SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
No one cares about your
damn emails
The email scandal and a primer on email servers and clients…
In the following slides you will:
 Learn about the Hillary email scandal from the beginning
 See how it fits into Benghazi, the FBI, the Attorney General and Congressman Anthony
Weiner
 Discover mail servers, ingoing and outgoing protocol, and security on the webmail server
What happened?
 March 2015: We learned that Hillary Clinton used her family’s private email server
for official communications.
 However, she was to use official State Department emails accounts on federal
servers
 Those official communications on the private email server would retroactively be
marked classified
How does Benghazi fit in?
 The email scandal unfolded as Clinton is beginning her presidential bid and
hearings are held at the House Select Committee on Benghazi
 Some members of congress have said that her private messaging system
software and private server violated State Department protocols and
procedures, as well as federal laws and regulations on recordkeeping.
 Clinton says that her use of personal email was in compliance with federal laws,
and that former secretaries of state also maintained personal email accounts.
However, she is the only one to use a private email server.
 Some of the classified emails were about Benghazi.
How does the FBI fit in?
 The FBI began an investigation regarding how classified information was held on the
Clinton server.
 Of the emails on the server, 113 contains information that would have been classified,
including 65 “secret” and 22 “top secret”
 Of these 113 emails, only three had markings to identify it as classified
 Director James Comey suggests that Clinton was not “technically sophisticated” enough
to understand what the three classified markings meant.
 Nearly 2,100 emails on the server were retroactively marked as Classified.
 Government policy is that sensitive information should be considered and handled as
classified
The ultimate finding for the FBI
 IN May 2016, the State Department’s Office of the Inspector General released an 83-page
report on the email practices of the State Department, including Hillary Clinton.
 On July 5, 2016, Comey announced that although Hillary was “extremely careless” in her
email handling, there was no wrongdoing on her part..
 The next day, Attorney General Loretta Lynch announced no charges would be filed.
Clinton /Loretta Lynch connection
 On June 27, 2016, Bill Clinton held up a Phoenix flight for 20 minutes so he might
have a little chat with Attorney General Loretta Lynch.
 9 days later, she would decide not to file charges against Hillary Clinton
New attacks on October 28 lead to new
actions on the 29th (ongoing!)
 FBI Director announces out of the blue that he was looking into a potential new batch of
messages from her private email server.
 Clinton responds quickly and sharply, questioning his motives 11 days from the election,
calling it “strange and …deeply troubling.”
 By Saturday, she is vocal, accusing the director of smearing with innuendo late in the race
and violating Justice Department Rules
 These rules establish guidelines advising against such actions so close to an election.
The Weiner link
 It just so happens that Congressman Anthony Weiner, known for his sexting
failures on Twitter, has a wife who happens to be a long time Hillary aide, Huma
Abedin.
 These new emails were found on Weiner’s computer, as it was being searched for
sexually explicit messages with a teenager
But we digress, how
email works
Some technical details
What is an email server?
 A server is a computer that handles and delivers e-mail over a network, usually
over the Internet.
 An email server can receive emails from their own “client” computers and
deliver to other mail servers. It can also deliver emails to “client” computers only
 Think of an email server as a neighborhood mailman. Without email servers, you
could only send email to those in your domain (gmail.com, outlook.com)
Types of mail servers
 Two types of mail servers: Outgoing mail servers and incoming mail servers.
 Outgoing mail services are known as SMTP (Simple Mail Transfer Protocol servers)
 Incoming mail servers can be POP3 (Post Office Protocol, Version 3, best for
storing send and archived messages on PCs local hard drive) or IMAP (Internet
Message Access Protocol) store copies of messages on servers. Since most POP3
servers can also store messages, it is more convenient than IMAP
Sending an Email
1. You compose the message and hit send.
2. Your email client (Outlook Express, Gmail, etc.) connects to your domain’s SMTP server.
giving it your email address, the recipient’s email address, the message body and
attachments
3. The SMTP server processes the recipient’s mail address. If it is the same domain, it is sent
directly to the domain’s POP3 or IMAP server.
4. If the domain is different, the SMTP will have to communicate with other domain servers
Continued…
Sending an email: next steps
6. The sender’s SMTP server has to communicate with the DNS (Domain Name
Server). The DNS takes the email domain name and translates it into an ip
address. NOTE: If the DNS server is down (as happened with the recent Cyber
Attack), the emails will be lost (can’t find their domain).
7. Although technically the SMTP server knows the address, and therefore the SMTP
server that hosts this domain, the message may be routed along a series of
unrelated SMTP servers
8. The recipients SMTP server scans the message. If it recognizes the domain and
username, it forwards the message along the POP3 or IMAP server. It is then put
in a sendmail queue until the recipient’s email client allows it to be downloaded,
where the message can then be read by the recipient.
It looks like this:
Email clients
 Yahoo mail and Gmail are examples of web-based email clients. In this case, you are
using a Webmail client, which is accessed through your Web Browser.
 If you are using a specialized program NOT on the web, like Microsoft Outlook, and
Thunderbird, you are using a specialized email client. You will use software to read and
send emails from your computer. Unlike web-based, your emails are stored on your
computer. You can also read messages you have already received without Internet
connections.
 Hillary Clinton had a Private email client.
 The email process is complex. There are programs, such as Postfix and Microsoft
Exchange that facilitate the email process behind the scenes. This is a useful program
when you host your own server.
 It is thought that Hillary Clinton was using Microsoft Exchange as her email program.
Security in the email server
 Encryption helps protect messages from interception or alteration.
 Mail servers use the TLS (transport layer security) protocol to encrypt ingoing and outgoing
channels
 These mail servers have a special code, known as a certificate. Email software and servers
will check for this to verify the server’s identity.
 You may sometimes see that a site does not have a valid certificate. Proceed with
caution.
 Although most servers pay a certificate authority for a certificate, some smaller ones sign
their own. Clinton’s server probably used a self-signed certificate, which is a security risk.
 Another thing that she may have been lacking is message level encryption, which is built
into the email client software.
Questions:
 What are some differences between using a private email server and a web based
server?
 How is an email server similar to a postman?
 What does the DNS (domain name server) do?
 What is a certificate?

Weitere ähnliche Inhalte

Was ist angesagt?

How to Trace an E-mail Part 1
How to Trace an E-mail Part 1How to Trace an E-mail Part 1
How to Trace an E-mail Part 1
Lebowitzcomics
 
Anthropomorphism in Technical Presentation
Anthropomorphism in Technical PresentationAnthropomorphism in Technical Presentation
Anthropomorphism in Technical Presentation
Barnes & Roberts.LLC
 
The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !
Theawaster485
 
Non-Commercial Domain Hosting
Non-Commercial Domain HostingNon-Commercial Domain Hosting
Non-Commercial Domain Hosting
webhostingguy
 

Was ist angesagt? (20)

A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Learn writing articles and Earn money
Learn writing articles and Earn money Learn writing articles and Earn money
Learn writing articles and Earn money
 
Writing articles
Writing articlesWriting articles
Writing articles
 
Writing articles effectively for more exposure & traffic
Writing articles effectively for more exposure & trafficWriting articles effectively for more exposure & traffic
Writing articles effectively for more exposure & traffic
 
About Web and E-mail
About Web and E-mailAbout Web and E-mail
About Web and E-mail
 
How to Trace an E-mail Part 1
How to Trace an E-mail Part 1How to Trace an E-mail Part 1
How to Trace an E-mail Part 1
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
 
Email security
Email securityEmail security
Email security
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Anthropomorphism in Technical Presentation
Anthropomorphism in Technical PresentationAnthropomorphism in Technical Presentation
Anthropomorphism in Technical Presentation
 
The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Non-Commercial Domain Hosting
Non-Commercial Domain HostingNon-Commercial Domain Hosting
Non-Commercial Domain Hosting
 
War on Stealth Cyberattacks that Target Unknown Vulnerabilities
War on Stealth Cyberattacks that Target Unknown VulnerabilitiesWar on Stealth Cyberattacks that Target Unknown Vulnerabilities
War on Stealth Cyberattacks that Target Unknown Vulnerabilities
 
Academy3 email
Academy3 emailAcademy3 email
Academy3 email
 
Academy4 l m
Academy4 l mAcademy4 l m
Academy4 l m
 

Andere mochten auch

Hearing impairment presentation
Hearing impairment presentationHearing impairment presentation
Hearing impairment presentation
hebaker42
 
Deaf And Hard Of Hearing Presentation
Deaf And Hard Of Hearing PresentationDeaf And Hard Of Hearing Presentation
Deaf And Hard Of Hearing Presentation
ArtfulArtsyAmy
 

Andere mochten auch (20)

Music And Exercise Research Summary
Music And Exercise Research SummaryMusic And Exercise Research Summary
Music And Exercise Research Summary
 
Osteoarthritis
OsteoarthritisOsteoarthritis
Osteoarthritis
 
Security gap in Internet Explorer
Security gap in Internet ExplorerSecurity gap in Internet Explorer
Security gap in Internet Explorer
 
An end to net neutrality
An end to net neutralityAn end to net neutrality
An end to net neutrality
 
An introduction to diabetes
An introduction to diabetesAn introduction to diabetes
An introduction to diabetes
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
Deafness
Deafness Deafness
Deafness
 
Child with pallor & jaundice (hemolytic anemia)
Child with pallor & jaundice (hemolytic anemia)Child with pallor & jaundice (hemolytic anemia)
Child with pallor & jaundice (hemolytic anemia)
 
Burning fat
Burning fatBurning fat
Burning fat
 
Deafness
DeafnessDeafness
Deafness
 
Deep neck infection
Deep neck infection Deep neck infection
Deep neck infection
 
Deafness
DeafnessDeafness
Deafness
 
Child with cyanosis
Child with cyanosisChild with cyanosis
Child with cyanosis
 
Hearing loss
Hearing lossHearing loss
Hearing loss
 
The deaf child
The deaf childThe deaf child
The deaf child
 
Hearing impairment presentation
Hearing impairment presentationHearing impairment presentation
Hearing impairment presentation
 
Benign and malignat tumors of salivary gland
Benign and malignat tumors of salivary glandBenign and malignat tumors of salivary gland
Benign and malignat tumors of salivary gland
 
Understanding hearing impairment
Understanding hearing impairmentUnderstanding hearing impairment
Understanding hearing impairment
 
Deaf And Hard Of Hearing Presentation
Deaf And Hard Of Hearing PresentationDeaf And Hard Of Hearing Presentation
Deaf And Hard Of Hearing Presentation
 
Gadgets
GadgetsGadgets
Gadgets
 

Ähnlich wie No one cares about your damn emails

Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
Adam Ripsam
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
enukahansana
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
jeffsrosalyn
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
sankhadeep
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
AbdulHaseebKhan34
 

Ähnlich wie No one cares about your damn emails (20)

Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
E‑mail
E‑mailE‑mail
E‑mail
 
Email
EmailEmail
Email
 
New PPT Presentation.pptx
New PPT Presentation.pptxNew PPT Presentation.pptx
New PPT Presentation.pptx
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdfDay3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
 
DKIM PRes.pptx
DKIM PRes.pptxDKIM PRes.pptx
DKIM PRes.pptx
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Eseminar1
Eseminar1Eseminar1
Eseminar1
 
email security
email securityemail security
email security
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 

Mehr von San Diego Continuing Education

Mehr von San Diego Continuing Education (20)

Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017
 
Healthy communication presentation
Healthy communication presentationHealthy communication presentation
Healthy communication presentation
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Review of brain plasticity
Review of brain plasticityReview of brain plasticity
Review of brain plasticity
 
Depression
DepressionDepression
Depression
 
5 technologies that have changed our lives
5 technologies that have changed our lives5 technologies that have changed our lives
5 technologies that have changed our lives
 
Communications presentation
Communications presentationCommunications presentation
Communications presentation
 
Depression & anxiety
Depression & anxietyDepression & anxiety
Depression & anxiety
 
Finding reliable health information online
Finding reliable health information onlineFinding reliable health information online
Finding reliable health information online
 
Windows 7: The Basics
Windows 7:  The BasicsWindows 7:  The Basics
Windows 7: The Basics
 
Week 4 internet overview
Week 4 internet overviewWeek 4 internet overview
Week 4 internet overview
 
Finding a purpose
Finding a purposeFinding a purpose
Finding a purpose
 
Social networks
Social networks Social networks
Social networks
 
Proper footwear for walking
Proper footwear for walkingProper footwear for walking
Proper footwear for walking
 
Exercise technology
Exercise technologyExercise technology
Exercise technology
 
Shopping and banking online
Shopping and banking onlineShopping and banking online
Shopping and banking online
 
Presentation social networks
Presentation social networksPresentation social networks
Presentation social networks
 
Presentation social networks with screenshots
Presentation social networks with screenshotsPresentation social networks with screenshots
Presentation social networks with screenshots
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Unit 4: Communicating online
Unit 4:  Communicating onlineUnit 4:  Communicating online
Unit 4: Communicating online
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

No one cares about your damn emails

  • 1. No one cares about your damn emails The email scandal and a primer on email servers and clients…
  • 2. In the following slides you will:  Learn about the Hillary email scandal from the beginning  See how it fits into Benghazi, the FBI, the Attorney General and Congressman Anthony Weiner  Discover mail servers, ingoing and outgoing protocol, and security on the webmail server
  • 3. What happened?  March 2015: We learned that Hillary Clinton used her family’s private email server for official communications.  However, she was to use official State Department emails accounts on federal servers  Those official communications on the private email server would retroactively be marked classified
  • 4. How does Benghazi fit in?  The email scandal unfolded as Clinton is beginning her presidential bid and hearings are held at the House Select Committee on Benghazi  Some members of congress have said that her private messaging system software and private server violated State Department protocols and procedures, as well as federal laws and regulations on recordkeeping.  Clinton says that her use of personal email was in compliance with federal laws, and that former secretaries of state also maintained personal email accounts. However, she is the only one to use a private email server.  Some of the classified emails were about Benghazi.
  • 5. How does the FBI fit in?  The FBI began an investigation regarding how classified information was held on the Clinton server.  Of the emails on the server, 113 contains information that would have been classified, including 65 “secret” and 22 “top secret”  Of these 113 emails, only three had markings to identify it as classified  Director James Comey suggests that Clinton was not “technically sophisticated” enough to understand what the three classified markings meant.  Nearly 2,100 emails on the server were retroactively marked as Classified.  Government policy is that sensitive information should be considered and handled as classified
  • 6. The ultimate finding for the FBI  IN May 2016, the State Department’s Office of the Inspector General released an 83-page report on the email practices of the State Department, including Hillary Clinton.  On July 5, 2016, Comey announced that although Hillary was “extremely careless” in her email handling, there was no wrongdoing on her part..  The next day, Attorney General Loretta Lynch announced no charges would be filed.
  • 7. Clinton /Loretta Lynch connection  On June 27, 2016, Bill Clinton held up a Phoenix flight for 20 minutes so he might have a little chat with Attorney General Loretta Lynch.  9 days later, she would decide not to file charges against Hillary Clinton
  • 8. New attacks on October 28 lead to new actions on the 29th (ongoing!)  FBI Director announces out of the blue that he was looking into a potential new batch of messages from her private email server.  Clinton responds quickly and sharply, questioning his motives 11 days from the election, calling it “strange and …deeply troubling.”  By Saturday, she is vocal, accusing the director of smearing with innuendo late in the race and violating Justice Department Rules  These rules establish guidelines advising against such actions so close to an election.
  • 9. The Weiner link  It just so happens that Congressman Anthony Weiner, known for his sexting failures on Twitter, has a wife who happens to be a long time Hillary aide, Huma Abedin.  These new emails were found on Weiner’s computer, as it was being searched for sexually explicit messages with a teenager
  • 10. But we digress, how email works Some technical details
  • 11. What is an email server?  A server is a computer that handles and delivers e-mail over a network, usually over the Internet.  An email server can receive emails from their own “client” computers and deliver to other mail servers. It can also deliver emails to “client” computers only  Think of an email server as a neighborhood mailman. Without email servers, you could only send email to those in your domain (gmail.com, outlook.com)
  • 12. Types of mail servers  Two types of mail servers: Outgoing mail servers and incoming mail servers.  Outgoing mail services are known as SMTP (Simple Mail Transfer Protocol servers)  Incoming mail servers can be POP3 (Post Office Protocol, Version 3, best for storing send and archived messages on PCs local hard drive) or IMAP (Internet Message Access Protocol) store copies of messages on servers. Since most POP3 servers can also store messages, it is more convenient than IMAP
  • 13. Sending an Email 1. You compose the message and hit send. 2. Your email client (Outlook Express, Gmail, etc.) connects to your domain’s SMTP server. giving it your email address, the recipient’s email address, the message body and attachments 3. The SMTP server processes the recipient’s mail address. If it is the same domain, it is sent directly to the domain’s POP3 or IMAP server. 4. If the domain is different, the SMTP will have to communicate with other domain servers Continued…
  • 14. Sending an email: next steps 6. The sender’s SMTP server has to communicate with the DNS (Domain Name Server). The DNS takes the email domain name and translates it into an ip address. NOTE: If the DNS server is down (as happened with the recent Cyber Attack), the emails will be lost (can’t find their domain). 7. Although technically the SMTP server knows the address, and therefore the SMTP server that hosts this domain, the message may be routed along a series of unrelated SMTP servers 8. The recipients SMTP server scans the message. If it recognizes the domain and username, it forwards the message along the POP3 or IMAP server. It is then put in a sendmail queue until the recipient’s email client allows it to be downloaded, where the message can then be read by the recipient.
  • 15. It looks like this:
  • 16. Email clients  Yahoo mail and Gmail are examples of web-based email clients. In this case, you are using a Webmail client, which is accessed through your Web Browser.  If you are using a specialized program NOT on the web, like Microsoft Outlook, and Thunderbird, you are using a specialized email client. You will use software to read and send emails from your computer. Unlike web-based, your emails are stored on your computer. You can also read messages you have already received without Internet connections.  Hillary Clinton had a Private email client.  The email process is complex. There are programs, such as Postfix and Microsoft Exchange that facilitate the email process behind the scenes. This is a useful program when you host your own server.  It is thought that Hillary Clinton was using Microsoft Exchange as her email program.
  • 17. Security in the email server  Encryption helps protect messages from interception or alteration.  Mail servers use the TLS (transport layer security) protocol to encrypt ingoing and outgoing channels  These mail servers have a special code, known as a certificate. Email software and servers will check for this to verify the server’s identity.  You may sometimes see that a site does not have a valid certificate. Proceed with caution.  Although most servers pay a certificate authority for a certificate, some smaller ones sign their own. Clinton’s server probably used a self-signed certificate, which is a security risk.  Another thing that she may have been lacking is message level encryption, which is built into the email client software.
  • 18. Questions:  What are some differences between using a private email server and a web based server?  How is an email server similar to a postman?  What does the DNS (domain name server) do?  What is a certificate?