National Strategy to Win the War Against Islamist Terror

 

Related reading: Foreign Terrorist Organizations, Bureau of Counterterrorism

Chairman McCaul Unveils Counterterrorism Strategy “A National Strategy to Win the War Against Islamist Terror”

Contains 100+ policy ideas and principles for fighting terrorism

WASHINGTON, D.C. – On the heels of Islamist terror attacks in the homeland this past weekend, House Homeland Security Committee Chairman Michael McCaul (R-TX) today unveiled his counterterrorism strategy, entitled A National Strategy to Win the War Against Islamist Terror. Chairman McCaul’s nonpartisan strategy contains over 100 policy ideas, recommendations, and principles for fighting terrorism.

The ideas put forward in the McCaul strategy were developed in consultation with an array of national security experts on both sides of the aisle. They are not “Republican” or “Democrat” ideas, but rather common-sense solutions for better protecting Americans.

Chairman McCaul: “As radical Islamist terror continues to sweep the globe, it has become clear that we are not winning the overall fight against it. There are now more terrorist foot soldiers and safe havens than any time in modern history, and our enemies have alarming momentum. They are reaching deep into the heart of the Western world—including our own communities—to spread their hateful ideology and perpetrate violent acts. Just this weekend we saw again that our homeland remains a terrorist target, and they have attacked our allies in places like Paris, Brussels, Nice, and beyond. Yet in recent years our strategy and policies have failed to roll back the threat, let alone contain it. That is why I’ve produced a new, national counterterrorism strategy aimed at reversing the tide of terror and protecting our great nation. The eyes of the world are now upon us, and American leadership is needed to defeat this evil.  My plan is a guidepost—for Congress and the next president—to do what is needed to win this generational struggle.”

National Strategy Social Media Release_Report

 

Overview of the Strategy

The McCaul strategy contains 100+ policy ideas and principles for fighting terrorism. Some are new, while others are abandoned policies we need to revive in order to protect America and its interests overseas against the surging terror threat.

The document is built around clear objectives: defend the homeland, defeat terrorists, and deny extremists the opportunity to re-emerge. It presents nine counterterrorism priorities, or “means,” needed to achieve the “ends” described above, including:

  1. Thwart attacks and protect our communities
  2. Stop recruitment and radicalization at home
  3. Keep terrorists out of America
  4. Take the fight to the enemy
  5. Combat terrorist travel and cut off financial resources
  6. Deny jihadists access to weapons of mass destruction
  7. Block terrorists from returning to the battlefield
  8. Prevent the emergence of new networks and safe havens
  9. Win the battle of ideas

This counterterrorism strategy is different than those that came before it. President Bush released a strategy for combating terrorism in 2003, and President Obama released one in 2011. Both are now outdated.

  • This strategy is written to keep pace with an evolving enemy. It proposes ways to fight terrorist propaganda online; counter homegrown radicalization; deal with terrorists’ use of encryption; and help communities better protect against IEDs, active shooter plots, and other changing terror tactics.
  • This strategy aims to bring our homeland security policies into the digital age. It proposes to improve the screening of foreign visitors, immigrants, and refugees using new technologies and better intelligence—including social media—to keep terrorists from infiltrating our country.
  • This strategy focuses on breaking the Islamist terror movement—not just defeating one group. Our nation’s last official counterterrorism strategy focused almost exclusively on al Qaeda, leaving us blind to the rise of ISIS. This plan is designed to go after Islamist terrorists, regardless of location or branding.

The bottom line is this: we cannot accept Islamist terror attacks as “the new normal.” We must defeat the perpetrators. The McCaul strategy makes clear that we are facing a long, generational struggle, but we should wage it with the same resolve we showed in defeating other totalitarian ideologies, including communism and fascism.

The full strategy is available, here.

Comey’s Testimony, Doesn’t Remember, Doesn’t Know

Very few of the responses Comey gave in his testimony made any sense especially to former prosecutors unless you see that Comey has no worries about his job as he mentioned in the hearing he still has 7 years left on his government contract. He defended the entire FBI investigation and said he would do nothing different including based on new evidence he would be unlikely to re-open the investigation case. Sigh…

  A side note: When Hillary did meet with the FBI, she had 8 people with her, there were 4 from the FBI and 4 from the Department of Justice.

In fact, David Harsanyi, Senior Editor at The Federalist agrees with me.

This is a terribly sad dad for America relying on the FBI leadership and what is worse a terribly sad day in America for the fact that Hillary and her entire team operates with wild abandon.

So….

Sometimes, when convenient, Cheryl Mills is Hillary’s lawyer while other times just her aide de camp.

Meanwhile…AFTER the Congress served and order to preserve documents and records and issued a subpoena, Mills ordered the IT personnel to destroy the emails. The FBI ignored this condition as did the Department of Justice and issued Mills in fact complete immunity, which is to clarify immunity from obstruction and destruction of documents. The IT person finally did so many months later after the initial phone call with Mills and other lawyers using BleachBit.

Meanwhile, the FBI was able to gain access to a laptop computer that did in fact have emails on it and many of those emails were….YES ….classified. The laptop was not approved by the State Department or any other agency to have classified material.

Another meanwhile, you can watch the hearing today before the House Judiciary Committee where exacting questions were asked of FBI Director Comey and often his responses were: I don’t remember, I don’t know or I don’t see it that way.

The exchange with Congressman Jim Jordan and Congressman Darryl Issa (second round) were especially important.

FNC:

FBI Director James Comey testified Wednesday that former Hillary Clinton chief of staff Cheryl Mills and another top aide had “some” classified material on laptops they turned over to the bureau in its probe of Clinton’s private server use as secretary of state — yet the aides still received immunity.

Comey made the acknowledgment while testifying before the House Judiciary Committee, where Republicans had tough questions about a newly revealed set of immunity deals in the Clinton case.

The director claimed the findings did not constitute a crime but declined to directly answer a question on whether having classified material on a laptop or other private electronic device was against federal regulations.

“You’d have to know the circumstances,” Comey told committee Chairman Bob Goodlatte, R-Va.

The FBI’s two-year investigation into the private server found numerous Clinton server emails contained classified information and she was “extremely careless.”

However, the agency concluded the investigation without recommending criminal prosecution, and the Justice Department closed the case this summer.

“It seems clear that former Secretary of State Hillary Clinton committed multiple felonies involving the passing of classified information through her private email server. The FBI, however, declined to refer the case for prosecution on some very questionable bases,” Goodlatte said Wednesday. “We, as Congress and the American people, are troubled how such gross negligence is not punished.”

Mills’ testimony in the FBI investigation and potential testimony before Congress was not covered in the immunity deal.

****

FNC: In her interviews, Hanley told the FBI that during her time at the State Department, she learned “specifically how to handle and transport classified information/paper but could not recall who provided the training.”

Two emails from Hanley were marked classified with a c for “confidential,” the lowest level of classification. Fox News first reported some of the emails contained classified markings despite Clinton’s public claims.

The FBI document said “Hanley received a Top Secret/SCI clearance at DoS.” Despite the training, during one trip to Russia, Hanley was specifically criticized for leaving a classified document in a hotel suite she shared with Clinton during the trip. “Hanley was informed by DS (Department of State) that the briefing book and document should have never been in the suite,” the document said.

She was also involved in the response to the hack by Guccifer, whose real name is Marcel Lehel Lazar.

It was during her second interview with the FBI on June 23 that Hanley finally revealed details of a conference call she had with Abedin and top Clinton Foundation fundraiser Cooper as they scrambled “over concerns related to a reported hack by Sidney Blumenthal’s email account” in the spring of 2013, first reported by The Smoking Gun.

In the latest documents, the FBI redacted another individual’s name who apparently was on that conference call.

Democrat Officials’ Cell Phones Hacked

Report: Dem officials cell phones hacked.

TheHill: The FBI is investigating the hacked cell phones of several Democratic Party officials with the belief the attacks are connected to a spate of breaches at party networks and under the assumption that the Russia is behind the hacking, Reuters reports.

The phones, says the report, were hacked within “the past month or so”.

That would put the timing of the breach soon after hackers, widely suspected to be Russian intelligence, were booted from the Democratic Congressional Campaign Committee.  The DCCC breach, in turn, took place shortly after the same hackers were kicked out of the Democratic National Committee.

Many members of Congress have grown frustrated with the administration not formally accusing Russia of the hacking spree, including House Homeland Chair Michael McCaul (R-Texas) and Rep. Nancy Pelosi (D-Cali.), who have both asked Obama to acknowledge Russia is behind the attacks.

In part from Reuters:

The revelation underscores the widening scope of the U.S. criminal inquiry into cyber attacks on Democratic Party organizations, including the presidential campaign of its candidate, former U.S. secretary of state Hillary Clinton.

U.S. officials have said they believe those attacks were orchestrated by hackers backed by the Russian government, possibly to disrupt the Nov. 8 election in which Clinton faces Republican Party candidate Donald Trump. Russia has dismissed allegations it was involved in cyber attacks on the organizations.

The more recent attempted phone hacking also appears to have been conducted by Russian-backed hackers, two people with knowledge of the situation said.

Federal Bureau of Investigation representatives had no immediate comment, and a Clinton campaign spokesman said they were unaware of the suspected phone hacking. The Democratic National Committee (DNC) did not respond to a request for comment, and the Democratic Congressional Campaign Committee (DCCC) had no immediate response.

FBI agents had approached a small number of Democratic Party officials to discuss concerns their mobile phones may have been compromised by hackers, people involved said. It was not clear how many people were targeted by the hack or whether they included members of Congress, a possibility that could raise additional security concerns for U.S. officials.

If they were successful, hackers could have been able to acquire a wide range of data from targeted cell phones, including call data, text messages, emails, photos and contact lists, one person with knowledge of the situation said.

“In a sense, your phone is your office brain,” said Bruce Schneier, a cyber security expert with Resilient, an IBM company, which is not involved in the investigation. “It’s incredibly intimate.”

“Anything that’s on your phone, if your phone is hacked, the hacker can get it.”

The FBI has asked some of those whose phones were believed to have hacked to turn over their phones so that investigators could “image” them, creating a copy of the device and related data.

U.S. investigators are looking into whether hackers used data stolen from servers run by Democratic organizations or the private emails of their employees to get access to cell phones, one person said.

Hackers previously targeted servers used by the DNC, the body that sets strategy for the party, and the DCCC, which raises money for Democrats running for seats in the House of Representatives, officials have said.

Clinton said during Monday’s presidential debate there was “no doubt” Russia has sponsored hacks against “all kinds of organizations in our country” and mentioned Russian President Vladimir Putin by name.

“Putin is playing a really tough, long game here. And one of the things he’s done is to let loose cyber attackers to hack into government files, to hack into personal files, hack into the Democratic National Committee,” Clinton said.

Trump countered that there was no definitive proof that Russia had sponsored the hacks of Democratic organizations.

“I don’t think anybody knows it was Russia that broke into the DNC,” he said. “It could be Russia, but it could also be China. It could also be lots of other people.”

Hillary’s Aides Violated the Immunity Agreements…

 Heather Samuelson Image result for john bentel state department

We have come to understand the FBI was never going to take the Hillary email/server investigation seriously and the notion of lack of ‘intent’ was just another cover. Why? Well when the Barack Obama used as pseudonym to communicate with Hillary on yet another non dot gov email account and had at least another 22 email communications, the executive protection was applied. So, this FBI investigation was just a formal gesture.

Providing immunity to at least 5 witnesses involved was not really necessary but since no one trusts anyone else in Washington DC, Beth Wilkinson the lawyer of record for Hillary’s inner circle demanded immunity and those agreements do have limitations. But is anyone asking about the limitations or violations of immunity agreements? Yes…

***

Clinton confidant’s immunity deal looms over debate: Jonathan Turley

FBI appears to have undermined its own investigation with ill-considered witness agreements.

USAToday: When FBI Director James B. Comey announced that there would be no criminal charges in the Clinton email scandal, there was an outcry by many who saw glaring contradictions, attempts to destroy evidence, and knowing failures to protect classified or sensitive information.  At the time, I acknowledged that Comey’s decision was understandable and, while criminal charges might have been possible, this was not out of bounds of prosecutorial discretion. However, the news this week of a previously undisclosed immunity deal with a top Clinton aide raises serious questions over the handling of the FBI investigation.

The latest recipient of an immunity deal from the Justice Department is one of Clinton’s closest aides and a figure at the heart of the email scandal, Cheryl Mills. She joins two other central figures in benefiting from such deals: former State Department staffer, Bryan Pagliano and tech specialist Paul Combetta. In addition to at least two other immunized witnesses according to the Associated Press, they represent the big three of officials involved in the underlying allegations of Clinton’s potential criminal conduct. Their collective immunization is baffling.

For the Obama Administration, the criminal investigation into the Democratic presidential nominee and its prior secretary of State came with a heightened level of public scrutiny and skepticism. Many doubted that the administration would seriously pursue the Clintons, a family of political royalty in both Democratic and establishment circles. The easiest way for prosecutors to scuttle a criminal case is to immunize those people who are at the greatest risk of criminal indictment. Often prosecutors will avoid immunity deals in favor of offering plea bargains to key players, tying their cooperation against others to reduced sentences. Although a witness can lose an immunity deal by withholding evidence or lying, a witness can undermine cases against superiors by tailoring their accounts or memories to avoid statements showing intent or knowledge.

Before the disclosure of the Mills immunity deal, the two prior deals were curious given the evidence against both Pagliano and Combetta. Pagliano set up the notorious private server and later joined Clinton at the State Department, where various people raised objections to her use of unsecured communications. If Pagliano was problematic, Combetta’s immunity deal was perplexing. Combetta used a product called BleachBit to eradicate evidence of Clinton emails after a telephone conference with Clinton staffers. When he used the product, he admitted that he knew that Congress had issued a subpoena ordering the preservation of the evidence. Then, this month, it was alleged by a “Twitter sleuth that Combetta, acting under the alias “stonetear,” solicited advice on how to change email records to remove a “VIP’s (VERY VIP) email address.”  Either Combetta did not disclose this effort in violation of his immunity deal or the Justice Department effectively removed a serious threat of indictment though the agreement. Despite immunity deals pledging cooperation with all parts of the government, both Pagliano and Combetta have refused to answer questions from Congress, and Pagliano is facing a contempt sanction.

Mills is a participant in key emails and features prominently in allegations of destroyed emails. She was alleged to have been informed repeatedly of the dangers to national security, particularly regarding Clinton’s use of a personal BlackBerry. She was also central in the deletion of tens of thousands of emails that Clinton claimed were purely personal and not work related.

Many of those emails are now known to have discussed official issues and potentially embarrassing disclosures. Mills’ role in the later investigations has also been controversial. Surprisingly, defense attorney Beth Wilkinson  agreed to jointly represent various former aides, including not just Mills but Deputy Chief Jake Sullivan, Mills’ deputy Heather Samuelson, and Clinton spokesman Philippe Reines. Wilkinson is a very accomplished lawyer and there is no evidence of unethical acts. However, attorneys rarely represent parties with potential conflicts of interest and the agreement allowed for a single attorney to monitor the consistency of aides in their accounts.

The joint representation of the Clinton aides increased the chance for a uniform account in the controversy. Making this even more concerning is that Mills was allowed by the FBI to sit in on the interviews with Clinton, despite that fact that she was a key witness herself in the investigation. Mills, who is a lawyer, did not hold a legal position at the State Department and should have been excluded from the interviews. Finally, Mills has continuing interests in the election of Hillary Clinton, a development that would place her at the very top of the government. 

Of all of the individuals who would warrant immunity,, most would view Mills as the very last on any list. If one assumes that there may have been criminal conduct, it is equivalent to immunizing H.R. Haldeman and John D. Ehrlichman in the investigation of Watergate. Mills appears repeatedly at critical moments as one of the most senior figures making decisions or monitoring events, including being informed as Clinton chief of staff of the search for emails by the State Department in response to a Freedom of Information demand in 2012 (three years before the disclosure of Clinton’s use of a private email server). In such circumstances, immunity can amount to impunity. Immunity does not remove the threat of prosecution, but it certainly reduces that threat, while the value of defending prior benefactors or loyalties can remain. Given the overlapping immunity deals, many will now find it unsurprising that Comey did not find evidence of “intentional misconduct or indications of disloyalty . . .  or efforts to obstruct justice.”

Comey removed the greatest threat that could have been used to get two underlings to implicate senior officials, and then gave immunity to the senior official most at risk of a charge. In the land of the immunized, the degree of cooperation can sometimes be as difficult to establish as the truth.

Jonathan Turley is the Shapiro Professor of Public Interest Law at George Washington University and a member of USA TODAY’s board of contributors.

 Immunity Process Denoted by the Justice Department

9-23.100 – Witness Immunity—Generally

This chapter contains the Department’s policy and procedures for seeking “use immunity” under Title 18 U.S.C. §§ 6001-6005. Sections 6001 to 6005 provide a mechanism by which the government may apply to the court for an order granting a witness limited immunity in all judicial, administrative, and congressional proceedings when the witness asserts his or her privilege against self-incrimination under the Fifth Amendment. (Section 6003 covers court and grand jury proceedings, Section 6004 covers administrative hearings, and Section 6005 covers congressional proceedings.)

See the Criminal Resource Manual at 716 through 719, for an overview of the differences between the various types of immunity, including use immunity, derivative use immunity, transactional immunity and informal immunity.

NOTE: Although Title 21 of the United States Code contains similar immunity provisions to those contained in Title 18, the Department of Justice utilizes only those provisions contained in Title 18.


9-23.110 – Statutory Authority to Compel Testimony

Section 6003 of Title 18, United States Code, empowers a United States Attorney, after obtaining the approval of the Attorney General, the Deputy Attorney General, the Associate Attorney General, or any designated Assistant Attorney General or Deputy Assistant Attorney General in the Department of Justice (DOJ), to seek a court order to compel testimony of a witness appearing in court proceedings or before the grand jury. Additional information regarding the approval process is set forth in USAM 9-23.130, below, and the Criminal Resource Manual at 720.


9-23.130 – Approval by Assistant Attorney General to Compel Testimony

The Attorney General has designated the Assistant Attorneys General and Deputy Assistant Attorneys General of the Criminal, Antitrust, Civil, Civil Rights, Environmental and Natural Resources, and Tax Divisions to review (and approve or deny) requests for immunity (viz., authorization to seek compulsion orders) in matters assigned to their respective divisions (28 C.F.R. Sec. 0.175), although this approval is still subject to Criminal Division clearance. This authority extends to requests for immunity from administrative agencies under 18 U.S.C. § 6004. This delegation also applies to the power of the Attorney General under 18 U.S.C. § 6005 to apply to the district court to defer the issuance of an order compelling the testimony of a witness in a congressional proceeding.

NOTE: All requests for immunity, including those whose subject matter is assigned to a Division other than the Criminal Division, must be submitted to the Criminal Division, and no approval may be granted unless the Criminal Division indicates that it has no objection to the proposed grant of immunity (28 C.F.R. Sec. 0.175).

Requests for authorization to seek to compel testimony should be processed as described in the Criminal Resource Manual at 720, using the form contained in the Criminal Resource Manual at 721.

Obtaining the Court Order Criminal Resource Manual at 723
Expiration of Authority to Compel Criminal Resource Manual at 724
Use of Immunized Testimony by Sentencing Court Criminal Resource Manual at 725
Steps to Avoid Taint Criminal Resource Manual at 726
Civil Contempt Criminal Resource Manual at 727
Criminal Contempt Criminal Resource Manual at 728

 

[cited in USAM 9-23.110Criminal Resource Manual 721]


9-23.140 – Authority to Initiate Immunity Requests

Assistant United States Attorneys, with the approval of the United States Attorney or, in his or her absence, a supervisory Assistant United States Attorney, and Department attorneys, with the approval of an appropriate Assistant Attorney General or Deputy Assistant Attorney General of DOJ, may initiate requests to compel testimony under the use immunity statute.


9-23.210 – Decision to Request Immunity—The Public Interest

Section 6003(b) of Title 18, United States Code, authorizes a United States Attorney to request immunity when, in his/her judgment, the testimony or other information that is expected to be obtained from the witness “may be necessary to the public interest.” Some of the factors that should be weighed in making this judgment include:

  1. The importance of the investigation or prosecution to effective enforcement of the criminal laws;
  2. The value of the person’s testimony or information to the investigation or prosecution;
  3. The likelihood of prompt and full compliance with a compulsion order, and the effectiveness of available sanctions if there is no such compliance;
  4. The person’s relative culpability in connection with the offense or offenses being investigated or prosecuted, and his or her criminal history;
  5. The possibility of successfully prosecuting the person prior to compelling his or her testimony;
  6. The likelihood of adverse collateral consequences to the person if he or she testifies under a compulsion order.

These factors are not intended to be all-inclusive or to require a particular decision in a particular case. They are, however, representative of the kinds of factors that should be considered when deciding whether to seek immunity.

Hey Comey, Your Friday Night DocDump Proves Intent

One has to wonder if James Comey even read the 302’s he approved for release late Friday. Seems all kinds of people were in fact sounding alarms and telling the truth but the FBI did not see anything related to intent? Wow….Hillary’s own close and long time friend as well as attorney, Cheryl Mills is at the core of this whole matter, but yet we are told by the House Oversight and Government Reform Committee Chairman, Jason Chaffetz that lil’ old Cheryl was given immunity. Full immunity? Good question, has anyone seen the immunity document granted by the Department of Justice? No…not yet.

 

All of us can officially declare that we have lost any hope for the Department of Justice practicing good law and sadly we can say that the Director of the FBI, James Comey too was part of this collusion. So, sit back and read these items if you can stand it. Fair warning…. this IS INTENT.

We will start with a Reuters piece in part:

A State Department employee, whose name was redacted, told investigators they believed senior department officials interfered with the screening of Clinton’s emails for public release last year in a way that helped Clinton.

The employee, who worked on the screening process, said there was pressure to obscure the fact they were finding classified information in the messages. John Kirby, a State Department spokesman, said in a statement the department “strongly disputes” the claim of interference. Clinton repeatedly said last year she never sent or received classified information, but now says she did not do so knowingly since the release of the FBI findings.

The employee also said the Defense Department told the State Department last year it had found about 1,000 emails between Clinton and David Petraeus in its records from his time as the director of the United States Central Command.

The State Department has said that Clinton did not include any of her emails with Petraeus when her lawyers screened and returned what they said were all her work emails in 2014. A single conversation of about 10 emails later emerged last year after the Defense Department provided it.

Spokesmen for Clinton have declined to discuss the omission, and did not respond to questions about the new interview summaries.

Kirby, the department spokesman, said he could not “speculate” whether the Defense Department had found more than just a single conversation between Clinton and Petraeus. “We can only speak to the records in our possession,” he said. Full article here.

Now for more disgusting details:

27 things we learned from Clinton’s FBI files

According to the witness, State Department officials at one point attempted to classify information in order to have an excuse to redact it even though the agency’s own Office of Legal Counsel thought the email was not worthy of classification.

The witness said he and other career officers, who were typically involved in the FOIA process and in responding to congressional inquiries, were “cut out of the loop” when Clinton’s emails needed processing. Instead, new staffers were “placed” by “top State officials” to take over the job of screening Clinton’s emails; the witness said the officials — whose identities were redacted — had “a very narrow focus on all Clinton-related items and were put in positions that were not advertised.”

FOIA reviews are supposed to be performed by career officials to prevent politics from affecting the government’s response, particularly in a case as politically fraught as the Clinton email situation.

Clinton deleted nearly 1,000 emails with Petraeus

In Aug. 2015, the Pentagon called the State Department and informed an unnamed official there that “CENTCOM records showed approximately 1,000 work-related emails between Clinton’s personal email and General David Petraeus.”

The FBI noted that “[m]ost of those 1,000 emails were not believed to be included in the 30,000 emails” that Clinton turned over to the State Department in Dec. 2014.

Officials felt ‘pressure’ not to classify any Benghazi emails

 

At least one witness told the FBI he felt “pressure” not to upgrade any information in a highly-anticipated batch of 296 emails related to Benghazi.

The witness said Patrick Kennedy, the State Department’s undersecretary for management, went to the FBI and “pointedly asked” the bureau “to change [its] classification determination” for a Benghazi email that had been marked classified.

The Benghazi-related emails were among the first records from Clinton’s private server to be made public.

Kennedy “categorically rejected” the notion that he would obstruct the FOIA process when he sat down with FBI agents in Dec. 2015.

Sidney Blumenthal advised more high-level officials

Clinton has often defended her relationship to longtime confidante Sidney Blumenthal by referring to his detailed missives — some of which are now at least partially classified — as unsolicited memos from an old friend.

But Jake Sullivan, Clinton’s former deputy chief of staff, told the FBI he also spoke directly with Blumenthal during his tenure.

Sullivan said he spoke by phone with Blumenthal and emailed with him occasionally, even acting as a go-between for Blumenthal and Clinton or other high-level officials.

Blumenthal’s controversial style prompted the Obama White House to ban him from working in the administration. However, Clinton’s private emails exposed the informal position he held within Clinton’s State Department.

 

Sullivan described Blumenthal as someone who “likes to help the cause.”

State Department officials definitely knew about the server

Many high-level agency staffers, including Kennedy, have claimed they knew nothing of Clinton’s private email server until they saw stories about it in the news.

A common defense for officials who could be implicated if they admitted prior knowledge of the network has been to acknowledge Clinton’s occasional use of a personal address to send messages but to deny awareness of the hardware that sat in her basement.

One unnamed witness who worked in the State Department’s IT office told the FBI he was aware of the server system since the day Clinton was sworn in.

That was because the witness was forced to work with Bryan Pagliano, the technology specialist who had built the server for Clinton, in order for the server to accommodate Clinton’s government work.

For example, the witness “interacted with [Pagliano] to keep [the server] communicating with State systems” during the “5-6 instances” in which Clinton’s private emails were intercepted by the government’s security systems before they could reach the .gov inboxes of her colleagues.

Although the witness helped Pagliano keep the server running remotely, the individual told the FBI “he did not know how the server was paid for or where it was physically located.”

At least three people had emails on the ‘clintonemail.com’ network

Besides Clinton, the only other individual known to have used an email address on the “clintonemail.com” domain was Huma Abedin, then her deputy chief of staff.

Justin Cooper, a former aide to Clinton’s husband and to the Clinton Foundation, told the FBI that at least one other person used an account on that network “as part of their association or work for Hillary Clinton.”

That person’s name, or multiple other names, were redacted by the FBI. Clinton has sworn under penalty of perjury that Cheryl Mills, her former chief of staff, did not use an account on the server.

Pagliano tried to sound the alarm

In a Dec. 2015 interview with the FBI, Clinton’s former IT aide said he had repeatedly attempted to warn her team about the potential record-keeping implications of her unauthorized network.

Pagliano said he had been called into a high-level State Department official’s office in summer 2009 and asked if he knew about the existence of a “clintonemail.com” domain in use by the former secretary of state.

When Pagliano relayed the incident to individuals whose names were redacted, an unidentified witness had a “visceral” reaction and “didn’t want to know anymore.”

One unidentified witness told Pagliano in 2009 that Clinton’s private email use “may be a federal records retention issue” and stated “that he wanted to convey this to Hillary Clinton’s inner circle, but could not reach them.”

Pagliano said he “then approached Cheryl Mills in her office and relayed [redacted]’s concerns regarding federal records retention and the use of a private email server.”

However, Mills dismissed the concerns by arguing other former secretaries of state had done the same thing — an assertion later proven false.

Witnesses were nervous about talking to the FBI

One former State Department aide told investigators she was worried Clinton would be angry if she learned the unnamed individual had spoken to the FBI.

At the end of her Dec. 2015 interview, the witness told agents “she had not mentioned the interview to Clinton or any of [her] contacts from [State Department].” That witness explained her concerns that Clinton and her staff “could be upset to learn she spoke with the FBI without telling them.”

President Obama used a fake name

During an interview with Abedin, FBI agents presented the longtime Clinton aide with a copy of an email from Obama to Clinton.

The president had used a pseudonym to communicate with Clinton on her private server.

“How is this not classified?” Abedin “exclaimed,” according to the FBI’s summary of its conversation with her.

Abedin explained that Clinton had notified the White House when she changed her primary email address because Obama’s network was set up to block unfamiliar accounts from sending him messages.

The new revelation has raised questions about the president’s claims to have had no knowledge of Clinton’s private email use before March 2014, since her private address had to be added manually to a list of accounts with permission to communicate with his own server.

FBI agents conducted interviews in Denver, San Francisco

FBI agents traveled to Denver in September of last year to question employees of Platte River Networks, the Colorado company Clinton hired in 2013 to manage her email network.

At least one employee of Platte River, Paul Combetta, was granted an immunity agreement in exchange for information.

Combetta was asked to delete emails in defiance of a preservation order for those documents that had been issued by the House Select Committee on Benghazi.

Agents also traveled to San Francisco to question Lewis Lukens, a former State Department official during Clinton’s tenure.

Clinton’s team tried to mop up emails after NYT story

In March 2015, an unspecified individual from Clinton’s staff reached out to Platte River to determine how many emails existed and where those records were stored. The New York Times exposed Clinton’s private email use in a story on March 1 of that year.

Clinton’s team sprang into action in the immediate aftermath of that story, scrambling to account for the location of any email she might have sent during her State Department tenure in the days between the initial Times story and her first public statements on the controversy at a press conference on March 10, 2015.

Another unnamed employee at the firm said he received an email from Clinton’s staff on March 9 of that year but told FBI agents he “did not recall seeing” the preservation order attached to that email by David Kendall, Clinton’s primary attorney.

Yet another unnamed staffer from Platte River told investigators he genuinely believed the archive of Clinton’s emails “should still be on the server in possession of the FBI.”

He said only two people in the world had the authorization to delete an entire mailbox. The names of those two individuals were redacted.

A dated list of files on the server indicated the archive of Clinton’s emails was still on the server by the time the list was generated in Jan. 2015 — a month after the original batch of 30,000 emails was provided to the State Department.

But at some point over the next few months, someone scrubbed the archive from the server.

Staffers shattered discs that stored emails

After Cheryl Mills, Clinton’s former chief of staff, asked a Platte River staffer in July 2014 to hand over all of Clinton’s correspondence with any address that ended in “.gov,” the employee burned the emails onto DVDs and prepared to ship them to Mills.

However, Mills said she didn’t want the discs to be transferred via mail and instead asked the tech specialist to arrange a “secure electronic transfer” of the emails. The Platte River staffer said he “destroyed the DVDs by breaking them in half” once the digital transfer was complete.

The July 2014 request came just two months after the House Select Committee on Benghazi was created

Witnesses pleaded the 5th during FBI interviews

One employee of Platte River was advised by the company’s lawyer to invoke his Fifth Amendment rights and refuse to answer any further questions when FBI investigators started asking about what the technology specialist had discussed with Kendall.

The agents referred to documentation that the employee had spoken to Mills and Kendall on a March 31, 2015 conference call.

That employee used a digital deletion tool called Bleachbit to scrub emails from the server on the very same day.

The State Department timeline doesn’t fit

Multiple witnesses told the FBI that Mills asked them to round up all of Clinton’s work-related emails in July of 2014. The timing of the request described to investigators fits with the progression of the Benghazi committee’s probe.

But the State Department has said it did not ask Clinton for her emails until Oct. 2014, and claims it only did so because officials realized they had no emails from previous secretaries of state.

Clinton has long touted the fact that the State Department sent letters to other secretaries of state requesting copies of personal emails.

The new timeline confirmed by the FBI suggests it took Clinton’s staff five months to prepare her work-related emails for submission to the State Department. The 30,000 emails she ultimately provided were not given to the agency until early Dec. 2014.

Clinton relied on staff outside State

Justin Cooper, an aide to Clinton’s husband and a former Clinton Foundation adviser, supported Clinton’s staff during her time at the State Department.

Monica Hanley, Clinton’s assistant, told the FBI she would contact Cooper each time she needed to synch Clinton’s BlackBerry with the server that was partially under Cooper’s care.

What’s more, Hanley said she would contact Cooper — not anyone at the State Department — “when [she] needed reimbursement for items she purchased for Clinton.”

Like Pagliano, Cooper performed services for Clinton that were related to her State Department work but that were paid for out of the Clinton’s own pocket.

There’s a lost thumb drive with all the emails on it

Hanley was tasked with transferring all of Clinton’s emails onto a laptop Cooper provided from the Clinton Foundation. That laptop eventually got lost in the mail, a detail that was revealed in the 58 pages of notes the FBI released on Sept. 2.

But Hanley also transferred all of Clinton’s emails onto a thumb drive at the same time. She told the FBI she “could not recall what happened to the thumb-drive.”

The transfer came in spring 2013, shortly after longtime Clinton confidante Sidney Blumenthal’s inbox was breached by a Romanian hacker. Platte River advised the former secretary of state to change email addresses, touching off the shuffle of records onto devices that were ultimately lost.

Clinton’s attorney was cleaning up

In addition to the conference call with a Platte River employee that prompted that employee to suddenly invoke his Fifth Amendment rights, Kendall contacted Hanley in “March or April 2015,” shortly after the New York Times story was published.

Hanley did not describe what she and Kendall discussed, but she immediately cleaned out State Department records from her inbox after she spoke with him.

“Following her conversation with Kendall, Hanley searched the Gmail account she used while at [State Department] for any email communications with state.gov accounts and deleted emails associated with state.gov accounts,” the FBI wrote in its report.

An aide left classified documents in a Russian hotel room

Hanley was given “verbal security counseling” after she accidentally left a classified document and a sensitive “briefing book” in a Russian hotel suite she was using with Clinton.

Diplomatic security officers “found a classified document from the briefing book in the suite during a sweep following Clinton and Hanley’s departure” and later told Hanley “the briefing book and the document should never have been in the suite.”

Kennedy may have misled the inspector general

Patrick Kennedy, the undersecretary for management with a history of blocking inspector general probes, assured State Department Inspector General Steve Linick that Clinton had turned over electronic copies of her emails in a July 2015 meeting with the watchdog.

Then, when Linick requested the electronic file for those emails, Kennedy said he only had hard copies.

Linick also referred the FBI to additional witnesses who alleged current employees at the State Department have been “meddling with the FOIA review process.” Other witnesses pointed to Kennedy as a potential interference in the document screening that took place before Benghazi-related records were provided to Congress.

During his internal probe of agency email practices, Linick said Pagliano refused to be interviewed by the inspector general’s team about his involvement with the Clinton network.

Clinton ‘could not use a computer’

Abedin told the FBI Clinton conducted most of her work in person or on paper due to her limitations with technology.

“Abedin explained that Clinton could not use a computer and that she primarily used her iPad or BlackBerry for checking emails,” the FBI wrote of its April interview with Abedin.

Another witness told the FBI Clinton had “little patience” for technology problems.

State officials weren’t buying Clinton’s email excuses

Clinton continues to stress the fact that most of the classified emails found on her server were only retroactively designated as such — that is, they were not classified at the time they were written, but merely upgraded to classified at a later date due to a change in circumstances regarding the information.

An unnamed witness told the FBI he had “heard the argument” but didn’t quite buy it.

“It was very rare for something that was actually unclassified to become classified years after the fact,” the witness told investigators.

Including the retroactively classified documents, there were more than 2,000 classified records on Clinton’s server.

Clinton left the doors of her SCIF open when she wasn’t home

The State Department had installed SCIFs, or areas designed for the secure consumption of classified material, in both her her New York and Washington, D.C. homes.

Clinton did not always keep those areas secure, however. Cooper told the FBI she was careless when it came to keeping the SCIFs locked.

“The SCIF doors at both residences were not always secured, including times when Clinton was not at the residences,” Cooper told the FBI, according to its summary of their second of three interviews with the former Clinton family aide.

State officials worried about Clinton and classified material from the start

Eric Boswell, assistant secretary for diplomatic security for most of Clinton’s tenure, said his team had concerns about how the incoming secretary of state and her staff would treat classified areas from the beginning of their tenures.

Specifically, diplomatic security personnel worried that Clinton and her team would use their BlackBerrys inside the SCIF that encompasses much of the seventh floor at State Department headquarters, an area known as “Mahogany Row.”

Clinton’s staff had asked for a classified-enabled BlackBerry upon joining the agency, but Boswell said no such device exists.

“There was some general concern within [State Department] security personnel that Clinton’s executive staff may try to use their Blackberries [sic] in the SCIF as they were almost all brought on to [State Department] from Clinton’s campaign team, and thus were very accustom to using their Blackberries [sic],” the FBI wrote in a summary of its Feb. 2016 interview with Boswell.

Clinton frequently used a flip phone

Clinton cycled through eight BlackBerry while she was secretary of state for a total of 13 devices throughout the life of her email server, the FBI revealed earlier this month.

But she also used a flip phone to make calls, Cooper said, because she found the device “more comfortable to talk on.”

The flip phone allowed her to check emails on her Blackberry while talking on the phone, Cooper told the FBI. He could not identify what model she used and it is unclear whether the FBI ever recovered any of the flip phones in Clinton’s possession.

Tech aides described ‘Hillary cover-up operation’

Platte River employees sent emails describing the ‘Hilary [sic] coverup [sic] operation’ after Clinton’s staff asked them to begin wiping emails in Dec. 2014.

The unnamed employee who authored the phrase told FBI agents that his reference to the “cover-up” was a joke.

Clinton created second personal account when server crashed

The former secretary of state set up a previously undisclosed email account to communicate when her private server system was down.

Hanley told FBI investigators that Clinton likely created the second private account — a “gmail.com” address — to send messages when her server crashed in 2011 during a trip to Croatia.

Clinton’s top aides were hacked

Stephen Mull, a top record-keeping official at the State Department, told the FBI that “sometime in 2011,” he learned from diplomatic security officers about “concern over the possibility that some personal email accounts of [State Department] employees were hacked.”

Mull said Sullivan, who was one of the aides most frequently in contact with Clinton on her email, was among those hacked in the breaches.