Mystery: US State Dept. Can't Find Missing Clinton Emails

The State Department has told Senate investigators it cannot find backup copies of emails sent by Bryan Pagliano, the top Hillary Clinton IT staffer who maintained her email server but has asserted his Fifth Amendment right and refused to answer questions on the matter.

State officials told the Senate Judiciary Committee in a recent closed-door meeting that they could not locate what’s known as a “.pst file” for Pagliano’s work during Clinton’s tenure, which would have included copies of the tech expert’s emails, according to a letter Chairman Chuck Grassley sent to Secretary of State John Kerry that was obtained by POLITICO.

The department also told the committee the FBI has taken possession of Pagliano’s government computer system, where traces of the messages are most likely to be found, according to the letter.

Grassley, an Iowa Republican, has been considering whether to grant Pagliano immunity in exchange for testimony on who approved Clinton's private email setup and whether anyone raised any objections to the system. The controversy over her decision to bypass a government email address, which would have made her messages easier for reporters and the public to obtain, has dogged the presidential hopeful for much of the year, though it has subsided in recent weeks.

Pagliano, who worked for Clinton’s 2008 presidential campaign, then followed her to the State Department, has refused to discuss Clinton's email arrangement or his role in it, invoking his right against self-incrimination before the House Benghazi Committee earlier this fall.

Clinton had personally paid Pagliano to maintain her home made server, which is also currently in the FBI’s possession. The agency has been investigating whether classified material was ever put at risk because she used her own server instead of the standard State email system. The State Department has designated about 1,000 of her emails as classified documents, which would never have been allowed on such a private system. Clinton’s representatives maintain that the emails were not classified at the time they were sent.

Grassley had requested Pagliano’s emails to help inform his decision whether to grant Pagliano immunity.

“Given that the committee is unable to obtain [Pagliano’s] testimony at this time, I am seeking copies of his official State Department emails relevant to the Committee’s inquiry before proceeding to consider whether it might be appropriate to grant him immunity and compel his testimony,” Grassley's letter states. It notes that such emails are a “top priority” in a list of several outstanding Clinton-related inquiries the panel has sent to the department.

The State Department said that while it has located a backup for emails Pagliano sent after Clinton left State, officials cannot find the file for the backup covering work he did while she was still there.
Ein News:http://http://bit.ly/1NpCRze

« Important Cyber Security Survey
Understanding the Threat Intelligence Lifecycle »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Sirama Consulting

Sirama Consulting

Sirama is an IT consulting firm which caters to small businesses. Services include Network Security, Backup & Disaster Recovery, Mobile Device Management.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

FCase

FCase

FCase is an end-to-end Fraud Orchestrator which takes fraud management systems from basic, standalone detection to an enterprise-focused approach.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.