If Hillary Clinton’s ‘homebrew’ server ever got the Mary Shelley treatment, IT specialist Bryan Pagliano would make a fine Dr. Frankenstein – FBI documents reveal new details about how he painstakingly created the machine over a series of months while working in a room along Washington’s storied K Street.
According to files released last Friday evening, Pagliano worked to design and build the now-infamous server inside a room once used as part of Clinton’s campaign headquarters. On the street known as Washington’s power corridor, Pagliano even used computer remnants from Clinton’s failed 2008 presidential bid, where he had worked as an IT specialist.
The story of how the server came into existence became clearer thanks to witness interviews known as 302s. Though they were highly redacted, the bureau files include new details Pagliano revealed in a June 24 interview with the FBI.
In that interview, Pagliano said it was longtime Clinton Foundation aide Justin Cooper who asked him to build the server “in the fall of 2008” and that Pagliano completed the work in early 2009. (Pages 155, 163)
After the server’s completion in the makeshift lab on K Street, Pagliano stated that he “rented a minivan and drove to Chappaqua New York to install the email server in the Clinton residence.”
Strikingly, Cooper also said in his March interview that Hillary Clinton “had Sensitive Compartmented Information Facilities (SCIF’s) in both her New York residence as well as her residence in the District of Columbia (DC).”
In his last interview with the FBI in June, Cooper suddenly remembered there were also two identical iMac computers inside what were supposed to be tightly secured rooms used to review classified materials. The interview states, “Cooper recalled a personally-owned iMac computer in the Sensitive Compartmented Information Facility (SCIF) of both the Washington, DC and Chappaqua, NY residences of Hillary Clinton.”
Cooper added he did not have the combination to open the SCIF and admitted: “The SCIF doors at both residences were not always secured.” This on its face is a direct violation of security protocol.
Cooper added further insight into close aide Huma Abedin’s access to the SCIFs by stating “Abedin was frequently there but did not know if Abedin could access the SCIF when it was secured.”
keyboard shortcuts: V vote up article J next comment K previous comment