Transcripts For CSPAN Mike Pemce Delivers Remarks At Reagan

CSPAN Mike Pemce Delivers Remarks At Reagan Library September 14, 2016

Follows in terms of testimony you gave and the report quotes you and i take it you were under a . Under aoth . Oath . I was not under oath. When they obtained a new mobile device, helping them back up the data from the old device before transforming it transferring it to the new device. Correct. S that quote is correct. The summary describes two instances and here is where the conspiracy theories have been acted out in this house and the president ial campaign. Two instances where you destroyed old mobile devices with a hammer and mr. Trump claimed who would do that if it did not have anything to hide and representative desantis picked up that rhetoric and said it shows an attempt to hide something. I want to directly ask you about the destruction of those blackberries. To hide purpose ever secretary clintons emails from being saved or disclosed from federal records . No, not in any way to destroy or hide any man any information at all. The opposite would be the case. I was going out of my way to preserve all the information on those devices, transfer them to the new devices . Themfore you destroyed from one blackberry to another, did you transition the very same emails . Backupmbination of the procedure and activating the new device. It would have ended up on the new device. You copied the content save did and loaded it on a new device . That is correct. Course of the fbis investigation, did you realize you still have still had retained extra copy of the content of those old blackberry devices on your own machine . Did you provide that information to the fbi . In preparing to meet with the fbi and examining my files related to the server, i did describe some files that may have contained content related to this. I turned that content over to my attorneys who worked with the unit the fbi and the department of justice. Was to make that the case that you did not intend to hide anything. The fbi has the information that was on every single blackberry. They have the information for the ones i had backup files on. From one blackberry to another blackberry with nothing lost in between. Correct. Thank you very much, mr. Chairman. Mr. Cooper, do you consider yourself to be an expert in the i. T. Field . No, i do not. Do you think the state department should have had someone more qualified than you to oversee and protect secretary clintons servers from hackers . I was not working for the state department. I believe the server to be used office. Dent clintons secretary clinton had a personal account on that server. On january 9, 2011, at 2 57 a. M. , you sent an email to secretary clintons top aide explaining you had to shut down her server due to someone trying to hack it. How many times did you personally have to shut down the server to prevent it from being hacked . Containsrver that president clintons office and secretary clintons office. This was a series of failed logon attempts which was brought to my attention on alert in my system. One of the ways to stop that was to shut down the server for a period of time said the attacks would cease. We would develop more sophisticated ways to filter those sorts of failed login attempts. Do you know whether powering down the server is the typical way in the i. T. Community to protect against hacks . I cannot speak to that. Do you know what a brute force attack is . Highfrequency variety ofns using a usernames and passwords. How many brute force attacks did you observe on the clintons server . I cannot say with any specificity. We developed systems to tamper these down. Some frequency. Highyield my remaining time i yield my remaining time back to the chairman. Access toy people had the server . Access to the server . Administrators . I want the whole universe. Had someople who administrative rights. I cannot tell you exactly how many users there were over the lifetime of the server. Less than 20 people. Was there a Remote Access login available . It was for myself and mr. Pedley on oh. Pagliano. Encrypted . Did it have dual authentication . I do not recall dual authentication. People can do it, intermingled with the clinton foundation, clinton executive services, did they also have access to that . I cannot say it is intermingled with the clinton foundation. People being paid either clinton foundation. Individuals who had multiple Job Responsibilities for multiple entities within the clinton world. Department ever contact you or complain or issue any sort of concern . No, no concern. I have one more question. I understand in order to make secretary clintons private and secure email server connect with the state Department Much more secure server, the state department had to lower its own security settings temporarily to match her more insecure security server. Do you know about that . The fact that she had this insecure server. I have read accounts of that in the media but i have no direct knowledge of that. I recognize the german for massachusetts. The gentleman from massachusetts. Mr. Cooper, the fbi conducted a yearlong investigation that concluded that and i will use the directors own statement. We did not find clear evidence that secretary clinton or her colleagues intended to violate laws governing the handling of classified information. I do not see evidence that is sufficient to establish that secretary clinton talked about classified information on email. I know you are not a computer expert and that is probably more appropriate line of questioning for mr. Pagliano. The fbi did have a number of technical computer experts on a team and they took a year and i conclusion. Te their this is director cohen me again comey again. With respect to potential computer intrusion, we did not find direct evidence that secretary clintons personal email domain was the s successfully hacked. Friend the analysis did not find evidence forensic analysis did not find evidence they were intruded by ciber means. Er means the fbi also interviewed brian pagliano. Asked about the maintenance and security of the server system, you stated there were no Security Breaches but he was aware there were many failed login attempts which he referred to as brute force attacks. Statement that i just , is thatt quote consistent with your recollection . That is consistent with my recollection. Did you take any steps to protect the server when there were these failed brute force login attempts . Overtime, we developed a few Different Solutions that allowed us to manage them in a different in different ways. The fbi summary explains some additional steps that were described. Including establishing secure socket players layer certification. Is that consistent with your recollection . That is consistent with my recollection. Thank you. That is all i have, mr. Chairman. We recognize the gentleman from ohio. We can put up the slide. When mr. Thorton was here, this is an email from one of those , look at the date, august 2015. Us to cut the backup and have them confirm it for our records, starting to think this whole thing is covering up a lot of bad stuff. Something in writing because they knew they were going to get thrown under the bus. We know they changed the backup structure because look at the fbi report. Page 18, cheryl mills instructed someone to modify the email retention policy on clinton email account. She wanted to get rid of anything after 60 days. We know they were instructed. Lets walk through some history. From the fbi report, july 2014, at the request of cheryl mills, it remotely transfers all Hillary Clinton email to sure am mills cheryl mills. These laptops have bleach applied to them and stuff is deleted. What happened just before july of 2014 . Page 15 of the report, cheryl mills is given a heads up by the state department that there will be a letter coming requesting all Hillary Rodham clintons emails. Request, cheryl mills she changed the email policy on her account. What prompted this change . December 2, chairman of the. Enghazi committee we just found about this other account. We would like the information from that account. Right after that, they changed the policy. Delete anything after 60 days. We move forward to the amazing month. March 2015. New york time reports, she has just this one email account. Arch 3, a preservation letter march 4, there is a subpoena. March 9, the network is put on notice about the preservation order. March 10, the press conference. March 25 and march 31, those today are Conference Calls with clinton, bill clintons lawyers and Hillary Clintons lawyers and, of course, on the 31st of that month is when they take bleach fit to the holder in everything. They get rid of everything. Now we have to guys, three guys one on the front and mr. Pagliano who helped mr. Cooper set it up and now we have to guys on the tail end, right . And mr. Thorton, the do not work for the government, and they take the fifth. Get some unity. These guys are starting to wonder we do not have anything in writing, we have been giving all the best given all these instructions, all these instructions to change the backup, delete things, erase things, bleach things, take hammers two things, we might be in trouble. Guess what, they are. That is the story and that is for thes appropriate chairman to invite him in here they would answer somebodys question. He is exactly right. They will talk to the people who but theyim in jail will not cut talk to congress. They will not chat to us. We cannot put them in jail. We just want to get answers were the American People and they will not talk to us. Like this,anything mr. Chairman where you get as we talked about yesterday, no regular american can get away with the kind of behavior secretary clinton gets away with. Two standards and this is what is so wrong and this is why the hearings youre having and the investigation we are doing is entirely appropriate. I yield back. Chair i recognize the gentleman from texas. Thank you for being here and having the kurds to testify before us and getting to the truth. I want to take a they step bath. Back. The server the clintons had, this was not a personal computer that everybody has that they pick up their email. I have people say they think there computer was a server. Are you familiar with the many people who have this type of equipment in their home, it is typically something that is it in an office. Do you know anyone who has a server at their home besides maybe me . Mr. Cooper i am aware of some. It is pretty rare. Are you aware of what email software was running on the server . I do not recall what the software was running. You told it was set up to do and it forwarded it to mrs. Clintons blackberry. Did you keep it on the server . Servers we were speaking about. There was an apple server in use for approximately june 2008 2009. March that server which is set up for president clintons office staff had some software, i do not recall the name of the Software Package was. One was a mail client and one was a tool that was supposed to interface with blackberry but it was not blackberrys own product. Was it secure or did it use the verizon blackberry gateway . I cannot speak to the security of what that was but in the cases secretary clinton because she was not going to be accessing that email and the focus was transitioning her email address over, they were simply receiving messages in, not retaining them on that server and having them forward to her. Server, did it do the same thing . On the later server it functioned like what you are used to where there was a mailbox on that server that could be accessed. Was it opened up the way you could get your email through that server, the pop3 or web client . I do not specifically recall. Ding on the user we would customize which ports were often based on how that user was accessing. Did you require that users picking up their mail remotely would use a secure client or would they come over clear text over the standard smpt port . I do not recall the protocols. You do not know if there was a requirement to login with ssl. Did you turn over the logs that you received to the fbi . Of the brute force attacks . I did not. Over to thern those fbi. There was an instance where we shared odds with the secret service when we were first experiencing that login attempt. You got a notice when there was a failed login attempt but if somebody doing this brute force attack where they used the username and throw random passwords at it, if they had gotten it right you would not have been notified, would you . You would have thought it was mrs. Clinton or some legitimate user getting in. I do not want to suppose but you only get notices a failed logins. You were not notified every time someone login although there might have been a lot count. Someone could have gotten in and you would not have known it. Was there a firewall between the internet and this piece of hardware between the server and the internet . I believe there was a firewall. Was the one with the apple server . I do not recall. And then we talked a little bit about mrs. Clinton going through a variety of blackberries, were they all the same version of blackberries or did she migrate up between when the new blackberry came out, did she want the latest and greatest but very . It is difficult for me at least, there is a time warp and these sequences, blackberry was leasing models with different interfaces, trackballs and tracking wheels and pads. It went through that nightmare myself. Over time she would move to a newer device when her older device might have been a little bit older, a little bit failing. Do you know if this Security Patch is worth on all the servers . I feel fairly confident that the patches were updated by mr. Hagley on oh pagliano. Overgave it up and moved to online hosting because it is next to impossible to keep up with the pace of the security fixes that are coming out. I see i am out of time. I yield back. We recognize the chairwoman from wyoming. I cannot do a geek count, i am a rancher. Im not his family with these technologies but i do know this, just as an average american when it comes to technology. We do know that the Chinese Government hires people to hack by day. Those same hackers hack for higher at night hire at nig ht. Therapist before spending every single day there are people who are spending every single day in russia, china, trying to hack in to the computers of the u. S. Government officials. Security is a constant problem in this country, especially for highly did officials or appointed officials. Encryptionow this, can be used to help prevent that, dual authentication processes can be used to help prevent that kind of hacking. So, mr. Cooper, are you telling me that there was no dual authentication, no encryption, hadthe secretary of state no protection of our secrets when we all know that efforts are being made to hack people just like her and government in government . Cooper i unfortunately cannot provide you with the details of the specific security options on the same on server. They evolved over time. Essentially as technology evolved over time and there were Different Things that were available and considered different junctures. At different junctures. I would certainly agree that this is something we should all be concerned with. I saw this again as this is there is a need to, yes, protect the privacy of individuals and their personal lives using their email. Membersso know that as of congress we just know that if we travel to a foreign country, and we have a device with us, especially in russia they tell our devices in aluminum foil so there is no transmission. Televised examples of the secretary of state clinton using her Electronic Devices to communicate while she is running all over the world. And now that we know that these servers and devices were scattered around in her home, of that there was some sort management of documents in colorado, how can people like me assure the American People that the information that was on those emails and some of which has been destroyed and is not is not beingus sifted through even as we speak by chinese hackers and Russian Security does our country have by virtue of what looks to me like some pretty lackadaisical attitudes toward secret data,a, top secret data, confidential data . An expert in Computer Security. I understand some of the concerns you have expressed by have no expertise in that area. Second, i have no content and cy what the content was on this equipment. Third, i also have no specific knowledge in which countries secretary clinton chose her did not choose to use her devices. Mr. Chairman, i yield back. I yield to the chairman. Chair you get huge brownie points for showing up and having the guts to actually answer questions. We are very grateful. I am grateful for your candid nation nature in expressing the idea that you do not have topertise to even answer those questions as thoroughly as possible. Again, iem i have believe you are doing the best you can at least based on the testimony i have heard thus far, heres the problem. Was noou, mr. Cooper, experience, no dual authentication, no encryption of against the chinese and the issians, who do you think going to win that one . That is what scares the living daylights out of us because the cavalier nature in which this was set up in some of the nations most sensitive insecure information, that is the concern. Im going to recognize the german from vermont. Gentleman from vermont for five minutes. Thank you. I have a few questions and a bit of a statement. Mr. Chairman, you are a good chairman, doing a great job but i disagree with you about the excessive in my view focus on Hillary Clinton. I want to give a little perspective here. Fbi, we had mr. Komi comey who has an unimpeachable record of vigilance as a prosecutor, who calls them as he sees them, he went to every single thing, every single email and he came to the conclusion that there was no criminal conduct, there is no evidence of that in fact of the secretarys email had been said it is the he not even a close call. The email should have been set up, that was a mistake, the secretary has acknowledged, there is a racist to inquire as to what happened but we have done it. And the fbi has done it. A feeling that a little bit of this has to do something with other than email. It may have to do with something that is looming in november. Have as of the issues i i listen to the questions of my colleagues is they are asking the witnesses to disprove a negative. My friend from wyoming was asking about the russian and the chinese trying to get into that email. They probably are. Theyre trying to get into every department we have probably come a tried to get into the white house, the department of defense and the joint chiefs of staff. So that a

© 2025 Vimarsana