Hillary Clinton’s Email Problems Just Get Worse

There’s the good news for Hillary Clinton: The FBI has recommended that no charges be brought following its investigation of the former secretary of state's private email server. The bad news?  Just about everything else.

FBI Director James B. Comey dismantled large portions of Clinton's long-told story about her private server and what she sent or received on it during a stirring 15-minute news conference, after which he took no questions. While Comey exonerated Clinton, legally speaking, he provided huge amounts of fodder that could badly hamstring her in the court of public opinion.

Most importantly, Comey said the FBI found 110 emails on Clinton's server that were classified at the time they were sent or received. That stands in direct contradiction to Clinton’s repeated insistence she never sent or received any classified emails. And it even stands in contrast to her amended statement that she never knowingly sent or received any classified information.

Comey condemned Clinton and her top aides as “extremely careless” in how they handled classified information during her time as the head of the State Department, adding: “Any reasonable person … should have known that an unclassified system was no place” for that sort of information.

There was more — much more. Comey said Clinton had used not one but multiple private email servers during her time at State. He said Clinton used multiple email devices during that time. (She had offered her desire to use a single device for “convenience” as the main reason she set up the private server.) He noted that the lawyers tasked by Clinton with sorting her private emails from her professional ones never actually read all of the emails (as the FBI did in the course of its investigation). Comey said that while the FBI found no evidence that Clinton’s private server was hacked by foreign governments, it was possible that it had been. He argued that the Clinton lawyers had deleted emails they marked as personal that contained professional content, and that while the FBI found some of those emails in its investigation, it was certainly possible more existed that they were unable to track down.

It’s worth remembering at this point that Clinton and her team deleted more emails than they turned over to the State Department.

It’s hard to read Comey’s statement as anything other than a wholesale rebuke of the story Clinton and her campaign team have been telling ever since the existence of her private email server came to light in spring 2015. She did send and receive classified emails. The setup did leave her, and the classified information on the server, subject to a possible foreign hack. She and her team did delete emails as personal that contained professional information.

Those are facts, facts delivered by the Justice Department of a Democratic administration. And those facts run absolutely counter to the narrative put forth by the Clinton operation: that this whole thing was a Republican witch-hunt pushed by a bored and adversarial media.

Now for the key question: How much do the FBI findings hurt her campaign? Clinton did avoid indictment, a ruling that would have effectively ended her campaign or left it so badly weakened that there would have been a major move within Democratic circles to replace her as the nominee.

That said, campaigns aren’t governed by the ultimate legality of what Clinton did or didn’t do. So, while dodging an indictment is a good thing, she isn’t under criminal investigation and remains a candidate, it’s a far different thing from being cleared (or even close to it) in the court of public opinion.

For a candidate already badly struggling on questions of whether she is honest and trustworthy enough to hold the office to which she aspires, Comey’s comments are devastating. Watching them, I could close my eyes and imagine them spliced into a bevy of 30-second ads — all of which end with the FBI director rebuking Clinton as “extremely careless.”

Democratic presidential candidate Hillary Clinton was cleared of wrongdoing by the FBI into her email practices while at the State Department. 

This is a very bad day for the Clinton campaign. It’s not the worst outcome (indictment), but it badly disrupts her attempts to move beyond the email server story as she seeks to unite the party in advance of the Democratic convention later this month. And it suggests the email issue will haunt her all the way through Election Day in November.

Washington Post

« China’s South Sea Cyber War
Did N. Korea Hack S. Korea’s Key Defense Contractor? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Fastcomcorp

Fastcomcorp

Fastcomcorp offers a world-class proactive cyber security defense and risk management consulting. Including Darkweb monitoring and posture assessments.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

SydeLabs

SydeLabs

At SydeLabs, our mission is to ensure the comprehensive security of your AI systems.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

ReformIT

ReformIT

ReformIT is a Managed IT Service and Security provider with many years experience helping companies find the right IT solutions to meet the needs of their businesses.