Hillary Clinton’s Email Problems Just Get Worse

There’s the good news for Hillary Clinton: The FBI has recommended that no charges be brought following its investigation of the former secretary of state's private email server. The bad news?  Just about everything else.

FBI Director James B. Comey dismantled large portions of Clinton's long-told story about her private server and what she sent or received on it during a stirring 15-minute news conference, after which he took no questions. While Comey exonerated Clinton, legally speaking, he provided huge amounts of fodder that could badly hamstring her in the court of public opinion.

Most importantly, Comey said the FBI found 110 emails on Clinton's server that were classified at the time they were sent or received. That stands in direct contradiction to Clinton’s repeated insistence she never sent or received any classified emails. And it even stands in contrast to her amended statement that she never knowingly sent or received any classified information.

Comey condemned Clinton and her top aides as “extremely careless” in how they handled classified information during her time as the head of the State Department, adding: “Any reasonable person … should have known that an unclassified system was no place” for that sort of information.

There was more — much more. Comey said Clinton had used not one but multiple private email servers during her time at State. He said Clinton used multiple email devices during that time. (She had offered her desire to use a single device for “convenience” as the main reason she set up the private server.) He noted that the lawyers tasked by Clinton with sorting her private emails from her professional ones never actually read all of the emails (as the FBI did in the course of its investigation). Comey said that while the FBI found no evidence that Clinton’s private server was hacked by foreign governments, it was possible that it had been. He argued that the Clinton lawyers had deleted emails they marked as personal that contained professional content, and that while the FBI found some of those emails in its investigation, it was certainly possible more existed that they were unable to track down.

It’s worth remembering at this point that Clinton and her team deleted more emails than they turned over to the State Department.

It’s hard to read Comey’s statement as anything other than a wholesale rebuke of the story Clinton and her campaign team have been telling ever since the existence of her private email server came to light in spring 2015. She did send and receive classified emails. The setup did leave her, and the classified information on the server, subject to a possible foreign hack. She and her team did delete emails as personal that contained professional information.

Those are facts, facts delivered by the Justice Department of a Democratic administration. And those facts run absolutely counter to the narrative put forth by the Clinton operation: that this whole thing was a Republican witch-hunt pushed by a bored and adversarial media.

Now for the key question: How much do the FBI findings hurt her campaign? Clinton did avoid indictment, a ruling that would have effectively ended her campaign or left it so badly weakened that there would have been a major move within Democratic circles to replace her as the nominee.

That said, campaigns aren’t governed by the ultimate legality of what Clinton did or didn’t do. So, while dodging an indictment is a good thing, she isn’t under criminal investigation and remains a candidate, it’s a far different thing from being cleared (or even close to it) in the court of public opinion.

For a candidate already badly struggling on questions of whether she is honest and trustworthy enough to hold the office to which she aspires, Comey’s comments are devastating. Watching them, I could close my eyes and imagine them spliced into a bevy of 30-second ads — all of which end with the FBI director rebuking Clinton as “extremely careless.”

Democratic presidential candidate Hillary Clinton was cleared of wrongdoing by the FBI into her email practices while at the State Department. 

This is a very bad day for the Clinton campaign. It’s not the worst outcome (indictment), but it badly disrupts her attempts to move beyond the email server story as she seeks to unite the party in advance of the Democratic convention later this month. And it suggests the email issue will haunt her all the way through Election Day in November.

Washington Post

« China’s South Sea Cyber War
Did N. Korea Hack S. Korea’s Key Defense Contractor? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

Nordic IT Security

Nordic IT Security

Nordic IT Security is a cyber security business forum in Scandinavia bringing together the converging worlds of IT, Cyber and Information Security.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Military Cyber Professionals Association (MCPA)

Military Cyber Professionals Association (MCPA)

MCPA are a team of Soldiers, Sailors, Airmen, Marines, Veterans and others interested in the development of the American military cyber profession.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

National Academy of Cyber Security (NACS)

National Academy of Cyber Security (NACS)

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.