, according to Thomas Rid , a cybersecurity expert . " One of the most convincing details to me is how quickly this hacker apparently came out with this pretty sophisticated false flag operation , including leaking files and talking to various media outlets . It 's too smooth for one hacker , " Rid , who is a professor in the Department of War Studies at King 's College London , told me in a phone call on Thursday .
Make no mistake , there are more than a few senior intelligence officials in Washington , DC , who are livid about Hillary Clinton ’s willful disregard of clearly defined laws on the handling of classified information . Her misconduct endangered sensitive intelligence programs — and lives . Even if Comey is a sacrificial lamb here , there are high - ranking spiesgovernment.spy.spywho are perfectly willing to leak the sordid details of EmailGate to the media if the president pulls a Dick Nixon and tries to subvert our Constitution to protect himself and his designated successor . And in the unlikely event that nobody in our nation ’s capital is willing to go public with exactly what Hillary Clinton did , it now seems the Russians may do so . It ’s highly plausible that Russian intelligence services , among others , have many of Clinton ’s emails , perhaps all of them , given how slipshod her security arrangements were .
If Clinton ’s case does n’t clear that bar , it would be difficult for the Obama Justice Department to explain why she merits prosecution . This is n’t to excuse her conduct ; it ’s just a diagnosis of the way the law works . In political terms , a bigger danger to Clinton may be the counterintelligence question : Did spiesgovernment.spy.spyfrom China , Russia or some other country penetrate her server ? If so , some voters might conclude that poor judgment should disqualify Clinton for the presidency . Clinton may want that part of the investigation to take as long as possible .
For example , Democracy Now reported after the DNC Leaks ( resulting in the resignation of Debbie Wasserman Schultz and other DNC officials ) that “ WikiLeaks has not revealed the source of the leaked emails , although in June a hacker using the name Guccifer 2.0 claimed responsibility for the hacking into the DNC ’s computer network . ” Someone hacks into a computer network , or acquires the information , then gives this information to WikiLeaks . Clinton ’s cavalier attitude regarding classified data has likely trickled down to the various institutions hacked by either Russian hackers , or hackers from other nations . First , Clinton ’s private server at the State Department was unencrypted according to a Fortune article titled For 3 months Hillary Clinton ’s email access was unencrypted , vulnerable to spiesgovernment.spy.spy: Security firm Venafi has found that Clinton ’s email server may have been open to foreign intelligence snoops when traveling abroad … Venafi , a Salt Lake City computer security firm , has conducted an analysis of clintonemail.com and determined that “ for the first three months of Secretary Clinton ’s term , access to the server was not encrypted or authenticated with a digital certificate . ” In other words : For three months , Clinton ’s server lay vulnerable to snooping , hacking , and spoofing .
CrowdStrike found no evidence of collaboration between the two intelligence agencies inside the DNC 's networks , " or even an awareness of one by the other , " the firm wrote . This was big . Democratic political operatives suspected that not one but two teams of Putin 's spiesgovernment.spy.spywere trying to help Trump and harm Clinton . The Trump campaign , after all , was getting friendly with Russia . The Democrats decided to go public .