The E-mail Server




Bill Clinton used tax dollars to subsidize foundation, private email server:


>Politico is standing by a story and headline claiming, “Bill Clinton used tax dollars to subsidize foundation, private email server,” despite Hillary Clinton’s campaign calling the report “egregiously false.”

>A Politico spokesperson told TheWrap that the “story is 100 percent accurate and has not changed.” A note has been added to the story, stating that Politico tweaked the original headline, swapping the word “server” with “support.”

>Clinton’s press secretary, Brian Fallon, said otherwise on Twitter Thursday morning.


A SCIF was built for Hillary’s email servers at home.

Explanation below for why that is a HUGE deal.


What does a SCIF look like? Here is the one installed in the White House for example:

Hillary Clinton testified before Congress that she had a SCIF in her home.


Once the email scandal broke we learned that Hillary had an unsecure server setup in her home where she used a personal email address to conduct State Dept business. Many intelligence and security experts have questioned exactly HOW Hillary got Classified information from the SCIF, sent to her personal email. Here is Hillary testifying before Congress on Benghazi that she had a SCIF in her home. Is this true?!


A SCIF is a U.S. Government accredited facility where Sensitive Compartmented Information (SCI) can be stored, discussed or electronically processed. Primarily Government and government-related contractors that require high security have the need for SCIFs. The areas of concern and special attention typically include physical security and hardening, acoustics controls, visual controls, access control, electronic and TEMPEST security.


Hillary testified she had one of these in her home? If so, would she send her aides in? Who all had access to this SCIF inside the Clinton home? Who built it?


What is a SCIF or Sensitive Compartmented Information Facility?


Access to SCIFs is normally limited to those with clearance.[1] Non-cleared personnel in SCIF must be under constant oversight to prevent unauthorized access to classified material;[2] as part of this process, non-cleared personnel are typically required to surrender recording and other electronic devices.[3] All of the activity and conversation inside is presumed restricted from public disclosure.


The minimum requirements for SCIFs are defined in Intelligence Community Directive (ICD) 705/ IC Technical Specification. The directive describes many specialized construction requirements with the intention to ensure that high security features are built into the facility beyond those achieved by typical commercial construction.


For example, all perimeter surfaces (walls, ceilings and floor) are to be constructed so that they will reveal evidence of unauthorized entry or tampering. Depending on each project’s individual performance requirements, additional materials may be required for construction, such as radiant barrier foil, physical perimeter hardening by use of expanded metal with heavier gauge metal studs, as well as additional protective acoustical features to prevent eavesdropping and collection of audio intelligence emanating from the SCIF. There are various methods of achieving the proper protective measures required for a fully accredited facility and these various methods can have a substantial cost impact on the project. Since the selection of which methods are to be used is determined by each project’s unique characteristics such as “Open” or “Closed” storage, Security in Depth (SID), Inspectable Space, as well as the surrounding conditions, it is most beneficial in terms of both time and money to properly design the facility prior to construction.


A few of the many specialized requirements are;


  • All telephone, electrical power, security systems, data and emergency systems equipment must be dedicated to and contained within the SCIF. Any utility that enters the SCIF should terminate in the SCIF and not traverse through the space. Where the conduit for any of these systems penetrate the SCIF perimeter, they must be treated to minimize the chance of compromise. Fire sprinkler systems and other metallic materials that penetrate SCIF perimeter must be grounded or use dielectric unions. Additional shielding or isolation is often required to prevent interference or electronic eavesdropping through electromagnetic or radio frequencies.


  • There are very specific requirements for ductwork. For example, if ductwork for mechanical operations has openings in the SCIF larger than 96 square inches, they must be equipped with steel man bars that are ½-inch in diameter and 6 inches on center each way, welded at the intersections, with inspection ports inside the SCIF. The openings, the ductwork and the duct breaks must also have special sections inserted to secure audio and electronic emanations from leaving the SCIF space.


  • In most cases the perimeter doors must utilize two access control technologies. The first one for operational day-to-day use, and the second for high security lock up when personnel leave the space unattended. The door and frame assembly must not only meet local building and fire/life safety requirements, but must also achieve the same specified Sound Transmission Class (STC) rating as the perimeter wall assemblies of the facility.


  • There are also requirements for UL2050 certified installers and UL2050 approved components to be used for the Intrusion Detection Systems (IDS).


Hillary Clinton, and explanation of the SCIF, and how Obama had to know.



>The Secretary of State of the United States reading, sending, receiving sensitive emails with national security secrets, threats and classified or top secret intelligence over Google’s public Gmail.

>Following the Benghazi consulate attack in 2012, then Secretary of State Hillary Clinton secretly worked with Google to reroute email traffic away from her private computer server and use public Google Gmail servers instead.

>That clandestine move served to cloak her inner circle’s communications from lawmakers, public scrutiny and would-be criminal investigators, according to intelligence sources who provided documents to True Pundit.

>Clinton’s former and privately-paid information technology guru Bryan Pagliano worked with Google to convert’s server.

>For several reasons, Google Mail is a problematic choice to maintain secure email because all email content is scanned, or “indexed” by robots or Google personnel. That data is ultimately stored separately by Google and thereby presents an additional security risk if the servers are ever breached. Google mail is often hacked, especially the private accounts of U.S. government brass.

>The bulk of Clinton’s emails which were diverted using Google have never been provided to anyone: not the State Department; not Congress; not the U.S. House Select Committee on Benghazi. Therefore, their content likewise remains secret.


Turns out, Hillary did not use a Gmail account but one of her aides used a Gmail account to move e-mails from the private server onto a laptop. That laptop ended up missing/lost.


The Gmail servers are what the FBI accessed to find out what e-mails (classified documents) were on the lost laptop.


>In one instance, after Clinton left office, someone created a personal Gmail account to move an archive of Clinton’s email on a laptop to a server run by Platte River Networks, a company Clinton had hired. The person then attempted to ship the laptop back to another person connected to Clinton.


>According the FBI report, the laptop, which had not been wiped, got lost in transit. And the FBI would come to find on the Gmail account dozens of classified emails.