Posts

“Glitch!” FBI’s Three Leaked Claims about the Delay in Obtaining a Warrant for Huma’s Email

The other day, the WSJ had a story that included this detail about the gap between the time FBI realized there were Huma Abedin emails on a computer seized in the Anthony Weiner investigation and when they got a warrant to read them.

The FBI had searched the computer while looking for child pornography, people familiar with the matter said, but the warrant they used didn’t give them authority to search for matters related to Mrs. Clinton’s email arrangement at the State Department. Mr. Weiner has denied sending explicit or indecent messages to the minor.

In their initial review of the laptop, the metadata showed many messages, apparently in the thousands, that were either sent to or from the private email server at Mrs. Clinton’s home that had been the focus of so much investigative effort for the FBI. Senior FBI officials decided to let the Weiner investigators proceed with a closer examination of the metadata on the computer, and report back to them.

At a meeting early last week of senior Justice Department and FBI officials, a member of the department’s senior national-security staff asked for an update on the Weiner laptop, the people familiar with the matter said. At that point, officials realized that no one had acted to obtain a warrant, these people said. [my emphasis]

While I and actual experts on Fourth Amendment law had already started asking about the legality of finding emails implicating Huma while searching a computer seized for an investigation into underage sexting, the revelation that FBI somehow forgot to get a warrant for two to three weeks raised even bigger questions.

In the last day, both the NYT and the WaPo have provided different explanations about it (though they use it to explain the time lapse between discovering the emails and informing Congress, not getting a warrant). The NYT reported that the FBI had to write custom software to be able to read Weiner’s emails without at the same time reading Huma’s.

The F.B.I. has not explained why three weeks passed between the time the bureau obtained the laptop and when Mr. Comey told Congress about it. After an F.B.I. computer analysis response team in New York copied the laptop’s hard drive, bureau employees began examining the information on the computer.

That is when agents realized that Ms. Abedin’s emails were on the laptop, but they did not have the authority to view them without a warrant.

The F.B.I. needed custom software to allow them to read Mr. Weiner’s emails without viewing hers. But building that program took two weeks, causing the delay. The program ultimately showed that there were thousands of Ms. Abedin’s emails on the laptop.

Mr. Comey was not briefed in full on a plan to read the emails until last Thursday, Oct. 27. He informed Congress the next day. F.B.I. lawyers then had to obtain a second warrant to look at Ms. Abedin’s emails, which happened last weekend. [my emphasis]

WaPo reported that “glitches” delayed the FBI in separating Weiner’s emails from Huma’s.

Although investigators had discovered the emails in early October, software glitches prevented them from separating Abedin-related emails from the hundreds of thousands of messages recovered until Oct. 19 or 20, according to people familiar with the case.

While Comey had been quickly alerted by his deputy to the original find, he took no further action, allowing agents in the field to get a better idea of the scope of the material. Agents could use digital clues to decipher where emails had originated and been sent but were legally barred from reading the emails without a search warrant because they had been obtained in a separate investigation.

When agents formally recommended on Oct. 27 that the warrant be sought, Comey agreed and then felt obligated to inform Congress — which he did with his letter the following day. Comey’s only reference in the letter to the timing of his involvement was that he had been briefed the previous day. [my emphasis]

Note NYT says Comey was not briefing on the plan to read the emails until October 27. WaPo says that he was in the loop before then, then consulted again on obtaining a warrant on October 27. Those aren’t necessarily conflicting stories — I guess it depends on what “a plan to read the emails” means — but I find the distinction curious.

The real batshit thing, though, is the claim that the nation’s premiere law enforcement agency didn’t have a way to sift out Weiner’s emails from Huma’s, something even garden variety cops have to do every day. Equally batshit is the claim they created a new piece of software to do so. Glitches? That’s a word national security people use as a cover story.

There is no good explanation for why the FBI didn’t have the technical means to do this. There is even less of an explanation for why, in a case involving such high profile people, the FBI would be struggling with “glitches.”

Which leaves us where we were with WSJ’s story: The FBI was fiddling with these emails for 3 weeks before “officials realized that no one had acted to obtain a warrant.” And yet somehow, the FBI was able to show probable cause that these emails had some tie to a crime.

I do hope this is something Patrick Leahy insists on getting answers on, because the story stinks.

Anthony Weiner Creates a Virgin Birth for Evidence the Clinton Foundation Investigators Want

WSJ’s Devlin Barrett has a long story he describes as laying bare “tensions that have built for months inside the bureau and the Justice Department over how to investigate someone who could soon be elected president.” It might just as well be described as a catalogue of the ways FBI has gotten out of control.

To show the important background to the decision to get a warrant to access Huma Abedin’s email, I’m going to switch the order of the story from that Barrett uses. Looked at in this way, it becomes clear that by accessing Huma’s email, the FBI may not just have renewed the probably fruitless investigation into Hillary’s email server, but also found a way to access Huma’s emails for use in an investigation of the Clinton Foundation.

FBI ignores Public Integrity orders not to escalate the investigation of the Clinton Foundation

After laying out the recent decision to access Huma Abedin’s email (which I deal with below), Barrett confirms what Comey made obvious with a “neither confirm nor deny” response at his July testimony before the House Oversight Committee (though a flood of leaks had long claimed such an investigation existed).

The FBI has been investigating the Clinton Foundation for over a year.

As Barrett describes it, the case arose because Agents were seeing if a crime was committed, not because they had found evidence that it had:

Early this year, four FBI field offices—New York, Los Angeles, Washington and Little Rock, Ark.—were collecting information about the Clinton Foundation to see if there was evidence of financial crimes or influence-peddling, according to people familiar with the matter.

He describes that in February, when Andrew McCabe got promoted to Deputy Director, he took over oversight of this investigation. (In an earlier article Barrett insinuated that an earlier Terry McAuliffe donation to McCabe’s wife’s state senate campaign presented a conflict, but in this article Barrett provides McAuliffe’s explanation for the donation.) Also in February — Barrett doesn’t say whether McCabe was involved — investigative teams located in Los Angeles, DC, Little Rock, and New York (he doesn’t say whether they were in EDNY or SDNY or both, which is relevant to a later development in the story) presented their case to DOJ’s Public Integrity (PIN) section.

Here’s how Barrett describes that meeting:

Some said that is because the FBI didn’t present compelling evidence to justify more aggressive pursuit of the Clinton Foundation, and that the career anticorruption prosecutors in the room simply believed it wasn’t a very strong case. Others said that from the start, the Justice Department officials were stern, icy and dismissive of the case.

“That was one of the weirdest meetings I’ve ever been to,” one participant told others afterward, according to people familiar with the matter.

Anticorruption prosecutors at the Justice Department told the FBI at the meeting they wouldn’t authorize more aggressive investigative techniques, such as subpoenas, formal witness interviews, or grand-jury activity. But the FBI officials believed they were well within their authority to pursue the leads and methods already under way, these people said.

Mind you, seven paragraphs before describing PIN telling the FBI it would not authorize subpoenas, Barrett described the Los Angeles team having “issued some subpoenas for bank records related to the foundation.” So when he says FBI officials believed they could pursue leads and methods already under way, it may mean they decided they could use the fruit of subpoenas PIN subsequently judged weren’t merited by the evidence.

In July, after DOJ decided not to prosecute anyone on the email server and Comey started blabbing (including his non-denial of the existence of this investigation), FBI “sought to refocus the Clinton Foundation probe,” which sounds a lot like redoubling efforts to find something to investigate Hillary for. (Note, this entire article makes no mention of the June Supreme Court decision throwing out much of former VA governor Bob McDonnell’s conviction, which would have significantly raised the bar for any prosecution of the Clinton Foundation.) McCabe bracketed the DC work focusing on Terry McAuliffe, from which he was recused, and put NY in charge of the rest.

Barrett spends a paragraph airing both sides of a dispute about whether that was the right decision, then describes a (male, and therefore someone besides Loretta Lynch or Sally Yates) senior DOJ official bitching out McCabe for continuing to pursue the Clinton Foundation investigation, especially during the election.

According to a person familiar with the probes, on Aug. 12, a senior Justice Department official called Mr. McCabe to voice his displeasure at finding that New York FBI agents were still openly pursuing the Clinton Foundation probe during the election season. Mr. McCabe said agents still had the authority to pursue the issue as long as they didn’t use overt methods requiring Justice Department approvals.

The Justice Department official was “very pissed off,” according to one person close to Mr. McCabe, and pressed him to explain why the FBI was still chasing a matter the department considered dormant.

Barrett spends several paragraphs airing both sides of what happened next, whether FBI agents were ordered to stand down entirely or whether McCabe said they could continue to investigate within the existing guidelines.

FBI attempts to venue shop to get at Clinton server emails

Even after that order, the Clinton Foundation investigators tried to get more — specifically, all the emails turned over in the email server investigation. When EDNY (as a reminder, that’s where Loretta Lynch was until last year US Attorney) refused, the investigators asked to go get them in SDNY.

In September, agents on the foundation case asked to see the emails contained on nongovernment laptops that had been searched as part of the Clinton email case, but that request was rejected by prosecutors at the Eastern District of New York, in Brooklyn. Those emails were given to the FBI based on grants of partial immunity and limited-use agreements, meaning agents could only use them for the purpose of investigating possible mishandling of classified information.

Some FBI agents were dissatisfied with that answer, and asked for permission to make a similar request to federal prosecutors in Manhattan, according to people familiar with the matter. Mr. McCabe, these people said, told them no and added that they couldn’t “go prosecutor-shopping.”

Several comments on this: First, McCabe did the right thing here in refusing to let his agents venue shop until they got their way. I hope he would do the same in a less visible investigation where senior DOJ officials were chewing him out for conducting the investigation in the first place.

Second, consider how the timing of this coincides with both leaks about the immunity agreements, Jason Chaffetz’ inquiry into the same, and two sets of email server related materials. As one key example, on October 5, just weeks after McCabe told his Agents they couldn’t go “prosecutor-shopping” to get to the emails released in the email server probe, Republicans were releasing details of their in camera review of the terms of the immunity agreements used to deny the Clinton Foundation investigations access to the emails. We should assume that some entities within the FBI are using all angles, using Chaffetz’ investigations to publicize decisions that have thwarted their investigation.

Did FBI Agents review the content of Huma Abedin’s email without a warrant?

So sometime in September, the Clinton foundation team was told they couldn’t have emails associated with the server investigation that were tied to immunity agreements. On October 3 (per the NYT), FBI agents seized a number of devices, including a laptop used jointly by Anthony Weiner and Huma Abedin with a warrant permitting just the investigation of Weiner’s alleged sexting of an underaged woman (curiously, Barrett says they were permitted to look for child porn). Shortly thereafter, they found found emails from accounts, plural, of Huma Abedin on the laptop. Multiple reports suggest those emails may be duplicative of the ones that FBI had just been told they couldn’t access because of the immunity agreements tied to other devices.

There’s no reason to believe FBI found those potentially duplicative emails because they were prohibited from accessing the ones turned over voluntarily as part of the email server probe (in any case, they are presented as different investigative teams, although the description of this sprawling Clinton Foundation investigation may explain why earlier leaks said 147 people were part of the Clinton investigation); it’s just one of those coinkydinks that seem to plague the Clintons.

At that point, per Barrett, “Senior FBI officials decided to let the Weiner investigators proceed with a closer examination of the metadata on the computer, and report back to them.” Early last week (so two or three weeks later), some asked how that weeks-long review of the Huma emails (allegedly just the metadata) was going.

“At that point, officials realized that no one had acted to obtain a warrant, these people said.”

In other words, for several weeks, FBI has been nosing around those emails without court authorization to do so in conjunction with the email server investigation (which may or may not have been formally closed). If they really stuck to metadata, that’s no big deal under Third Party rules. If they did peek — even at subject lines — then that may be a bigger problem.

Only then did the Weiner investigators compare notes with the Hillary investigators and decide the emails were relevant. Barrett doesn’t answer the obvious question: how did the Weiner investigators determine these emails might be relevant and did they really just review only metadata? Given all the stories to FBI friendly sources claiming Comey — and implying no one — has seen the content of the email, I suspect the answer is Weiner investigators went beyond metadata.

The background Barrett provides gives more significance to FBI’s decision to (perhaps belatedly) obtain a warrant to get Huma’s email and to Comey’s highly inappropriate magnification of it. Not only have they reopened (or renewed — reports on this are still all over the map on this point) the email investigation, but they’ve also created a virgin birth for emails that the Clinton foundation investigators tried — and were willing to venue shop — but failed to get.

FBI leaking has neutralized DOJ’s control over the Bureau

This story shows that FBI has tried a number of methods to defy PIN advice to drop the investigation into the Clinton Foundation.

I don’t know whether the investigation into the Clinton Foundation has merit or not (though given Barrett’s explanation, it does seem that some in FBI were looking for a crime rather than looking to solve one).

But I do know that if FBI agents operate outside of bounds on their power, they constitute a grave threat to the rule of law.

And Barrett’s article suggests at least three ways they appear to have done just that:

  • Fiddling with investigative guidelines of the DIOG (by using subpoenas without the appropriate level of investigation and authority)
  • Attempting to venue shop to get permission to access evidence they were told they couldn’t have
  • Leaking promiscuously, in clear violation of the rules, to bring political pressure including on Comey to conduct an investigation their supervisors had told them to either limit or halt

That promiscuous leaking, of course, includes this article, which relied on a great number of sources, almost none of whom should be speaking about this investigation. Don’t get me wrong — it’s great reporting on Barrett’s part. But it also serves the purpose of airing the claim that McCabe, PIN, and DOJ generally have thwarted an investigation into the Clinton Foundation that some at FBI believe has merit.

In addition, I’ve got questions about whether they read Huma’s email when they were supposed to just be looking at metadata.

Whatever else Comey’s totally inappropriate behavior reflects, his justification for doing so because it otherwise might leak suggests he doesn’t have control over his agency. Though given his coy response to Chaffetz in July, I do wonder whether he isn’t rooting for the Clinton foundation investigation to proceed; whatever else he is, Comey is a master of using the press to win political fights.

And remember, the FBI (under Comey) has undermined one of the few irreproachable entities that might fix this sorry state of affairs. It has refused, now backed by an OLC opinion, to give DOJ’s Inspector General the unfettered right to investigate things like grand jury proceedings (though given that no grand jury was used in these cases, it might be harder to keep them out here). So if Patrick Leahy were to ask Michael Horowitz to investigate whether FBI acted inappropriately in these related investigations — and he should! — FBI might be able to withhold information from the IG.

A bunch of people who have unquestioned faith in the goodness of DOJ — now including Eric Holder, the guy who couldn’t prosecute a single criminal bank — have been, rightly, scolding Comey for his actions. But they have largely remained utterly silent about the runaway agents at the FBI, both about their obvious leaking and now about their efforts to sustain this investigation in defiance of at least some of the chain of command, including career prosecutors who should be fairly insulated from any political influence that someone like Lynch might respond to.

As I said, I’m agnostic about the investigation of the Clinton Foundation. I’m not agnostic on the importance of keeping FBI firmly within the bureaucratic bounds that prevents them from acting as an abusive force.

They seem to have surpassed those bounds.

The Story About Judicial Dysfunction Behind the Comey Whiplash

I’ve been home from Europe for less than a day and already I’m thinking of sporting a neck collar for the whiplash I’ve gotten watching the wildly varying Jim Comey opinions.

I’m speaking, of course, of the response to Jim Comey’s highly unusual announcement to sixteen Chairs and Ranking Members of congressional committees (at least some of which Comey did not testify to) that the investigative team — presumably on the Clinton case — briefed him Thursday that FBI discovered additional emails in an unrelated case — now known to be the investigation into Anthony Weiner allegedly sexting a 15 year old — and he approved their request to take the steps necessary to be able to review those emails.

Effectively, the Weiner investigators, in reviewing the content from devices seized in that investigation, found emails from Huma Abedin, told the Hillary investigative team, and they’re now obtaining a warrant to be able to review those emails.

So of course the Republicans that had been claiming Comey had corruptly fixed the investigation for Hillary immediately started proclaiming his valor and Democrats that had been pointing confidently to his exoneration of Hillary immediately resumed their criticism of his highly unusual statements on this investigation. Make up your minds, people!

For the record, I think his initial, completely inappropriate statements made this inevitable. He excuses Friday’s statement as formally correcting the record of his testimony. The claim is undermined by the fact that not all recipients of the letter had him testify. But I think once you start the process of blabbing about investigations, more blabbing likely follows. I don’t mean to excuse this disclosure, but the real sin comes in the first one, which was totally inappropriate by any measure. I’m also very unsympathetic with the claim —  persistently offered by people who otherwise cheer Comey — that he released his initial statement to help Loretta Lynch out of the jam created by her inappropriate meeting with Bill Clinton; I think those explanations stem from a willful blindness about what a self-righteous moralist Comey is.

Of course I’ve been critical of Comey since long before it was cool (and our late great commenter Mary Perdue was critical years before that).

But I’d like to take a step back and talk about what this says about our judicial system.

Jim Comey doesn’t play by the rules

Jamie Gorelick (who worked with Comey when she was in DOJ) and Larry Thompson (who worked with Comey when Comey was US Attorney and he was Deputy Attorney General, until Comey replaced him) wrote a scathing piece attacking Comey for violating the long-standing prohibition on doing anything in an investigation pertaining to a political candidate in the 60 days leading up to an election. The op-ed insinuates that Comey is a “self-aggrandizing crusader[] on [a] high horse” before it goes on to slam him for making himself the judge on both the case and Hillary’s actions.

James B. Comey, put himself enthusiastically forward as the arbiter of not only whether to prosecute a criminal case — which is not the job of the FBI — but also best practices in the handling of email and other matters. Now, he has chosen personally to restrike the balance between transparency and fairness, departing from the department’s traditions. As former deputy attorney general George Terwilliger aptly put it, “There’s a difference between being independent and flying solo.”

But the real meat is that there’s a rule against statements like the one Comey made, and Comey broke it.

Decades ago, the department decided that in the 60-day period before an election, the balance should be struck against even returning indictments involving individuals running for office, as well as against the disclosure of any investigative steps. The reasoning was that, however important it might be for Justice to do its job, and however important it might be for the public to know what Justice knows, because such allegations could not be adjudicated, such actions or disclosures risked undermining the political process. A memorandum reflecting this choice has been issued every four years by multiple attorneys general for a very long time, including in 2016.

If Comey is willing to break this rule in such a high profile case, then what other rules is he breaking? What other judgements has Comey made himself arbiter of? Particularly given Comey’s persistent discussion of FBI’s work in terms of “good guys” and “bad guys” — as opposed to criminal behavior — that seems a really pertinent question.

As with James Clapper, Loretta Lynch can’t control Comey

Gorelick (who has been suggested among potential Clinton appointees) and Thompson go easier on Lynch, however, noting that she didn’t order him to stand down here, but ultimately blaming Comey for needing to be ordered.

Attorney General Loretta E. Lynch — nominally Comey’s boss — has apparently been satisfied with advising Comey but not ordering him to abide by the rules. She, no doubt, did not want to override the FBI director in such a highly political matter, but she should not have needed to. He should have abided by the policy on his own.

But since John Cornyn confronted Lynch in March about who would make decisions in this case — “Everyone in the Department of Justice works for me, including the FBI, sir,” Lynch forcefully reminded Cornyn — it has been clear that there’s a lot more tension than the org chart would suggest there should be.

The NYT provides more details on how much tension there is.

The day before the F.B.I. director, James B. Comey, sent a letter to Congress announcing that new evidence had been discovered that might be related to the completed Hillary Clinton email investigation, the Justice Department strongly discouraged the step and told him that he would be breaking with longstanding policy, three law enforcement officials said on Saturday.

Senior Justice Department officials did not move to stop him from sending the letter, officials said, but they did everything short of it, pointing to policies against talking about current criminal investigations or being seen as meddling in elections.

And it’s not just Lynch that has problems managing FBI.

In a response to a question from me in 2014 (after 56:00), Bob Litt explained that FBI’s dual role creates “a whole lot of complications” and went on to admit that the office of Director of National Intelligence — which is supposed to oversee the intelligence community — doesn’t oversee the FBI as directly.

Because FBI is part of the Department of Justice, I don’t have the same visibility into oversight there than I do with respect to the NSA, but the problems are much more complicated because of the dual functions of the FBI.

Litt said something similar to me in May when we discussed why FBI can continue to present bogus numbers in its legally mandated NSL reporting.

Now these are separate issues (though the Clinton investigation is, after all, a national security investigation into whether she or her aides mishandled classified information). But if neither the DNI nor the AG really has control over the FBI Director, it creates a real void of accountability that has repercussions for a whole lot of issues and, more importantly, people who don’t have the visibility or power of Hillary Clinton.

The FBI breaks the rules all the time by leaking like a sieve

Underlying this entire controversy is another rule that DOJ and FBI claim to abide by but don’t, at all: FBI is not supposed to reveal details of ongoing investigations.

Indeed, according to the NYT, Comey pointed to the certainty that this would leak to justify his Friday letter.

But although Mr. Comey told Congress this summer that the Clinton investigation was complete, he believed that if word of the new emails leaked out — and it was sure to leak out, he concluded — he risked being accused of misleading Congress and the public ahead of an election, colleagues said.

Yet the US Attorney’s Manual, starting with this language on prejudicial information and continuing into several more clauses, makes it clear that these kinds of leaks are impermissible.

At no time shall any component or personnel of the Department of Justice furnish any statement or information that he or she knows or reasonably should know will have a substantial likelihood of materially prejudicing an adjudicative proceeding.

Comey, the boss of all the FBI Agents investigating this case, had another alternative, one he should have exercised months ago when it was clear those investigating this case were leaking promiscuously: demand that they shut up, conduct investigations of who was leaking, and discipline those who were doing so. Those leaks were already affecting election year concerns, but there has been little commentary about how they, too, break DOJ rules.

But instead of trying to get FBI Agents to follow DOJ guidelines, Comey instead decided to violate them himself.

Again, that’s absolutely toxic when discussing an investigation that might affect the presidential election, but FBI’s habitual blabbing is equally toxic for a bunch of less powerful people whose investigative details get leaked by the FBI all the time.

[Update: Jeffrey Toobin addresses the role of leaks more generally here, though he seems to forget that the Hillary investigation is technically a national security investigation. I think it’s important to remember that, especially given Hillary’s campaign focus on why FBI isn’t leaking about the investigation into Trump’s ties to Russia, which would also be a national security investigation.]

Warrantless back door searches do tremendous amounts of damage

Finally, think about the circumstances of the emails behind this latest disclosure.

Reports are currently unclear how much the FBI knows about these emails. The NYT describes that the FBI seized multiple devices in conjunction with the Weiner investigation, including the laptop on which they found these emails.

On Oct. 3, F.B.I. agents seized several electronic devices from Mr. Weiner: a laptop, his iPhone and an iPad that was in large measure used by his 4-year-old son to watch cartoons, a person with knowledge of the matter said. Days later, F.B.I. agents also confiscated a Wi-Fi router that could identify any other devices that had been used, the person said.

While searching the laptop, the agents discovered the existence of tens of thousands of emails, some of them sent between Ms. Abedin and other Clinton aides, according to senior law enforcement officials. It is not clear if Ms. Abedin downloaded the emails to the laptop or if they were automatically backed up there. The emails dated back years, the officials said. Ms. Abedin has testified that she did not routinely delete her emails.

Presumably, the warrant to seize those devices permits the FBI agents to go find any evidence of Weiner sexting women (or perhaps just the young woman in question).

And admittedly, the details NYT’s sources describe involve just metadata: addressing information and dates.

But then, Comey told Congress these emails were “pertinent” to the Clinton investigation, and other details in reports, such as they might be duplicates of emails already reviewed by the FBI, suggest the Weiner investigators may have seen enough to believe they might pertain to the inquiry into whether Clinton and her aides (including Huma) mishandled classified information. Moreover, the FBI at least thinks they will be able to prove there is probable cause to believe these emails may show the mishandling of classified information.

Similarly, there are conflicting stories about whether the Hillary investigation was ever closed, which may arise from the fact that if it were (as Comey had suggested in his first blabby statements), seeking these emails would require further approval to continue the investigation.

The point, though, is that FBI would have had no idea these emails existed were it not for FBI investigators who were aware of the other investigation alerting their colleagues to these emails. This has been an issue of intense litigation in recent years, and I’d love for Huma, after the election, to submit a serious legal challenge if any warrant is issued.

But then, in this case, Huma is being provided far more protection than people swept up in FISA searches, where any content with a target can be searched years into the future without any probable cause or even evidence of wrong-doing. Here, Huma’s emails won’t be accessible for investigative purpose without a warrant (in part because of recent prior litigation in the 2nd Circuit), whereas in the case of emails acquired via FISA, FBI can access the information — pulling it up not just by metadata but by content — with no warrant at all.

[Update: Orin Kerr shares my concerns on this point — with the added benefit that he discusses all the recent legal precedents that may prohibit accessing these emails.]

This is a good example of the cost of such investigations. Because the FBI can and does sweep so widely in searches of electronic communications, evidence from one set of data collection can be used to taint others unrelated to the crime under investigation.

All the people writing scathing emails about Comey’s behavior in this particular matter would like you to believe that this issue doesn’t reflect on larger issues at DOJ. They would like you to believe that DOJ was all pure and good and FBI was well-controlled except for this particular investigation. But that’s simply not the case, and some of these issues go well beyond Comey.

Update: Minor changes were made to this post after it was initially posted.

Hillary Clinton’s Three Devices

I really don’t want to get bogged down in the Hillary email story. But given the ongoing discussions about whether claims she used the personal server to avoid oversight have merit, I did two more things. First, I did this timeline. Without going into too much detail, there are decisions made after requests for emails that suggest avoiding oversight was driving some of this. That’s especially true given the conflicting stories from Paul Combetta pertaining to his actions in late 2014 and March 2015; he ended up deleting Hillary’s emails after being informed of the House Oversight request for them. He may have only revealed that with an immunity deal.

The other detail I want to focus on is the number of devices Hillary had. Hillary defenders often point to her claim that she used the Blackberry for convenience to claim she surely wasn’t avoiding oversight. But I think the FBI report shows that she had three devices, not just one.

Most of the attention on the number of her devices focuses on the fact that she had 13 serial BBs, none of which were handed over to the FBI (instead of her actual BBs,, Williams & Connolly turned over two other BBs, though without SIM or SD cards).

It is true that her 13 BBs were used serially, not at once, which makes Hillary Clinton just like Tom Brady in her serial use of phones: she’s just a famous person who likes to swap out her phones all the time. The difference being that Tom Brady was told he didn’t need to keep his phone, whereas Hillary was under record-keeping obligations even before any investigation started. And Brady at least had had his comms reviewed by lawyers before he deleted his phone.

But it’s not the 13 BB detail that poses problems to Hillary’s single device claim. It’s this passage.

screen-shot-2016-09-08-at-5-14-21-am

Justin Cooper, the Bill Clinton staffer who ran much of the tech in the Chappaqua basement, says that Hillary used both a Blackberry and a flip phone for calls. Huma Abedin and Cheryl Mills dispute that, though in terms that leave some wiggle room (curiously, FBI apparently didn’t ask Monica Hanley, who bought all of Hillary’s Blackberries). There were 2 phone numbers Hillary used, the latter of which only became the Blackberry number after her tenure as SoS. But footnote 8 reveals that there were 4 mobile devices that used what appears to be the second number during her tenure as SoS. This seems to indicate that Cooper is right: Hillary had both an email phone and a series of 4 telephony phones, the latter of which were not email capable.

The footnote makes clear FBI didn’t pursue these telephony phones because they were, by definition, outside the scope of an email leak investigation (which is one of the many reasons one needs to come to this report with an understanding of the narrow scope of the investigation). But any use of flip phones would not be outside the scope of an FRA investigation, because they undermine Hillary’s claim that she adopted the BBs for singe-device convenience.

Then there’s the passage on page 9 that shows there were also 5 iPads that were potentially used for emails, 3 of which were turned over to the FBI (indeed, one of them actually had draft emails from 2012). This suggests that at least during 2012, Hillary had still another device: 3 devices, not 1. She may not have used the iPads for email throughout her tenure, but she did, apparently, use them in some sense.

Finally, there are two more mysterious devices that aren’t accounted for: a personally-owned computer in both of Hillary’s 2 household SCIFs. Amid the discussion of those SCIFs (including the detail that both were not secure at times, which undermines claims that her only SCIF violation was bringing her BB just inside the State SCIF) is this detail.

According to Abedin, Cooper, and [redacted] there were personally-owned desktop computers in the SCIFs in Whitehaven and Chappaqua. Conversely, Clinton stated to the FBI she did not have a computer of any kind of the SCIFs in her residences. According to Abedin and Clinton, she did not use a computer, and she primarily used her BlackBerry or iPad for checking e-mails.

There is admittedly another conflict in the testimony here, between every aide asked and Hillary, but given that even Abedin and Hillary’s [redacted] staffer say there were personally-owned computers in the SCIFs, I tend to believe it.

But Abedin says Hillary didn’t use them, and I sort of believe that too. But that raises questions about 1) why personally-owned computers were in the SCIF in the first place, which is surely also a violation of SCIF rules, especially if Hillary didn’t use them, but also 2) who was using them. The passage also makes it clear Hillary’s aides had access to the SCIF so perhaps they were?

In any case, we can’t be certain given the redactions and conflicting testimony, but according to my count, Hillary probably had three parallel devices during her tenure as Secretary of State: her BB, a flip phone, and an iPad (the latter of which may or may not have been regularly used for comms, though it was at least briefly in 2012), as well as two SCIF desktops that she personally didn’t use.

Some Legislative Responses to Clinton’s Email Scandal

The Republicans have reverted to their natural “Benghazi witchhunt” form in the wake of Jim Comey’s announcement Tuesday that Hillary Clinton and her aides should not be charged, with Comey scheduled to testify before the House Oversight Committee at 10 AM.

Paul Ryan wrote a letter asking James Clapper to withhold classified briefings from Hillary. And the House Intelligence Committee is even considering a bill to prevent people who have mishandled classified information from getting clearances.

In light of the FBI’s findings, a congressional staffer told The Daily Beast that the House Intelligence Committee is considering legislation that could block security clearances for people who have been found to have mishandled classified information in the past.

It’s not clear how many of Clinton’s aides still have their government security clearances, but such a measure could make it more difficult for them to be renewed, should they come back to serve in a Clinton administration.

“The idea would be to make sure that these rules apply to a very wide range of people in the executive branch,” the staffer said. (Clinton herself would not need a clearance were she to become president.)

It’s nice to see the same Republicans who didn’t make a peep when David Petraeus kept — and still has — his clearance for doing worse than Hillary has finally getting religion on security clearances.

But this circus isn’t really going to make us better governed or safer.

So here are some fixes Congress should consider:

Add some teeth to the Federal/Presidential Records Acts

As I noted on Pacifica, Hillary’s real crime was trying to retain maximal control over her records as Secretary of State — probably best understood as an understandable effort to withhold anything potentially personal combined with a disinterest in full transparency. That effort backfired spectacularly, though, because as a result all of her emails have been released.

Still, every single Administration has had at least a minor email scandal going back to Poppy Bush destroying PROFS notes pertaining to Iran-Contra.

And yet none of those email scandals has ever amounted to anything, and many of them have led to the loss of records that would otherwise be subject to archiving and (for agency employees) FOIA.

So let’s add some teeth to these laws — and lets mandate and fund more rational archiving of covered records. And while we’re at it, let’s ensure that encrypted smart phone apps, like Signal, which diplomats in the field should be using to solve some of the communication problems identified in this Clinton scandal, will actually get archived.

Fix the Espionage Act (and the Computer Fraud and Abuse Act)

Steve Vladeck makes the case for this:

Congress has only amended the Espionage Act in detail on a handful of occasions and not significantly since 1950. All the while, critics have emerged from all corners—the academy, the courts, and within the government—urging Congress to clarify the myriad questions raised by the statute’s vague and overlapping terms, or to simply scrap it and start over. As the CIA’s general counsel told Congress in 1979, the uncertainty surrounding the Espionage Act presented “the worst of both worlds”:

On the one hand the laws stand idle and are not enforced at least in part because their meaning is so obscure, and on the other hand it is likely that the very obscurity of these laws serves to deter perfectly legitimate expression and debate by persons who must be as unsure of their liabilities as I am unsure of their obligations.

In other words, the Espionage Act is at once too broad and not broad enough—and gives the government too much and too little discretion in cases in which individuals mishandle national security secrets, maliciously or otherwise.

To underscore this point, the provision that the government has used to go after those who shared classified information with individuals not entitled to receive it (including Petraeus, Drake, and Manning), codified at 18 U.S.C. § 793(d), makes it a crime if:

Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted … to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it …

This provision is stunningly broad, and it’s easy to see how, at least as a matter of statutory interpretation, it covers leaking—when government employees (“lawfully having possession” of classified information) share that information with “any person not entitled to receive it.” But note how this doesn’t easily apply to Clinton’s case, as her communications, however unsecured, were generally with staffers who were“entitled to receive” classified information.

Instead, the provision folks have pointed to in her case is the even more strangely worded § 793(f), which makes it a crime for:

Whoever, being entrusted with or having lawful possession or control of [any of the items mentioned in § 793(d)], (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed … fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer …

Obviously, it’s easy to equate Clinton’s “extreme carelessness” with the statute’s “gross negligence.” But look closer: Did Clinton’s carelessness, however extreme, “[permit] … [classified information] to be removed from its proper place of custody or delivered to anyone in violation of [her] trust”? What does that even mean in the context of intangible information discussed over email? The short answer is nobody knows: This provision has virtually never been used at least partly because no one is really sure what it prohibits. It certainly appears to be focused on government employees who dispossess the government of classified material (like a courier who leaves a satchel full of secret documents in a public place). But how much further does it go?

There’s an easy answer here, and it’s to not use Clinton as a test case for an unprecedented prosecution pursuant to an underutilized criminal provision, even if some of us think what she did was a greater sin than the conduct of some who have been charged under the statute. The better way forward is for Congress to do something it’s refused to do for more than 60 years: carefully and comprehensively modernize the Espionage Act, and clarify exactly when it is, and is not, a crime to mishandle classified national security secrets.

Sadly, if Congress were to legislate the Espionage Act now, they might codify the attacks on whistleblowers. But they should not. They should distinguish between selling information to our adversaries and making information public. They should also make it clear that intent matters — because in the key circuit, covering the CIA, the Pentagon, and many contractors, intent hasn’t mattered since the John Kiriakou case.

Eliminate the arbitrariness of the clearance system

But part of that should also involve eliminating the arbitrary nature of the classification system.

I’ve often pointed to how, in the Jeffrey Sterling case, the only evidence he would mishandle classified information was his retention of 30-year old instructions on how to dial a rotary phone, something far less dangerous than what Hillary did.

Equally outrageous, though, is that four of the witnesses who may have testified against Sterling, probably including Bob S who was the key witness, have also mishandled classified information in the past. Those people not only didn’t get prosecuted, but they were permitted to serve as witnesses against Sterling without their own indiscretions being submitted as evidence. As far as we know, none lost their security clearance. Similarly, David Petraeus hasn’t lost his security clearance. But Ashkan Soltani was denied one and therefore can’t work at the White House countering cyberattacks.

Look, the classification system is broken, both because information is over-classified and because maintaining the boundaries between classified and unclassified is too unwieldy. That broken system is then magnified as people’s access to high-paying jobs are subjected to arbitrary review of security clearances. That’s only getting worse as the Intelligence Community ratchets up the Insider Threat program (rather than, say, technical means) to forestall another Manning or Snowden.

The IC has made some progress in recent years in shrinking the universe of people who have security clearances, and the IC is even making moves toward fixing classification. But the clearance system needs to be more transparent to those within it and more just.

Limit the President’s arbitrary authority over classification

Finally, Congress should try to put bounds to the currently arbitrary and unlimited authority Presidents claim over classified information.

As a reminder, the Executive Branch routinely cites the Navy v. Egan precedent to claim unlimited authority over the classified system. They did so when someone (it’s still unclear whether it was Bush or Cheney) authorized Scooter Libby to leak classified information — probably including Valerie Plame’s identity — to Judy Miller. And they did so when telling Vaughn Walker could not require the government to give al Haramain’s lawyers clearance to review the illegal wiretap log they had already seen before handing it over to the court.

And these claims affect Congress’ ability to do their job. The White House used CIA as cover to withhold a great deal of documents implicating the Bush White House in authorizing torture. Then, the White House backed CIA’s efforts to hide unclassified information, like the already-published identities of its torture-approving lawyers, with the release of the Torture Report summary. In his very last congressional speech, Carl Levin complained that he was never able to declassify a document on the Iraq War claims that Mohammed Atta met with a top Iraqi intelligence official in Prague.

This issue will resurface when Hillary, who I presume will still win this election, nominates some of the people involved in this scandal to serve in her White House. While she can nominate implicated aides — Jake Sullivan, Huma Abedin, and Cheryl Mills — for White House positions that require no confirmation (which is what Obama did with John Brennan, who was at that point still tainted by his role in torture), as soon as she names Sullivan to be National Security Advisor, as expected, Congress will complain that he should not have clearance.

She can do so — George Bush did the equivalent (remember he appointed John Poindexter, whose prosecution in relation to the Iran-Contra scandal was overturned on a technicality, to run the Total Information Awareness program).

There’s a very good question whether she should be permitted to do so. Even ignoring the question of whether Sullivan would appropriately treat classified information, it sets a horrible example for clearance holders who would lose their clearances.

But as far as things stand, she could. And that’s a problem.

To be fair, legislating on this issue is dicey, precisely because it will set off a constitutional challenge. But it should happen, if only because the Executive’s claims about Navy v. Egan go beyond what SCOTUS actually said.

Mandate and fund improved communication system

Update, after I posted MK reminded me I meant to include this.

If Congress is serious about this, then they will mandate and fund State to fix their decades-long communications problems.

But they won’t do that. Even 4 years after the Benghazi attack they’ve done little to improve security at State facilities.

Update: One thing that came up in today’s Comey hearing is that the FBI does not routinely tape non-custodial interviews (and fudges even with custodial interviews, even though DOJ passed a policy requiring it). That’s one more thing Congress could legislate! They could pass a simple law requiring FBI to start taping interviews.

Connecting the Dots on the Hillary Emails

I maintain my belief that it is unlikely Hillary will be implicated in the investigation into her email practices, though it is quite possible that top aides like Jake Sullivan or Huma Abedin would be.

That said, I want to put three pieces of data together that have made me less sure of that — or the potential scope of this investigation.

The first is this AP story showing that top Clinton aides sought, but did not obtain, a blackberry like device that Hillary would have been able to use in a SCIF. [See update]

Clinton’s desire for a secure “BlackBerry-like” device, like that provided to President Barack Obama, is recounted in a series of February 2009 exchanges between high-level officials at the State Department and NSA. Clinton was sworn in as secretary the prior month, and had become “hooked” on reading and answering emails on a BlackBerry she used during the 2008 presidential race.

“We began examining options for (Secretary Clinton) with respect to secure ‘BlackBerry-like’ communications,” wrote Donald R. Reid, the department’s assistant director for security infrastructure. “The current state of the art is not too user friendly, has no infrastructure at State, and is very expensive.”

Reid wrote that each time they asked the NSA what solution they had worked up to provide a mobile device to Obama, “we were politely told to shut up and color.”

Resolving the issue was given such priority as to result in a face-to-face meeting between Clinton chief of staff Cheryl Mills, seven senior State Department staffers with five NSA security experts. According to a summary of the meeting, the request was driven by Clinton’s reliance on her BlackBerry for email and keeping track of her calendar. Clinton chose not to use a laptop or desktop computer that could have provided her access to email in her office, according to the summary.

Standard smartphones are not allowed into areas designated as approved for the handling of classified information, such as the block of offices used by senior State Department officials, known by the nickname “Mahogany Row” for the quality of their paneling. Mills said that was inconvenient, because they had to leave their offices and retrieve their phones to check messages.

The story shows that some top aides (and presumably Hillary herself) were aware of the security concerns tied to using a blackberry in a SCIF (though Judicial Watch president Tom Fitton’s statement that this shows an awareness of security concerns with the blackberry may overstate things).

Perhaps the most telling detail comes from this no-comment from former Department of Justice Director of Public Affairs, Brian Fallon:

Clinton campaign spokesman Brian Fallon declined to comment Wednesday.

Fallon has generally been much chattier about the drip drip drip tied to this story.

In any case, this story puts revelations in a Fox story from last week, describing Clinton sysadmin Bryan Pagliano’s testimony as “devastating” because he helped tie the use of particular devices to particular times.

The source said Pagliano told the FBI who had access to the former secretary of state’s system – as well as when – and what devices were used, amounting to a roadmap for investigators.

“Bryan Pagliano is a devastating witness and, as the webmaster, knows exactly who had access to [Clinton’s] computer and devices at specific times. His importance to this case cannot be over-emphasized,” the intelligence source said.

The source, who is not authorized to speak on the record due to the sensitivity of the ongoing investigation, said Pagliano has provided information allowing investigators to knit together the emails with other evidence, including images of Clinton on the road as secretary of state.

The cross-referencing of evidence could help investigators pinpoint potential gaps in the email record. “Don’t forget all those photos with her using various devices and it is easy to track the whereabouts of her phone,” the source said. “It is still boils down to a paper case. Did you email at this time from your home or elsewhere using this device? And here is a picture of you and your aides holding the devices.”

Knowing that the FBI has evidence that Clinton’s aides sought a way to obtain a secure blackberry, the detail that they’re tying emails sent to what device they were sent from, suggests they may be trying to tie individual emails, and their content, to the device they were sent from. And remember, there’s an entire Tumblr of pictures of Hillary using her (non-secure) blackberry.

Now consider what I laid out in this post, when John Cornyn made it clear Attorney General Loretta Lynch is the final decision maker on whether to act on an FBI recommendation to convene a grand jury and move toward an indictment.

Cornyn: If the FBI were to make a referral to the Department of Justice to pursue criminal charges against Mr. Pagliano or anyone else who may have been involved in this affair, does the ultimate decision whether to proceed to court, to ask for the convening of a grand jury, and to seek an indictment, does that rest with you, or someone who works for you at the Department of Justice?

Lynch: So Senator with respect to Mr. Pagliani [sic] or anyone who has been identified as a potential witness in any case, I’m not able to comment on the specifics of that matter and so I’m not able to provide you–

Cornyn: I’m not asking you to comment on the specifics of the matter, I’m asking about what the standard operating procedure is, and it seems pretty straightforward. The FBI does a criminal investigation, but then refers the charges to the Department of Justice, including US Attorneys, perhaps in more celebrated cases goes higher up the food chain. But my simple question is doesn’t the buck stop with you, in terms of whether to proceed, to seek an indictment, to convene a grand jury, and to prosecute a case referred to you by the FBI?

This felt like Cornyn had been sent by someone very high up in FBI (which is probably why Lynch responded so forcefully to make clear she’s the boss of everyone at the Bureau) to pressure the Attorney General to let them convene a grand jury. Now, it appears the basis for any grand jury is not just sending classified emails, but where and on what device those emails got sent.

Again, I still think Hillary is most likely safe. But I’m beginning to see how FBI might want to make a criminal case of sending classified information using insecure blackberries knowing they were insecure.

Update: Here are the emails. Note this seems to target Cheryl Mills more than Sullivan or Abedin (note her departure briefing is in there). It shows Mills directly receiving a bunch of briefing from NSA about the insecurities of BBs.

Also note: contrary to the emphasis of the AP piece, the issue appears not to be that NSA wasn’t doing what they could do, but instead that Hillary’s key staffers can be shown to have gotten technical briefing on the problems with BBs.

The [Emails Sent to] Clinton Story May End Up Being about Loyalty

I was surprised that this story voicing concerns that Clinton backers fear “old weaknesses stalk” her campaign (stalk!) didn’t mention one of the weaknesses from 2008 that bothered me the most: loyalty.

Don’t get me wrong. Loyalty is a good thing.

Except when loyalty to long-term friends drives your hiring decisions.

To me, Hillary’s failure in 2008 is best exemplified by her refusal to fire Mark Penn, even though he divided the campaign staff and made a lot of the decisions that let Obama beat her.

More recently, Hillary retained Sidney Blumenthal as an advisor even after the White House nixed him having an official role at State — a decision that lies behind some of the more controversial emails revealed as part of the email scandal.

Yet the WaPo article on potential Hillary stumbles doesn’t mention loyalty, not even in its discussion of the email scandal.

The e-mail issue has dampened Clinton’s support in New Hampshire, which holds the nation’s first primary, on Feb. 9. Sanders rose to a statistical tie there in the latest statewide poll, to the shock of some longtime Clinton backers. She is on safer ground in Iowa, which will hold the nation’s first presidential selection vote in the Feb. 1 caucuses.

Democrats in Washington fret that the e-mail liability is something Clinton brought on herself and has managed from a defensive crouch. The decision to operate a separate e-mail system parallel to the regular State Department system has resulted in an investigation that is now out of the control of Clinton and her campaign advisers.

Political strategists who have been through past such episodes note that an investigation like this can go in unexpected and damaging directions.

“I don’t think there’s a big smoking gun,” one Democrat said. “But it’s hard to explain why you had a private server, why you just now turned it over. . . .Shouldn’t you have had better judgment?”

As I have noted, everything we know about the email scandal confirms that any legal problems stem not from Hillary sitting down and transcribing the contents of a satellite-derived intelligence report into an unencrypted email, but from a staffer taking material he or she knew to be classified and including it in an email to Hillary. It’s not even clear that happened — the CIA has a nasty habit of claiming widely known facts are Top Secret, but that is the legal issue we’re discussing (go here to review my critique of Hillary’s over actions).

Both because they hate her, because she worked under a special status at State, and because there seems to be real reason to think she had a role in emails of question, the focus has now turned to Huma Abedin, currently Vice Chairwoman for Hillary’s campaign. This report on Abedin’s possible involvement emphasizes how closer Hillary and Abedin are.

Abedin, who’s been with Clinton for about two decades, started working for Clinton as a 19-year-old intern in the former first lady’s office.

At State and during the 2008 campaign she was considered Clinton’s “body woman,” never far from Clinton’s side and often seen watching her boss intently, ready to scramble to her aid at any minute. Top politicians, and even Bill Clinton, would phone her to reach Hillary, and emails released in recent months showed she enjoyed access to Clinton at her private home, too, dropping items off on her counter and instructing her how to dress and keeping her schedule.

In 2013, news broke that Abedin had been given a special government employee status, allowing her to be simultaneously on the payroll for the philanthropic Clinton Foundation and Teneo, a consulting firm founded by former Clinton White House adviser Doug Band. She previously had not disclosed the dual employment.

Abedin has said she stepped back from government work and became a contractor so she could be with her family and her newborn son. But since then, critics have questioned her about whether she had a conflict of interest while working at State and alongside close friends of the Clinton family.

There are a few other staffers whose names have been floated as potentially sending the emails with information deemed classified.

But if Abedin is among them, it poses the quintessential problem for Hillary: the possibility that dealing with this email problem would at the same time require distancing herself from a cherished associate. If someone like Abedin were involved in sending classified information, would Hillary do what she refused to do in 2008?

The SEKRIT Drones in Hillary’s [Staffers’] Emails

From the start of the Hillary Clinton email scandal, I’ve maintained that there are real reasons to be critical of her use of a private email.

There are big governance reasons to be concerned that Clinton has been in control of all her official emails, including that the emails will get destroyed or hidden from FOIA and Congressional requests.

But there’s also the question of whether whatever sensitive communications she had — potentially including classified information — were safe on a server run out of her Chappaqua home. While the State Department’s own emails have been notoriously unreliable — they have been compromised both in the WikiLeaks leak and in persistent hacks in recent years– if foreign adversaries learned of her private server (and remember, it’s very hard to hide metadata from someone who is looking), her communications would be even easier to compromise.

[snip]

[T]he system is also broken because it has been permitted to become a tool the powerful use to control their own image (and thereby accrue more power). After the years-long witch hunts under her spouse’s Presidency, Clinton might be forgiven for wanting to maintain complete control over her own communications (except for that whole bit about democratic accountability). But she is of course doing it to serve her own Presidential aspirations.

Not only are there real governance reasons it was wrong, but it was an own-goal given that she knew Republicans would pounce on anything that hints of corruption (even though most GOP presidential candidates have done the same thing). In the grand scheme of things, however, I’m most interested in fixing the email and accountability problem, because it has been a recurrent problem since Poppy Bush tried to destroy some PROFs notes to cover up the Iran-Contra scandal.

That said, much — though not all — of the reporting on it took a decidedly irresponsible turn when Intelligence Community Inspector General Charles McCullough revealed that two emails from the emails on Hillary’s server had been determined to contain Top Secret information. Such reporting was led by former NSA official John Schindler whose piece in the Daily Beast bore this headline.

Screen Shot 2015-08-14 at 8.40.08 AM

Schindler might be excused for a headline editors gave his piece to drive clicks and scandal — and indeed, in some parts of his article he was more disciplined in specifying whose emails these were — but he nevertheless used the formulation “Clinton’s emails” when claiming she had satellite-derived information on her servers.

Most seriously, the Inspector General assessed that Clinton’s emails included information that was highly classified—yet mislabeled as unclassified. Worse, the information in question should have been classified up to the level of “TOP SECRET//SI//TK//NOFORN,” according to the Inspector General’s report.

This left the suggestion that as Secretary of State Hillary Clinton sat down with some SIGINT reporting, transcribed it, and then sent it off to her staffers. That, in spite of repeated clarifications from official sources that Hillary was in no way a target of the FBI inquiry into this.

Dianne Feinstein clarified the point yesterday: the issue is that Hillary received emails that had information claimed to be classified, not that she sent them.

There has been a lot of press coverage recently of allegations regarding Secretary Clinton’s email. Unfortunately, much of the coverage has missed key points.

First, none of the emails alleged to contain classified information were written by Secretary Clinton.

The questions are whether she received emails with classified information in them, and if so, whether information in those emails should have been classified in the first place. Those questions have yet to be answered. However, it is clear that Secretary Clinton did not write emails containing classified information.

Again, nothing obviates all the blame that Hillary chose to rely on an unclassified email system, but it’s one thing if Hillary were sending Top Secret information across an unprotected server, and yet another thing if she received emails that might have been derived from Top Secret information, but were not marked as such or even evidently sourced from Top Secret information. Or even — given that some of the people and agencies in question aren’t entirely trustworthy when they make claims of secrecy — that publicly available information was deemed Top Secret.

At least according to the AP (in a story sourced to US officials, so potentially some people in DiFi’s immediate vicinity), that’s what happened.

The two emails on Hillary Rodham Clinton’s private server that an auditor deemed “top secret” include a discussion of a news article detailing a U.S. drone operation and a separate conversation that could point back to highly classified material in an improper manner or merely reflect information collected independently, U.S. officials who have reviewed the correspondence told The Associated Press.

[snip]

The drone exchange, the officials said, begins with a copy of a news article that discusses the CIA drone program that targets terrorists in Pakistan and elsewhere. While a secret program, it is well-known and often reported on. The copy makes reference to classified information, and a Clinton adviser follows up by dancing around a top secret in a way that could possibly be inferred as confirmation, they said. Several officials, however, described this claim as tenuous.

But a second email reviewed by Charles McCullough, the intelligence community inspector general, appears more suspect. Nothing in the message is “lifted” from classified documents, the officials said, though they differed on where the information in it was sourced. Some said it improperly points back to highly classified material, while others countered that it was a classic case of what the government calls “parallel reporting” — different people knowing the same thing through different means.

This is CIA claiming secrecy for its drone operations!!! The ongoing FOIAs about CIA’s acknowledged role in the drone war are evidence that even independent appellate judges don’t buy CIA’s claims that their drone activities are secret. Just yesterday, in fact, DC Judge Amit Mehta ordered DOJ to provide Jason Leopold more information about its legal analysis on CIA drone-killing Anwar al-Awlaki, information the CIA had claimed was classified. Indeed, Martha Lutz, the woman who likely reviewed the emails turned over, is fairly notorious for claiming things are classified that pretty obviously aren’t. It’s her job!

I’m all in favor of doing something to ensure all people in power don’t hide their official business on hidden email servers — right now, almost all people in power do do that.

But those who take CIA’s claims of drone secrecy seriously should be mocked, as should those who deliberately obscure the difference between receiving an unmarked email with information claimed to be classified and those who transcribe information from a properly marked classified document.