Mystery: US State Dept. Can't Find Missing Clinton Emails

The State Department has told Senate investigators it cannot find backup copies of emails sent by Bryan Pagliano, the top Hillary Clinton IT staffer who maintained her email server but has asserted his Fifth Amendment right and refused to answer questions on the matter.

State officials told the Senate Judiciary Committee in a recent closed-door meeting that they could not locate what’s known as a “.pst file” for Pagliano’s work during Clinton’s tenure, which would have included copies of the tech expert’s emails, according to a letter Chairman Chuck Grassley sent to Secretary of State John Kerry that was obtained by POLITICO.

The department also told the committee the FBI has taken possession of Pagliano’s government computer system, where traces of the messages are most likely to be found, according to the letter.

Grassley, an Iowa Republican, has been considering whether to grant Pagliano immunity in exchange for testimony on who approved Clinton's private email setup and whether anyone raised any objections to the system. The controversy over her decision to bypass a government email address, which would have made her messages easier for reporters and the public to obtain, has dogged the presidential hopeful for much of the year, though it has subsided in recent weeks.

Pagliano, who worked for Clinton’s 2008 presidential campaign, then followed her to the State Department, has refused to discuss Clinton's email arrangement or his role in it, invoking his right against self-incrimination before the House Benghazi Committee earlier this fall.

Clinton had personally paid Pagliano to maintain her home made server, which is also currently in the FBI’s possession. The agency has been investigating whether classified material was ever put at risk because she used her own server instead of the standard State email system. The State Department has designated about 1,000 of her emails as classified documents, which would never have been allowed on such a private system. Clinton’s representatives maintain that the emails were not classified at the time they were sent.

Grassley had requested Pagliano’s emails to help inform his decision whether to grant Pagliano immunity.

“Given that the committee is unable to obtain [Pagliano’s] testimony at this time, I am seeking copies of his official State Department emails relevant to the Committee’s inquiry before proceeding to consider whether it might be appropriate to grant him immunity and compel his testimony,” Grassley's letter states. It notes that such emails are a “top priority” in a list of several outstanding Clinton-related inquiries the panel has sent to the department.

The State Department said that while it has located a backup for emails Pagliano sent after Clinton left State, officials cannot find the file for the backup covering work he did while she was still there.
Ein News:http://http://bit.ly/1NpCRze

« Important Cyber Security Survey
Understanding the Threat Intelligence Lifecycle »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center is a not-for-profit organization focused on regional cybersecurity excellence and readiness, with a special emphasis on the maritime community.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Vanbreda

Vanbreda

Vanbreda Risk & Benefits is the largest independent insurance broker and risk consultant in Belgium and the leading insurance partner in the Benelux.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.