Mystery: US State Dept. Can't Find Missing Clinton Emails

The State Department has told Senate investigators it cannot find backup copies of emails sent by Bryan Pagliano, the top Hillary Clinton IT staffer who maintained her email server but has asserted his Fifth Amendment right and refused to answer questions on the matter.

State officials told the Senate Judiciary Committee in a recent closed-door meeting that they could not locate what’s known as a “.pst file” for Pagliano’s work during Clinton’s tenure, which would have included copies of the tech expert’s emails, according to a letter Chairman Chuck Grassley sent to Secretary of State John Kerry that was obtained by POLITICO.

The department also told the committee the FBI has taken possession of Pagliano’s government computer system, where traces of the messages are most likely to be found, according to the letter.

Grassley, an Iowa Republican, has been considering whether to grant Pagliano immunity in exchange for testimony on who approved Clinton's private email setup and whether anyone raised any objections to the system. The controversy over her decision to bypass a government email address, which would have made her messages easier for reporters and the public to obtain, has dogged the presidential hopeful for much of the year, though it has subsided in recent weeks.

Pagliano, who worked for Clinton’s 2008 presidential campaign, then followed her to the State Department, has refused to discuss Clinton's email arrangement or his role in it, invoking his right against self-incrimination before the House Benghazi Committee earlier this fall.

Clinton had personally paid Pagliano to maintain her home made server, which is also currently in the FBI’s possession. The agency has been investigating whether classified material was ever put at risk because she used her own server instead of the standard State email system. The State Department has designated about 1,000 of her emails as classified documents, which would never have been allowed on such a private system. Clinton’s representatives maintain that the emails were not classified at the time they were sent.

Grassley had requested Pagliano’s emails to help inform his decision whether to grant Pagliano immunity.

“Given that the committee is unable to obtain [Pagliano’s] testimony at this time, I am seeking copies of his official State Department emails relevant to the Committee’s inquiry before proceeding to consider whether it might be appropriate to grant him immunity and compel his testimony,” Grassley's letter states. It notes that such emails are a “top priority” in a list of several outstanding Clinton-related inquiries the panel has sent to the department.

The State Department said that while it has located a backup for emails Pagliano sent after Clinton left State, officials cannot find the file for the backup covering work he did while she was still there.
Ein News:http://http://bit.ly/1NpCRze

« Important Cyber Security Survey
Understanding the Threat Intelligence Lifecycle »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

Asseco Group

Asseco Group

Asseco Poland stands at the forefront of the multinational Asseco Group. We are a leading provider of state-of-the-art IT solutions in Central and Eastern Europe.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.