Quote:
Originally Posted by New Era
Well precedent has been set in this regard and nothing happened to those who originally did it, with much more egregious outcomes. Why is it different for this one person rather than others?
A smart decision? That is very subjective. Against the intent of oversight and open government mandates? Then yes, we can agree there.
I'm curious what exactly you know about securing systems and the various mechanisms that account for oversight of technical systems? Can you actually articulate the difference between a secure and a non-secure system? Can you explain what the requirements are for handling data with specific security labels and how they are to be secured and communicated? So far I haven't seen anyone speak to specifics in this regard.
See here's where you are talking crazy. You have no idea what the security posture of this system was. This isn't some suburbanite living in a McMansion. This is someone with round the clock Secret Service protection who lives in protected bubble. Her residence probably has better security than a lot of local or state government facilities. You also have no idea what the security configuration of the server was, nor why it was considered insecure. This particular term (insecure) can range from a number things - minor to major - but have different meanings. For example, the server may have had a common port left open at configuration, say 23, which is a security risk. That system would then be considered insecure. The system could have been plugged into a UPS that was faulty, making it insecure. The details of what made this system insecure, or the email itself insecure (which is another technical discussion where labels come into play), are important in understanding whether there was wrong doing and where the fault resides.
Also, on who was administering those systems, there are plenty of IT firms that have the clearance to work for the government. It is highly unlikely that anyone working with government is not going to use a highly regarded and well known Washington based firm for administering their systems. Also, there are many cloud based service providers that now have the blessing from the federal government for transmission and storage of labeled data. This is the crux of this issue. What was the label of the data at the time of transmission and storage and who had access to it.
There are lots of things that make Clinton a bad choice for President, and this may be another one. Until more details come out, or a charge is leveled, this is just more obfuscation from the noise machine.
|
Why don't you read up on the company that did the backup and management. No, they didn't have security clearance.
Your posts are laughably apologetic.
She ####ed up, I'm not sure why you can't accept that.