January 22, 2009: Clinton signs a non-disclosure agreement promising to safeguard a type of top secret information.

Hillary's signature on the non-disclosure agreement (NDA). (Credit: public domain)

Hillary’s signature on the non-disclosure agreement (NDA). (Credit: public domain)

The non-disclosure agreement (NDA) concerns “sensitive compartmented information” (SCI), which is a type of “top secret” classification. In signing the agreement, Clinton acknowledges any “breach” could result in “termination of my access to SCI and removal from a position of special confidence and trust requiring such access as well as the termination of my employment or any other relationships with any department or agency that provides me with access to SCI.” (US Department of State, 11/5/2015)

This is one of two NDAs Clinton signs on this day.

It will later be revealed that out of the over 30,000 emails Clinton turned over to the State Department in December 2014, three of them were deemed “top secret / Sensitive Compartmented Information.”

January 22, 2009: Clinton gets an annual security briefing on the proper handling of classified materials, but this is her only one in her four years as Secretary of State.

Colonel James Waurishuk, former deputy director of intelligence for US Central Command. (Credit: 912organizer / YouTube)

Colonel James Waurishuk, former deputy director of intelligence for US Central Command. (Credit: 912organizer / YouTube)

All State Department employees are required to receive regular security training through a briefing at least once a year. It is not clear how or why Clinton will miss her briefing in the next three years. At the end of the briefing she does attend, she signs a document acknowledging her understanding of what she has been told. This is according to State Department documents that will be released to the Daily Caller in 2016 due to a Freedom of Information Act (FOIA) request.

State Department spokesperson Mark Toner will later tell reporters, “It’s my understanding that the secretary of state, everybody in this building, would receive that type of training and awareness. We all have to undergo through that. It’s considered mandatory.”

Former senior intelligence officer Colonel James M. Waurishuk will comment, “Who decided she would only get that one-time briefing? That almost sounds as if it’s a culture issue within her organization. I can’t imagine what went through her mind. There’s no excuse.” (The Daily Caller, 3/24/2016)

January 22, 2009: Under penalty of perjury, Clinton signs a pledge to safeguard classified information whether “marked or unmarked classified information, including oral communications.”

The top and bottom of the agreement Clinton signs on this date. The signature of the witness is redacted. (Credit: public domain)

The top and bottom of the agreement Clinton signs on this date. The signature of the witness is redacted. (Credit: public domain)

The very first paragraph of the “Classified Information Nondisclosure Agreement” she signs states, “As used in this Agreement, classified Information is marked or unmarked classified Information.”

According to Executive Order 12958, which is in effect at the time, since she is the secretary of state, she is given the authority to classify or declassify any State Department information she wants. However, as part of her nondisclosure agreement (NDA), she has the legal responsibility to identify and safeguard any classified information originating from other government agencies, whether that information is marked classified or not. (The Washington Post, 2/4/2016) (US Department of State, 11/5/2015)

This is one of two NDAs Clinton signs on this day.

January 24, 2009: Clinton passes on using a secure computer to check her private email account at her office desk.

President Obama uses a BlackBerry while traveling in Indonesia in 2010. (Credit: Pete Souza / The White House)

President Obama uses a BlackBerry while traveling in Indonesia in 2010. (Credit: Pete Souza / The White House)

By this time, the National Security Agency (NSA) arranges for President Obama to use a secure, encrypted BlackBerry, allowing him to use it anywhere. Clinton and her top aides want Clinton to have one too.

On this day, Cheryl Mills, Clinton’s chief of staff, asks in a group email, “[H]ow can we get her one?”

Lewis Lukens, Clinton’s logistics chief, responds the same day that he could help set up “a stand-alone PC [personal computer] in the Secretary’s office, connected to the Internet (but not through our system) to enable her to check her emails from her desk.”

Under Secretary of State Patrick Kennedy replies that that is “a great idea.”

But apparently, Clinton insists on using her BlackBerry at all times and never a desktop computer, so no such computer is ever set up. (The Washington Post, 3/27/2016)

Around February 2009: Clinton allegedly wants to use a iPad in her office but is not allowed to do so; however the iPad won’t be released until one year later.

The first Apple iPad was released in January, 2010. (Credit: public domain)

The first Apple iPad (Credit: public domain)

Around February 2009, the NSA refuses to make a BlackBerry for Clinton that’s secure enough to use in SCIF rooms, citing security concerns. (Highly classified materials can only be read in SCIF rooms, and Clinton’s office in State Department headquarters is a SCIF room.)

According to a September 2016 FBI report, at roughly the same time, Clinton’s executive staff also ask about the possibility of Clinton using an iPad to read her emails in her office. But “this request was also denied due to restrictions associated with the Secretary’s office being in a SCIF.” (Federal Bureau of Investigation, 9/2/2016)

However, the FBI will fail to mention that the iPad won’t actually be announced by Apple until January 2010, and won’t be released until a couple of months after that, making the above claim impossible. (Apple.com, 1/27/2010)

Clinton will buy an iPad and begin using it a couple of months after it comes out, in July 2010.

February 2009: Security officials set up a space near Clinton’s office where she can check her private email account. 

Clinton meets with Supreme Court justice Ruth Bader Ginsburg in her outer office,on January 25, 2012. (Credit: public domain)

Clinton meets with Supreme Court justice Ruth Bader Ginsburg in her outer office, on January 25, 2012. (Credit: public domain)

Clinton’s office in State Department headquarters is a SCIF, which means a secure room, and she’s not allowed to bring her BlackBerry into it. Also, Clinton is unwilling to use a computer to check her emails. But around this time, security officials create a space where she can check her BlackBerry.

In 2016, a State Department official will explain, “There is an area dedicated to supporting the secretary outside but in the immediate vicinity of the secretary’s secure office. Secretary Clinton, as with anyone, could use such non-SCIF spaces to check personal devices.” Apparently, Clinton will use this arrangement for her entire four years as secretary of state. (Fox News, 3/16/2016)

February 12, 2009: An email suggests Clinton gets a new cell phone, despite her later claims that she didn’t use one.

090212clintonflipphonekarenbleierafpgetty

Clinton talks on a flip phone in Washington, DC on November 14, 2006. (Credit: Karen Bleir / Agence France Presse / Getty Images)

An email sent to or received by Clinton on this day has the subject heading: “Re: New cell.” It won’t be found in the over 30,000 Clinton emails given to the State Department in December 2014. Thus, the details are known because she will be asked about it in her July 2016 FBI interview.

According to a later FBI report, “Clinton stated she was familiar with the phone number ending in [redacted] referenced in the email. She believed the number was that of her BlackBerry because she did not recall using a flip phone during her time at State, only while in the Senate.”

However, in the FBI Clinton email investigation final report, evidence will be mentioned that Clinton actually had two phone numbers. One was for her BlackBerry, which she used just for emails, and one for her flip phone, which she used for phone calls. (Federal Bureau of Investigation, 9/2/2016)

February 13, 2009: The NSA refuses to set up a secure BlackBerry for Clinton.

Donald Reid (Credit: The Department of State Archives)

Donald Reid (Credit: The Department of State Archives)

Although the National Security Agency (NSA) has set up a secure, encrypted BlackBerry for President Obama, they are not interested in making one for Clinton.

On this day, Donald Reid, the State Department’s senior coordinator for security infrastructure, writes in an email, “The current state of the art is not too user friendly, has no infrastructure at State, and is very expensive.” He adds that “each time we asked the question ‘What was the solution for [President Obama]?’ we were politely told to shut up and color.”

On February 18, 2009, Reid had said in an email, “The issue here is one of personal comfort,” because Clinton and her top aides are “dedicated [BlackBerry] addicts.” (The Washington Post, 3/27/2016)

February 24, 2009: A security official warns that BlackBerry could be easily hacked on overseas trips.

Joel Brenner (Credit: Kera News)

Joel Brenner (Credit: Kera News)

Joel Brenner, chief of counterintelligence at the Office of the Director of National Intelligence, gives a speech to government officials and urges them to consider what possible attacks could have occurred during a visit to the recent Beijing Olympics. “Your phone or BlackBerry could have been tagged, tracked, monitored and exploited between your disembarking the airplane and reaching the taxi stand at the airport. And when you emailed back home, some or all of the malware may have migrated to your home server. This is not hypothetical.”

Clinton had just returned from a trip to China and other Asian countries.

Although top State Department officials are aware of Brenner’s warning, she takes her BlackBerry on her future overseas trips despite it still not being inspected and secured by department officials. (The Washington Post, 3/27/2016)

Late February 2009: State Department security officials worry about Clinton’s BlackBerry use.

The US State Department headquarters in Washington, DC. "Mahogany Row" is on the top floor. (J. Scott Applewhite / The Associated Press)

The US State Department headquarters in Washington, DC. “Mahogany Row” is on the top floor. (J. Scott Applewhite / The Associated Press)

Few State Department officials appear to know that Clinton has a private email server in her house.

However, news about her frequent BlackBerry use soon spreads among the Department’s security officials. They are concerned about “Mahogany Row,” the seventh floor offices of Clinton and her top aides.

A decade earlier, Russian spies placed a listening device in a chair on that floor. Since then, on multiple occasions, hackers had breached computers in the State Department and other federal agencies.

State Department security officials are particularly concerned that Clinton’s BlackBerry could be compromised, and they worry that she could be setting a “bad example” for others in the department. They craft a memo that discusses the risks, which will be sent out on March 6. (The Washington Post, 3/27/2016)

March 2009—June 2011: An external hard drive backs up the data on Clinton’s private server, but it is unclear what happens to it or its replacement.

The Seagate Expansion External Hardrive (Credit: Seagate)

The Seagate Expansion External Hard Drive (Credit: Seagate)

When Clinton’s first server is upgraded with a new server in March 2009, a Seagate external hard drive is attached to the server to store back-up copies of all of its data.

Bryan Pagliano, who manages the server at the time, will later tell the FBI that daily changes are backed up onto the hard drive every day, and a complete back-up is made once a week. As space on the hard drive runs out, backups are deleted on a “first in, first out” basis.

This continues until June 2011. That month, Pagliano travels from Washington, DC, where he works in the State Department, and goes to where the server is, in Chappaqua, New York. Pagliano replaces the Seagate external hard drive with a Cisco Network Attached Storage (NAS) device, also to store backups of the server.

The Cisco FS 5500 and 5700 Series Integrated NAS. (Credit: Cisco)

The Cisco FS 5500 and 5700 Series Integrated NAS. (Credit: Cisco)

It is unclear what becomes of either back-up device or the data they contained. The FBI’s September 2016 final report on the Clinton email investigation will only mention: “The FBI was unable to forensically determine how frequently the NAS captured backups of the Pagliano Server.” But the report will also complain about the “FBI’s inability to recover all server equipment,” and there will be no mention of any data recovered from either back-up device. (Federal Bureau of Investigation, 9/2/2016)

Also in September 2016, Justin Cooper, who helped Pagliano manage the server, will be asked about these hard drives at a Congressional hearing. He will say he only heard about them from reading the FBI final report. (He claims he handled customer service while Pagliano handled the technical aspects.)

He will also be asked if FBI agents ever came to the Clinton’s Chappaqua house to seize any equipment. Cooper worked as an aide to Bill Clinton in the house, but he will say he is unaware of the FBI ever coming to the house. (US Congress, 9/13/2016)

March 2009: Clinton’s personal email server is replaced; she will use the new one for the rest of her term as secretary of state.

Justin Cooper, an aide to former President Bill Clinton, has been working with Bryan Pagliano, who worked as a computer technician on Hillary Clinton’s 2008 presidential campaign, to build a new private server located in the Clintons’ Chappaqua, New York, house. Some time in March 2009, Pagliano and Cooper met at the Chappaqua house to physically install the server and related equipment in a server rack in the basement.

Once the new server is up and running, Pagliano migrates the email data from the old server to the new one. Pagliano will later be interviewed by the FBI, and he will claim that after the migration, no email content should have remained on the old server. He will tell the FBI that he only transferred clintonemail.com email accounts for Clinton aide Huma Abedin and others (whose names will later be redacted), and he was unaware of and did not transfer an email account for Hillary Clinton.

However, Clinton emails using a clintonemail.com domain address start getting sent in January 2009, showing she must had had an account on the old server since that time. Cooper will also later be interviewed by the FBI, and he will say he believed Clinton had a clintonemail.com email account on the old server and Abedin did not. The FBI will be unable to obtain the old server to analyze it, so the dispute has not been fully resolved.

130601DellPowerEdge2900public

The Dell Power Edge 2900 (Credit: public domain)

This new server will be used for the rest of Clinton’s term as secretary of state, then will be replaced in 2013. Later in March 2009, the old server is repurposed to serve as a personal computer for household staff at Clinton’s Chappaqua house. (Federal Bureau of Investigation, 9/2/2016)

The Washington Post will later report, “The server was nothing remarkable, the kind of system often used by small businesses, according to people familiar with its configuration at the end of her tenure. It consisted of two off-the-shelf server computers. Both were equipped with antivirus software. They were linked by cable to a local Internet service provider. A firewall was used as protection against hackers.” (The Washington Post, 3/27/2016)

According to the FBI, the new server initially consists of the following equipment: “a Dell PowerEdge 2900 server miming Microsoft Exchange for email hosting and management, a Dell PowerEdge 1950 server miming BlackBerry Enterprise Server (BES) for the management of BlackBerry devices, a Seagate external hard drive to store backups of the Dell PowerEdge 2900 server, a Dell switch, a Cisco firewall, and a power supply.” (Federal Bureau of Investigation, 9/2/2016)

In 2015, Hillary Clinton will say of her server, “It was sitting there in the basement. It was not any trouble at all.” (The Wall Street Journal, 9/27/2015)

March 2009—May 31, 2013: Bryan Pagliano and Justin Cooper jointly manage Clinton’s private server.

160301PaglianoCooperMontage

Bryan Pagliano (left), Justin Cooper (right) (Credit: public domain)

In March 2009, Clinton’s private email server is replaced by a larger one built by her computer technician Pagliano. Cooper had been the only person with administrative access for the previous server, but now both him and Pagliano have administrative accounts on the new one.

Pagliano handles all software upgrades and general maintenance. He works at the State Department in Washington, DC, and there is only evidence of him going to Chappaqua, New York, to directy work on the server three times: in March 2009, to install the server; in June 2011, to upgrade the equipment; and in January 2012, to fix a hardware issue.

By contrast, in a later FBI interview, Cooper will describe his role as “the customer service face.” He can add users or reset passwords on the email server. He also works at the Chappaqua house as an aide to former President Bill Clinton, so it is much easier for him to physically interact with the server there.

Cooper and Pagliano both handle the selection and purchase of server-related items.

In a later FBI interview, Hillary Clinton will state “she had no knowledge of the hardware, software, or security protocols used to construct and operate the servers. When she experienced technical issues with her email account she contacted Cooper for assistance in resolving those issues.”

The roles of Cooper and Pagliano will be phased out in mid-2013, with the Platte River Networks company winning a contact to manage Clinton’s server on May 31, 2013.

Around Spring 2009: Pagliano is warned that classified information could be sent to Clinton’s private server, but there is no sign he takes action or passes this warning on.

When Clinton’s computer technician Bryan Pagliano is interviewed by the FBI in December 2015, he will recall a conversation with a person whose name is redacted that takes place at the beginning of Clinton’s tenure as secretary of state. According to the FBI, this person “advised he would not be surprised if classified information was being transmitted to Clinton’s personal server.”

Pagliano joins the State Department in May 2009, and he also is the main person to manage problems with the server. But there is no mention of him taking any action about this warning or passing it on to anyone else. The unnamed person also gives Pagliano advice on how to improve the server security that goes unheeded as well. (Federal Bureau of Investigation, 9/2/2016)

Around Spring 2009: Clinton’s computer technician is advised to make a key improvement to the security of Clinton’s private server, but the improvement is never made.

When Bryan Pagliano, the manager of Clinton’s private server while she Clinton’s is secretary of state, will be interviewed by the FBI in December 2015, he will recall a conversation that takes place around the beginning of Clinton’s tenure. This person, whose name is later redacted, recommends that email transiting from a state.gov account to Clinton’s private server should be sent through a Transport Layer Security (TLS) “tunnel.” Most of Clinton’s email traffic is with State Department officials using state.gov accounts.

A diagram of the Transport Layer Security (TLS) (Credit: public domain)

A diagram described as Networking 101: Transport Layer Security (TLS) (Credit: public domain)

A September 2016 FBI report will explain: “TLS is a protocol that ensures privacy between communicating applications, such as web browsing, email, and instant messaging, with their users on the Internet. TLS ensures that no third-party eavesdrops on the two-way communication. TLS is the successor to SSL and is considered more secure.”

Pagliano is the main person to manage problems with the server, but he will tell the FBI that the transition to TLS never occurred. It is not clear why. The FBI will be unable to forensically determine if TLS was ever implemented on the server.

The same unnamed person who gives Pagliano this advice also tells him at the same time that he would not be surprised if classified information was being transmitted to Clinton’s personal server.  (Federal Bureau of Investigation, 9/2/2016)

March 6, 2009—March 15, 2009: Clinton says she “gets it” about BlackBerry security concerns, but she keeps on using her BlackBerry.

Eric Boswell (Credit: public domain)

Eric Boswell (Credit: public domain)

On March 6, 2009, Assistant Secretary for Diplomatic Security Eric Boswell emails an internal State Department memo with the subject line “Use of BlackBerrys in Mahogany Row.” (“Mahogany Row” is where the seventh floor offices of Clinton and her top aides are.) The memo states, “Our review reaffirms our belief that the vulnerabilities and risks associated with the use of BlackBerrys in the Mahogany Row [redacted] considerably outweigh the convenience their use can add. … Any unclassified BlackBerry is highly vulnerable in any setting to remotely and covertly monitoring conversations, retrieving emails, and exploiting calendars.”

According to an email by another security official nine days later on March 15, Clinton tells Boswell that she read his memo and “gets it.” That email adds, “Her attention was drawn to the sentence that indicates (Diplomatic Security) have intelligence concerning this vulnerability during her recent trip to Asia.”

However, Clinton continues to use her BlackBerry and private server without any apparent changes. (The Washington Post, 3/27/2016)

March 29, 2009: For the first two months Clinton uses her private server for all her emails, it operates without the standard encryption generally used to protect Internet communication.

Clinton meets Chinese State Councillor Dai Bingguo in the Diaoyutai State Guesthouse in Beijing, China, on February 21, 2009. (Credit: Greg Baker / Getty Images)

Clinton meets Chinese State Councillor Dai Bingguo in the Diaoyutai State Guesthouse in Beijing, China, on February 21, 2009. (Credit: Greg Baker / Getty Images)

This is according to a 2015 independent analysis by Venafi Inc., a cybersecurity firm that specializes in the encryption process. Not until this day does the server receive a “digital certificate” that encrypts and protects communication over the Internet through encryption.

The Washington Post will later report, “It is unknown whether the system had some other way to encrypt the email traffic at the time. Without encryption—a process that scrambles communication for anyone without the correct key—email, attachments and passwords are transmitted in plain text.”

A Venafi official will later comment, “That means that anyone could have accessed it. Anyone.” (The Washington Post, 3/27/2016)

Clinton began sending emails using the server by January 28, 2009, but will later claim she didn’t start using it until March 18, 2009—a two-month gap similar to the two-month gap the server apparently wasn’t properly protected. Apparently, she has not given investigators any of her emails from before March 18. (The New York Times, 9/25/2015)

A 2016 op-ed in the Washington Post will suggest that security concerns during Clinton’s February 2009 trip to Asia could have prompted the use of encryption on her server. (The Washington Post, 4/4/2016)

An FBI report released in September 2016 will confirm that encyption only began in March 2009. It states that “in March 2009, [Bill Clinton aide Justin] Cooper registered a Secure Sockets Layer (SSL) encryption certificate at [Bryan] Pagliano’s direction for added security when users accessed their email from various computers and devices.” (Federal Bureau of Investigation, 9/2/2016)

April 23, 2009: Clinton aide Huma Abedin sends Clinton a series of steps the State Department is taking to secure the US embassies in Afghanistan and Pakistan.

The US embassy in Kabul, Afghanistan, in 2010. (Credit: public domain)

The US embassy in Kabul, Afghanistan, in 2010. (Credit: public domain)

Abedin, Clinton’s deputy chief of staff, lists steps that include “increasing the number of hooches, and doubling up staff in lodging.” The email adds more details, for instance, “[W]e need to improve the security perimeter – acquiring property adjacent to our current facilities in Kabul, which is now difficult to secure.” In addition to mentioning information that could benefit attackers of the embassies, the email shows that Clinton was briefed on embassy security issues, despite her claim that she did not directly deal with such matters. (Politico, 10/30/2015)

May 2009: Bryan Pagliano is hired as a political employee in the State Department’s IT [Information Technology] division, while he continues to manage Clinton’s private server in her house.

Susan Swart (Credit: Government CIO Magazine)

Susan Swart (Credit: Government CIO Magazine)

The Washington Post will later report, “Officials in the IT division have told investigators they could not recall previously hiring a political appointee.” Pagliano had worked as the IT director for Clinton’s PAC [political action committee] and also for her presidential campaign, and was paid by the PAC until April 2009. He also provided computer services to the Clinton family. (The Washington Post, 3/27/2016)

Patrick Kennedy, the department’s under secretary for management, oversees the hiring of Pagliano. Pagliano’s new bosses Susan Swart, head of the department’s Bureau of Information Resource Management, and her deputy, Charlie Wisecarver exchange emails expressing confusion and surprise that Kennedy has given them a political employee to work in the IT division. (Reuters, 3/24/2016) His initial salary is $133,000 a year. As a Schedule C political hire, Pagliano is vetted by the State Department’s Office of White House Liaison, where Heather Samuelson holds a top position. Samuelson worked on Clinton’s 2008 presidential campaign, as did Pagliano, and in 2014 she will be one of three Clinton aides who decide which of Clinton’s 60,000 emails will be deleted. (The Daily Caller, 3/3/2016)

May 2009—February 2013: Pagliano is paid by the Clintons to manage their private server, but details are murky.

According to a later account by Clinton’s legal counsel, Clinton’s computer technician Bryan Pagliano performs “technology services for the Clinton family for which he [is] compensated” by check or wire transfer in varying amounts at various times between 2009 and 2013. Most importantly, he manages her private email server as an outside job, including doing so during his hours for the State Department. However, exactly how much he gets paid is unknown. Other details such as who he directly reports to, who directly pays him, and how many hours a week he works on the task also remain unknown. It appears that Justin Cooper, an assistant to Bill Clinton who does not work in government, sometimes helps manage the server as well. But Cooper’s role is even more unclear. (US Department of State, 5/25/2016)

May 2009—February 2013: Clinton’s computer technician lies about his outside income running Clinton’s private server.

In May 2009, begins working for the State Department while continuing to be paid by Clinton for managing her private server. However, he does not list his outside income in the required personal financial disclosures he files each year. This continues until his full time department job ends in February 2013, the same month Clinton’s tenure as secretary of state ends. In early 2015, a State Department official will say that the department has “found no evidence that he ever informed the department that he had outside income.” (The Washington Post, 9/5/2015To lie on such a financial disclosure form is a felony punishable by up to five years in prison. (US Legal Code, 2/24/2012)

May 2009—February 2013: Clinton’s computer technician secretly manages her server during government work time and without the knowledge of his supervisors.

Bryan Pagliano (Credit: LinkedIn)

Bryan Pagliano (Credit: LinkedIn)

During the time Bryan Pagliano works as a political employee in the State Department’s IT [information technology] division starting in May 2009, he continues to secretly manage Clinton’s private email server in her house. The Washington Post will later report, “Three of Pagliano’s supervisors… told investigators they had no idea that Clinton used the basement server or that Pagliano was moonlighting on it.” (The Washington Post, 3/27/2016) However, Pagliano’s two direct supervisors (who apparently are Susan Swart and Charlie Wisecarver) will later tell department investigators that while they were aware Pagliano provided computer assistance to Clinton’s 2008 presidential campaign, they didn’t know he was supporting her server during working hours. They will question how he could do so given that he was supposed to be working full-time for the department. (US Department of State, 5/25/2016An unnamed colleague in Pagliano’s division will later similarly say that Pagliano’s immediate supervisors didn’t know Clinton’s private server even existed until it was revealed in news reports in 2015. In March 2016, the Reuters will report that both Clinton and the State Department continue to decline “to say who, if anyone, in the government was aware of the email arrangement.” (Reuters, 3/24/2016)

October 2, 2009: New regulations require that all government emails must be preserved.

The US Code of federal regulations on handling electronic records is updated: “Agencies that allow employees to send and receive official electronic mail messages using a system not operated by the agency must ensure that Federal records sent or received on such systems are preserved in the appropriate agency recordkeeping system.” (The Washington Post, 3/10/2015)

In 2015, Jason Baron, former director of litigation at the National Archives and Records Administration (NARA), will comment that the rules get stricter in 2013. But even prior to that, “the use of a private [email] account was to be rare and occasional, and not to be the norm.” Using a private account “without using an official account is inconsistent with the Federal Records Act.” He adds, “To solely use a personal e-mail for four years [as Clinton did] is something that is highly unusual.” (Bloomberg News, 3/3/2015)

October 3, 2009: Clinton arranges secure phone calls using her unsecured email.

US Ambassador Karl Eikenberry (Credit: Asia Society)

US Ambassador Karl Eikenberry (Credit: Asia Society)

Clinton writes an email to her deputy chief of staff Huma Abedin telling her to set up a conference call that will use Clinton’s home phone over the weekend. The call will be between Clinton, two assistant secretaries of state, and a US ambassador. Clinton writes, “As soon as I’m off call now. Tell ops to set it up now.” (US Department of State, 6/30/2015)

The Washington Times will later report on this email, “The coordination of secure communications on an insecure break with protocol would give foreign intelligence agencies an opportunity to learn about a call early, then target and intercept the call, US officials told the Times.” Clinton will do this on other occasions, including setting up a call the next day with Karl Eikenberry, US ambassador to Afghanistan. (The Washington Times, 9/1/2015)

Around Mid-2010: A Secret Service agent advises Pagliano to take a step to improve the security of Clinton’s private server, but the step is not taken.

After Bryan Pagliano sets up Clinton’s new private server in January 2009, he sets up Internet Protocol (IP) filtering on the firewall, once a firewall is established in late March 2009. Pagliano will later tell the FBI that he tried to review the firewall log files once a month.

The US Secret Service Badge (Credit: public domain)

The US Secret Service Badge (Credit: public domain)

At some point, Justin Cooper, a Bill Clinton aide who is helping Pagliano manage the server, puts Pagliano in contact with a US Secret Service agent. The timing of this is not clear. However, in a September 2016 Congresssional hearing, Cooper will say it happened after Clinton’s server started to get frequent “brute force” hacking attacks, and that begins around the middle of 2010.

This agent recommends that Pagliano should also perform outbound filtering of email traffic. According to a September 2016 FBI report, “Pagliano further considered, but ultimately did not implement, a Virtual Private Network (VPN) or two-factor authentication to better secure administrative access to the server system by him and Cooper.”

The FBI report will explain: “‘VPN’ is a private network that runs on top of a larger network to provide access to shared network resources, which may or may not include the physical hard drives of individual computers… VPN offers an additional layer of security by encrypting the data traveling to the private network before sending it over the Internet. Data is then decrypted when it reaches the private network. … ‘Two-factor authentication’ is a method of confirming a user’s claimed identity by utilizing a combination of two different components…” (Federal Bureau of Investigation, 9/2/2016) (US Congress, 9/13/2016)