital security firm.

The e-mail flap has political significance because Clinton is preparing to announce a bid for the Democratic nomination for president as soon as April. It also reminds voters of allegations of secrecy that surrounded Bill Clinton’s White House. In those years, First Lady Hillary Clinton fought efforts by some White House advisers to turn over information to Whitewater investigators and, later, sought to keep secret records of her task force on health-care reform.

Representative Trey Gowdy, a South Carolina Republican who leads a special committee looking into the events surrounding the 2012 terrorist attack at a U.S. diplomatic facility in Benghazi, Libya, said he will subpoena Clinton’s e-mails.

“We’re going to use every bit of legal recourse at our disposal,” Gowdy said Wednesday during an interview on CNN.

Private Service

The committee also said Wednesday that it has discovered two e-mail addresses used by Clinton while secretary of state.

Nick Merrill, a Clinton spokesman, didn’t immediately respond to a request for comment, though he said in a statement Tuesday that her practices followed “both the letter and spirit of the rules.”

Setting up a private e-mail service was once onerous and rare. Now, it’s relatively easy, said Devost, president of FusionX LLC, based in Arlington, Virginia.

“There are tons of disadvantages of not having teams of government people to make sure that mail server isn’t compromised,” McGeorge said. “It’s just inherently less secure.”

Former Florida Governor and likely 2016 Republican presidential candidate Jeb Bush and used a personal e-mail while he was governor and has done so since, according to his spokeswoman, Kristy Campbell. He kept a server he owned in his state office and didn’t have a private server at home, Campbell said in a phone interview.

Bush E-Mails

Bush differed from Clinton in that it was known he was using a personal e-mail, his aides had regular access to the server and “his office consistently throughout his term complied with Florida’s public records laws,” Campbell said.

In order to ensure her e-mails were private, Clinton’s system appeared to use a commercial encryption product from Fortinet — a good step, McGeorge said.

However, when McGeorge examined the set-up this week he found it used a default encryption “certificate,” instead of one purchased specifically for Clinton’s service. Encryption certificates are like digital security badges, which websites use to signal to incoming browsers that they are legitimate.

“It’s bewildering to me,” he said. “We should have a much better standard of security for the secretary of state.”

Confirmation Hearing

Clinton’s private e-mail — hdr22@clintonemail.com — was on a domain set up Jan. 13, 2009, the same day a Senate committee held her confirmation hearing. She was confirmed and sworn in on Jan. 21 as President Barack Obama’s first Secretary of State.

It’s entirely possible that Clinton had a private e-mail system set up at her home as a way to maintain administrative and legal control over her communications, said Tim “T.K.” Keanini, chief technology officer for network security company Lancope Inc. based in Atlanta.

“What we know is that she cared about that communication channel so much that she went out of her way,” and likely hired an expert to configure it for her, Keanini said in a phone interview.

Even so, there’s no guarantee she had complete control over what happened to the e-mails, Keanini said.

Keanini searched Internet records to determine that the computer server supporting Clinton’s e-mail was located in her hometown of Chappaqua, New York. An exact physical address could not be determined. The Internet Protocol address for the server was registered to a person by the name of Eric Hoteham, according to the records.

Kerry’s E-Mail

Supporters note that e-mails sent to State Department employees would have been retained on the government’s system.

However, the e-mail system was also used by at least some close staff, including Huma Abedin, Clinton’s deputy chief of staff at the State Department.

Clinton has yet to speak publicly about her motivation for setting up the system or what discussions she had with her advisers at the time.

Secretary of State John Kerry is the first in his position to rely primarily on a state.gov e-mail account, Deputy Press Secretary Marie Harf said. Harf said that the State Department has “no indication that Secretary Clinton used her personal e-mail account for anything but unclassified purposes.”

While Clinton didn’t have a classified e-mail system, she had multiple ways of communicating in a classified manner, including assistants printing documents for her, secure phone calls and secure video conferences.

Top Aide

Clinton’s top aide during that period, Cheryl Mills, is a respected scandal-defense lawyer. As a member of the White House counsel’s office, Mills helped guide President Bill Clinton through a series of investigations in the 1990s and won praise for her performance in successfully defending him when the Senate voted not to remove him from office in 1999.

Mills would go on to combine two of the most powerful posts at the State Department — chief of staff and counselor — under Hillary Clinton. In that job, she spoke for Clinton on management matters within the department.

Mills didn’t reply to an e-mail seeking comment.

Not long after resigning as secretary of state, Clinton’s private e-mail service was transferred to a commercial provider, MX Logic, Devost said.

“The timing makes sense,” Devost said. “When she left office and was no longer worried as much about control over her e-mails, she moved to a system that was easier to administer.”

Encrypted Connection

It took less than a day for researchers to find potential problems with the Clinton’s system.

Using a scanning tool called Fierce that he developed, Robert Hansen, a web-application security specialist, found what he said were the addresses for Microsoft Outlook Web access server used by Clinton’s e-mail service, and the virtual private network used to download e-mail over an encrypted connection. If hackers located those links, they could search for weaknesses and intercept traffic, according to security experts.

Using those addresses, McGeorge discovered that the certificate appearing on the site Tuesday appeared to be the factory default for the security appliance, made by Fortinet Inc., running the service.

Those defaults would normally be replaced by a unique certificate purchased for a few hundred dollars. By not taking that step, the system was vulnerable to hacking.

Fortinet Statement

It’s unclear whether the site’s settings were the same before news of the private e-mail account emerged this week.

Fortinet issued a statement saying it wasn’t aware the company’s technologies were used by Clinton.

“If they were, our recommendation is to replace provided self-signed certificates with valid digital certificates for the protected domains,” said Andrea Cousens, a Fortinet spokeswoman.

“It may have fallen in the realm of acceptable risk,” Devost said. “They wanted to make sure that when she was in Egypt all of the traffic from her phone to the mail server was encrypted and that was their priority.”

Not Just Hillary Who Ignored .Gov Emails

Heck America….ask every employee if they use or have used outside secret emails to do the business of government. It seems it began with Lisa Jackson at the EPA. What about secret emails to other secret email accounts? There is no .gov record and there is law on this. So back to lil miss Hillary…

.

Maybe Hillary’s covert and cover-up agenda started back at TravelGate.

The computer server that transmitted and received Hillary Rodham Clinton’s emails – on a private account she used exclusively for official business when she was secretary of state – traced back to an Internet service registered to her family’s home in Chappaqua, New York, according to Internet records reviewed by The Associated Press.

Clinton has not described her motivation for using a private email account – hdr22@clintonemail.com, which traced back to her own private email server registered under an apparent pseudonym – for official State Department business.

Operating her own server would have afforded Clinton additional legal opportunities to block government or private subpoenas in criminal, administrative or civil cases because her lawyers could object in court before being forced to turn over any emails. And since the Secret Service was guarding Clinton’s home, an email server there would have been well protected from theft or a physical hacking. Read more here and then lets track down Sidney Blumenthal and see what he has to say.

Source: Top Clinton Aides Used Secret Email Accounts at State Dept.

by J.K. Trotter

Hillary Clinton is defending her use of a private email address, hosted at ClintonEmail.com, to conduct official State Department business by claiming that her emails were captured by official @state.gov accounts that other agency employees were instructed to use to contact her. But according to a knowledgeable source, at least two other top Clinton aides also used private email accounts to conduct government business—placing their official communications outside the scope of federal record-keeping regulations. “Her top staffers used those Clinton email addresses” at the agency, said the source, who has worked with Clinton in the past. The source named two staffers in particular, Philippe Reines and Huma Abedin, who are said to have used private email addresses in the course of their agency duties. Reines served as deputy assistant secretary of state, and Abedin as Clinton’s deputy chief of staff. Both rank among Clinton’s most loyal confidantes, in and out of the State Department.

We were able to independently verify that Abedin used a ClintonEmail.com address at some point in time. There are several email addresses associated with Abedin’s name in records maintained by Lexis-Nexis; one of them is huma@clintonemail.com. An email sent to that address today went through without bouncing.

In an email to Gawker, Clinton spokesman Nick Merrill denied that Reines was ever given, or ever used, a ClintonEmail.com address. “He has never had one, not for communicating with anyone about anything,” he wrote.Merrill did not respond, however, to questions about whether Reines used a private account at a different provider, such as Yahoo! or Gmail, to conduct official agency business. He also refused to address multiple questions regarding how Abedin used her ClintonEmail.com address.

The use of private email addresses may explain the State Department’s puzzling response to several FOIA requests filed by Gawker in the past two years. One of our requests, in September 2012, sought correspondence between Reines and a variety of reporters, including former BuzzFeed reporter Michael Hastings, who engaged in a profanity-flecked exchange with Reines in 2012. That request was confoundingly denied on the grounds that the State Department had no record of Reines—whose job it was to communicate with reporters—emailing Hastings or any other journalists (Gawker is currently appealing the rejection). Another request in June 2011 sought Abedin’s email correspondence; the State Department rejected that one as well, although we could not immediately locate the denial letter to determine on what grounds.

“It pokes a big hole in her explanation,” the source added, referring to spokesman Nick Merrill’s statement to Business Insider. “Like Secretaries of State before her,” Merrill told the site, she used her own email account when engaging with any Department officials. For government business, she emailed them on their Department accounts, with every expectation they would be retained.”

Putin Goes Beyond Ukraine to Artic..

While the world is fretting with good cause over Islamic State, then al Qaeda and Ukraine, how come no one is fretting over Russia in the Artic? Where is Greenpeace or Tom Steyer? Heck where is Barack Obama?

In part from the Strategic Studies Institute , part of the U.S. Army War College:

The Arctic has reemerged as a strategic area where vital U.S. interests are at stake. The geopolitical and geo-economic importance of the Arctic region is immense, as its mineral wealth is likely to turn the region into a booming economic frontier in the 21st century. The Arctic coasts and continental shelf are estimated to hold large deposits of oil, natural gas, methane hydrate (natural gas) clusters, and large quantities of valuable minerals.
With the shrinking of the polar ice cap, navigation through the Northwest Passage along the northern coast of North America may become increasingly possible with the help of icebreakers. Similarly, Russia is seeking to make the Northern Sea Route along the northern coast of Eurasia navigable for considerably longer periods during the year and is listing it as part of its national boundaries in the Kremlin’s new Arc- tic strategy. Passage through these shorter routes will significantly cut the time and costs of shipping. (See Map 1-1.) In recent years, Russia has been particularly active in the Arctic, aggressively advancing its interests and claims by using international law and also establishing a comprehensive presence in the Arctic, including the projection of military might into the region.

Thanks to Jeff at Newsweek:

What Is Russia Up To in the Arctic?

The Mågerø air defense monitoring base is inside a mountain at the end of an unmarked country road two hours south of Oslo, Norway. With only a rudimentary sentry box, a simple draw gate and a lone soldier guarding its entrance, the installation looks more like the set for a movie about the Nazi occupation of the country than a key link in the country’s state-of-the-art defenses.

At the end of a long, narrow tunnel into the mountain, in a cavernous room filled with computers and radar monitor screens, intelligence specialists stare at blinking icons marking the movement of aircraft around Norwegian airspace. On an all-too-typical afternoon recently, they watched as two nuclear-capable Tu-95 Russian Bear Bombers floated like fireflies across the top right of their monitors. A few desks away, an airman picked up phone and called Bodø, a military base on Norway’s northern coast. Moments later, two F-16s rose to eyeball the intruders.

It turned out the Russian bombers were just practicing some kind of circling maneuver outside of Norway’s Arctic air space. But on January 28 two more Tu-95 bombers, escorted by tankers and Russia’s most advanced MiG-31 fighter jets, showed up off the coast. One of them was carrying “a nuclear payload,” according to the London Sunday Express, which cited intercepted radio traffic. And last fall, a Russian Tu-22 supersonic bomber skirting Norway’s northern airspace was photographed carrying a cruise missile in launching position, according to the Barents Observer blog. Similar examples abound.

Adding to the potential for an unintended catastrophe, Russian warplanes typically lift off without filing a flight plan and cruise the busy commercial flight lanes with their transponders off, riling airline and NATO pilots alike. In recent months Russian warplanes have been engaging in Top Gun–style stunts far from home, popping up unannounced aside an SAS airliner on a flight between Copenhagen, Denmark, and Oslo and buzzing a Norwegian F-16 pilot. (A widely watched cockpit video of the incident, released by the defense ministry, shows the pilot yelping “Holy shit!” as a MiG-31 darts past his wingtip.)

“We haven’t seen this kind of activity for many years,” Colonel Arvid Halvorsen, Mågerø’s base commander, says as he watches the blinking icons for the Russian Tu-95s on a radar screen. “The missions are also more complex lately,” he says, with larger and larger groups of bombers escorted by MiGs, tankers and surveillance aircraft.

Although Moscow isn’t threatening the West with anything near the number of warplanes deployed by the Soviet Union during the Cold War, its air sorties around Norway have increased dramatically each year since 2007, when Russian President Vladimir Putin ordered his strategic bombers to resume flights in international airspace.

But late last year, with the world’s attention riveted on Ukraine, Putin put a little-noticed exclamation mark on his Arctic strategy. For the first time, the Kremlin’s announced military doctrine included instructions to prepare to defend Russia’s interests in the Arctic. Plans for two new Arctic army brigades were drawn up. An abandoned military base at Alakurtti, Russia, less than 30 miles from the Finnish border, was reopened. And military construction crews began refurbishing a string of Cold War–era bases on islands in the Arctic. “Our main objective is research and evaluation of conditions in the Arctic and the suitability of our weapons and equipment this far north,” Vladimir Kondratov, commander of the surface ships group of the Northern Fleet, told Russia Today.

New Red Dawn?

No one knows what Putin’s endgame is. And while the Norwegians would rather prepare quietly than stoke fears of a Crimean-style Russian grab in the Arctic, the country’s memory of the Nazi invasion 75 years ago remains fresh. At Mågerø and two dozen other bases scattered from Norway’s southern tip to its northern frontier with Russia, Oslo’s armed forces are preparing for the worst.

But “the worst” is a mystery. “I’d agree that the Russians have been very active,” says Keith Stinebaugh, a longtime Defense Department civilian intelligence specialist who is now a senior fellow in Arctic Security Policy at the Institute of the North in Anchorage. But “aggressive” may be overstating it, he adds. “You’d have to define what is meant by aggressive and compare it to what they did during the Cold War.… They are certainly more active around the world, not just in the Arctic.”

A Russian-speaking former CIA officer, who spent more than a dozen years operating undercover in the former Soviet Union, agrees. Today’s activities are “nothing like the Soviet air incursions that occurred on a weekly basis at the height of the Cold War,” the former officer says. And while Moscow’s armed forces, are “much improved over the past few years, [they] are still a shadow of their former Soviet selves.… Putin is very aware of this,” the officer adds, “but his beefed-up forces enhance national prestige and have allowed Russia to command more respect on the international scene.”

Which is a waste of money for Moscow, argues Ernie Regehr, a senior fellow in Arctic security at the Vancouver, British Columbia–based Simons Foundation. “Does it ever make sense to threaten to do what you know will never be in your interests to do?” Regehr recently argued in a paper for the foundation. “Symbolic flights of fighter aircraft and bombers are intended to remind the adversary that these weapons are available for use. But in any rational world, they are clearly not available for use by Russia against NATO or by NATO against Russia. There is no circumstance under which this would make sense or serve the interests of either side. Neither side wants them to be used.”

Stinebaugh, who spent 38 years in the Defense Department, suggests there may be a more prosaic reason for Russia’s Arctic buildup: money. “It may be that one way to get a project funded in the Russian military system today is to attach the word ‘Arctic’ to it, just like U.S. projects got funded by invoking [the global war on terror] and now get funded with ‘cyber’ even if the connection is tenuous,” he says.

Yet few Norwegians can completely banish the specter of the Russian bear on their doorstep, says Reidun Samuelsen, the editor at Aftenposten, Norway’s leading newspaper. “It’s never far from our minds,” she tells Newsweek.

Norwegian Nightmares

As was the case in the U.S. during the Cold War, when fears of nuclear conflict found outlets in films such as Dr. Strangelove Norwegians’ anxieties over Russian intentions will soon burst forth in Occupied, a political thriller conceived by Jo Nesbø, Norway’s internationally best-selling crime writer.

Scheduled to debut on Norwegian TV next year, the weekly drama “follows events in the close future” when Russia has carried out a “silk glove invasion” of Norway “in order to take control of its oil resources,” according to a news release.

“My idea was this,” Nesbø told Newsweek by email. “The Norwegian Green/left-wing government has decided it will stop producing fossil energy.” Russia moves in, seizing its oil facilities. When the U.S. and E.U. issue only paper protests, he says, Norwegian leaders “don’t see the point in military action, they try to negotiate while the Russians quietly take over the few things they [need] to take over to control the oil. And it’s a gentle occupation. Most Norwegians can’t really tell the difference. There are few Russians present, most of them are in suits, and there’s seemingly no censorship and Norwegians can travel freely and keep on living their lives as one of the richest populations in the world.”

News of the series emerged at about the same time Norway’s security service uncovered evidence of real-life subversion in the capital. Some foreign intelligence service—the main suspects were Russia and China, which also covets the Arctic’s future shipping routes—had planted so-called IMSI catchers, devices that can secretly capture the signals of cellphones, around Oslo’s government buildings. Officially, the perpetrator remains a mystery, but Norwegian sources tell Newsweek the government knows who did it but has shied from fingering the guilty party out of fear of triggering a full-scale international scandal.

Nesbø, whose 20 novels have sold 23 million copies in 40 countries, says the plausibility of Occupied’’s plot is beside the point. The real drama revolves around “a situation where it’s hard to pinpoint what you’ve lost in your everyday material world,” he says. “What would people be willing to sacrifice for phrases like freedom, independence and democracy? And who would be the first ones to resist? And would the nation follow?”

Guerrillas in the Arctic

Such questions are likely to rekindle unsavory memories of Norway’s capitulation to Germany in 1940 with the help of local Nazis led by the infamous Vidkun Quisling. The Norwegian king and tens of thousands of patriots escaped to England, where they set up a government in exile and formed a resistance movement eager to go back and fight. Trained by Britain’s secret services, the guerrillas of Norwegian Independent Company 1 eventually snuck back into the country and wreaked havoc on the Nazis.

Norwegians can’t get enough of this version of themselves. Every Sunday night for six weeks in January and February, more than one of every five Norwegians sat down to watch the latest episode of The Heavy Water War, a dramatization of the heroic guerrillas’ sabotage of Norway’s stocks of deuterium oxide, which the Germans seized to produce a nuclear weapon.

The guerrilla mentality remains an important strain in Norway’s military forces. Last year, Nils Johan Holte, the rangy, 57-year-old rear admiral who heads Norway’s Special Operations Command, took 10 of his officers back to the training camp in Scotland, where the first guerrillas learned hand-to-hand fighting and explosives. “It was about connecting with our origins.… ” Holte said as heavy snow fell outside his office in Oslo, “and for [the men] to understand that there’s a seriousness today about this.” It seems no accident that the headquarters of today’s Norwegian guerrillas is on the grounds of the hulking, medieval Akershus Fortress, built to defend the city from sea raiders 700 years ago. In 1940, it was occupied by the Nazis.

In 1988 the Norwegian government nearly disbanded its special operations force, which was initially set up as a small, discreet anti-terrorist unit inside the armed forces, as a money-saving move. Protests, including from the oil industry, which feared attacks on its North Sea drilling platforms—saved it. Since then, its commandos have seen action from the Balkans to Afghanistan and many secret places in between. And last year, the unit became independent, reporting directly to the chief of defense.

Like other Norwegian commanders and politicians, Holte is discreet when it comes to characterizing the recent Russian moves as sinister. Asked directly about the threat, he leans back in his chair, folds his hands behind his head, and smiles. His lone message for any potential adversary: “Do not attack Norway. We can defend ourselves.”