December 2014: Clinton’s emails are copied to a different server, but the FBI will never check if that server had any of her work-related emails.

Paul Combetta is the Platte River Networks (PRN) employee doing most of the active managing of Clinton’s private server. In a September 2015 FBI interview, he will claim that a person working for the Clinton family company Clinton Executive Service Corp. (CESC) whose name is later redacted contacts him around December 2014 and tells him that Clinton and her aide Huma Abedin are getting new email accounts on a different server not administered by PRN. Indeed, other sources indicate that in December 2014, Clinton and Abedin get new email accounts on a server with the hrcoffice.com domain name.

As part of this change, Combetta copies Clinton’s email from her hrod17@clintonemail.com email address to her new hrcoffice.com address. Clinton began using the hrod17@clintonemail.com address in late March 2013, shortly after her tenure as secretary of state ended. Combetta will claim that nobody told him “to transfer any archived email to the new server.” (Federal Bureau of Investigation, 9/23/2016)

However, Clinton’s earlier emails could have been transferred to her new email address around the time it was created in late March 2013, in which case they too would get copied to the hrcoffice.com server. But the FBI will never search this server to see if any of Clinton’s emails from her tenure as secretary of state can be recovered from it.

November 2014: The Romanian hacker “Guccifer,” who broke into the email account of Clinton associate Sid Blumenthal in 2013, appears to be freely cooperating with US investigators.

Guccifer, whose real name is Marcel-Lehel Lazar, started serving a seven-year prison sentence in Romania earlier in 2014 due to his hacking activities. A New York Times reporter who interviews him there in November 2014 writes, I learned [he was] also busy meeting with American investigators who had traveled to Romania to meet the man who had outfoxed them for so long. They, too, wanted to find out how he burrowed into so many American computers.” (The New York Times, 11/21/2014)