Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: FOX

During the final months of the Clinton email investigation, FBI agent Peter Strzok was advised of an irregularity in the metadata of Hillary Clinton’s server that suggested a possible breach, but there was no significant follow up, according to two sources with knowledge of the matter.

Sources told Fox News that Strzok, who sent anti-Trump text messages that got him removed from the ongoing Special Counsel Robert Mueller’s Russia probe, was told about the metadata anomaly in 2016, but Strzok did not support a formal damage assessment.

One source said: “Nothing happened.”

Fox News is told the Justice Department Inspector General, Michael E. Horowitz, is aware of the allegations.

According to intelligence community directive 732, damage assessments are done “in response to unauthorized disclosure or compromise of classified national intelligence.”

Intelligence beyond top secret was identified on the Clinton server. As secretary of state, Clinton chose to use a private, non-secure server for government business.

The FBI had no comment to Fox News’ questions about Strzok, his awareness of the metadata issue, and what actions, if any, he took. There also was no comment from the Inspector General’s office.

A report from Horowitz’s 14-month investigation into the DOJ and FBI’s handling of the Clinton email case is expected at any time.

In December, when the texts between Strzok and FBI lawyer Lisa Page became public, congressional sources said Strzok was part of then FBI Director James Comey’s inner circle, who advised and made edits to Comey’s July 2016 public statement recommending against criminal charges in the Clinton probe.

The edits addressed the likelihood the Clinton server had been compromised. In the initial May 2016 draft, two months before Clinton and more than a dozen key witnesses were interviewed, Comey said it was “reasonably likely” that “hostile actors” gained access to then-Secretary of State Hillary Clinton’s private email account. That was later changed to say the scenario was merely “possible.”

In his July 2016 statement, Comey said: “With respect to potential computer intrusion by hostile actors, we did not find direct evidence that Secretary Clinton’s personal e-mail domain, in its various configurations since 2009, was successfully hacked. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence.”

Comey said hostile actors got access to private accounts of Clinton’s close contacts. He also said Clinton’s use of personal email was widely known, her email address was readily apparent and she used the account while travelling overseas where hostile nations and sophisticated hackers operate.

“Given that combination of factors, we assess it is possible that hostile actors gained access to Secretary Clinton’s personal e-mail account,” Comey said at the time.

Another key edit, which appeared to limit Clinton’s legal exposure, included changing the language to describe the former Secretary of State’s actions from “grossly negligent” to “extremely careless.”  This is a key legal distinction because, under the federal criminal statute 18 USC 793, the legal standard is gross negligence.

“110 e-mails in 52 e-mail chains have been determined by the owning agency to contain classified information at the time they were sent or received,” Comey said in his July 2016 statement about the Clinton case. “Eight of those chains contained information that was top secret at the time they were sent; 36 chains contained secret information at the time; and eight contained confidential information, which is the lowest level of classification.”

www.extremehacking.org

Sadik Shaikh | Cyber Suraksha Abhiyan, Ethical Hacking Training Institute, CEHv10,CHFI,ECSAv10,CAST,ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v10 course in Pune-India, ceh certification in pune-India, ceh v10 training in Pune-India, Ethical Hacking Course in Pune-India