Ricochet is the best place on the internet to discuss the issues of the day, either through commenting on posts or writing your own for our active and dynamic community in a fully moderated environment. In addition, the Ricochet Audio Network offers over 50 original podcasts with new episodes released every day.
I’m curious how dangerous the tech-savvy Ricochetti believe that clintonemail.com was. Perhaps a better way to put it: What is the scale and scope of that danger?
My biggest concern is how compromised our *.gov email systems were by Hillary’s rogue operation. Once I thought of the recent State.gov exploit — in conjunction with the revelation of Hillary’s private server — other worries came to mind over the last few days:
- Hillary’s own emails pose a smaller security risk than those of her staff. In my experience, it’s often low-level staff who open the door to email-driven breaches. They’re easier to tempt into opening “WHSalary.xls” files or juicy-looking links.
- I wonder if the Clintonistas have any idea if clintonemail.com was breached. If they did, however, it would be a great reason to delete mail, destroy the server, etc. She can survive non-disclosure; she can’t survive having allowed Russians, Chinese, or both, to use clintonemail.com to attack the government.
- Were any *.gov defenses lowered to accommodate this separate operation. For example, did state.gov treat clintonemail.com as a trusted domain?
- Even if clintonemail.com wasn’t in *.gov domains via a trust, payloads in attachments or links are notoriously hard to vet. So long as attachments or links were allowed, spoofing *.gov account holders via what looked like Hillary and staff mails (e.g., Name appears as Hillary Clinton, but it’s really an clintonemail.com account controlled by another).
Any other ideas about what went down and what to ask?