Hillary Clinton’s Email Problems Just Get Worse

There’s the good news for Hillary Clinton: The FBI has recommended that no charges be brought following its investigation of the former secretary of state's private email server. The bad news?  Just about everything else.

FBI Director James B. Comey dismantled large portions of Clinton's long-told story about her private server and what she sent or received on it during a stirring 15-minute news conference, after which he took no questions. While Comey exonerated Clinton, legally speaking, he provided huge amounts of fodder that could badly hamstring her in the court of public opinion.

Most importantly, Comey said the FBI found 110 emails on Clinton's server that were classified at the time they were sent or received. That stands in direct contradiction to Clinton’s repeated insistence she never sent or received any classified emails. And it even stands in contrast to her amended statement that she never knowingly sent or received any classified information.

Comey condemned Clinton and her top aides as “extremely careless” in how they handled classified information during her time as the head of the State Department, adding: “Any reasonable person … should have known that an unclassified system was no place” for that sort of information.

There was more — much more. Comey said Clinton had used not one but multiple private email servers during her time at State. He said Clinton used multiple email devices during that time. (She had offered her desire to use a single device for “convenience” as the main reason she set up the private server.) He noted that the lawyers tasked by Clinton with sorting her private emails from her professional ones never actually read all of the emails (as the FBI did in the course of its investigation). Comey said that while the FBI found no evidence that Clinton’s private server was hacked by foreign governments, it was possible that it had been. He argued that the Clinton lawyers had deleted emails they marked as personal that contained professional content, and that while the FBI found some of those emails in its investigation, it was certainly possible more existed that they were unable to track down.

It’s worth remembering at this point that Clinton and her team deleted more emails than they turned over to the State Department.

It’s hard to read Comey’s statement as anything other than a wholesale rebuke of the story Clinton and her campaign team have been telling ever since the existence of her private email server came to light in spring 2015. She did send and receive classified emails. The setup did leave her, and the classified information on the server, subject to a possible foreign hack. She and her team did delete emails as personal that contained professional information.

Those are facts, facts delivered by the Justice Department of a Democratic administration. And those facts run absolutely counter to the narrative put forth by the Clinton operation: that this whole thing was a Republican witch-hunt pushed by a bored and adversarial media.

Now for the key question: How much do the FBI findings hurt her campaign? Clinton did avoid indictment, a ruling that would have effectively ended her campaign or left it so badly weakened that there would have been a major move within Democratic circles to replace her as the nominee.

That said, campaigns aren’t governed by the ultimate legality of what Clinton did or didn’t do. So, while dodging an indictment is a good thing, she isn’t under criminal investigation and remains a candidate, it’s a far different thing from being cleared (or even close to it) in the court of public opinion.

For a candidate already badly struggling on questions of whether she is honest and trustworthy enough to hold the office to which she aspires, Comey’s comments are devastating. Watching them, I could close my eyes and imagine them spliced into a bevy of 30-second ads — all of which end with the FBI director rebuking Clinton as “extremely careless.”

Democratic presidential candidate Hillary Clinton was cleared of wrongdoing by the FBI into her email practices while at the State Department. 

This is a very bad day for the Clinton campaign. It’s not the worst outcome (indictment), but it badly disrupts her attempts to move beyond the email server story as she seeks to unite the party in advance of the Democratic convention later this month. And it suggests the email issue will haunt her all the way through Election Day in November.

Washington Post

« China’s South Sea Cyber War
Did N. Korea Hack S. Korea’s Key Defense Contractor? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Nexer

Nexer

Nexer is a modern tech company with expertise in strategy, technology and communication with a strong vision.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.

Excite Cyber

Excite Cyber

Excite Technology Services (formerly Cipherpoint) is focused on improving the security posture of our customers.

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.