From the Associated Press:
(ST. LOUIS) — Over the months, Hillary Clinton misstated key facts about her use of private email and her own server for her work as secretary of state, the department’s inspector general reported this week.
According to the findings, she claimed approval she didn’t have and declined to be interviewed for the report despite saying: “I’m more than ready to talk to anybody anytime.” Scrutiny of her unusual email practices appeared to be unwelcome, despite her contention those practices were well known and “fully above board.”
A look at some of Clinton’s past claims about her unusual email set-up and how they compare with the inspector general’s findings:
CLINTON: “The system we used was set up for President Clinton’s office. And it had numerous safeguards. It was on property guarded by the Secret Service. And there were no security breaches.” — March 2015 press conference.
THE REPORT: Evidence emerged of hacking attempts, though it’s unclear whether they were successful.
On Jan. 9, 2011, (asterisk)an adviser to former President Bill Clinton notified the State Department’s deputy chief of staff for operations that he had to shut down the server because he suspected “someone was trying to hack us and while they did not get in i did.,nt (sic) want to let them have the chance to.”
Later that day, he sent another note. “We were attacked again so I shut (the server) down for a few min.”
The following day the deputy chief emailed top Clinton aides and instructed them not to email the secretary “anything sensitive.”
Also in May 2011, Clinton told aides that someone was “hacking into her email,” after she received a message with a suspicious link, the new audit report said.
The Associated Press has previously reported that, according to detailed records compiled in 2012, Clinton’s server was connected to the internet in ways that made it more vulnerable to hackers. It appeared to allow users to connect openly over the internet to control it remotely.
Moreover, it’s unclear what protection her email system might have achieved from having the Secret Service guard the property. Digital security breaches tend to come from computer networks, not over a fence.
You can read the rest of the story here.