John Schindler deconstructs the Gray Lady’s attempt to whitewash:
At the National Security Agency—where I used to work as a senior intelligence analyst, including as the technical director of NSA’s largest operational division—what outsiders call hacking is handled by a shadowy group called Tailored Access Operations that gets at the hard targets requiring actual cyber-break-ins. TAO are probably the best hackers on earth, but Russia and China are no slouches either, as demonstrated by their repeated infiltrations into protected U.S. Government computer networks in recent years.
However, unencrypted IT systems don’t need “hacking”—normal SIGINT interception will suffice. Ms. Clinton’s “private” email, which was wholly unencrypted for a time, was incredibly vulnerable to interception, since it was travelling unprotected on normal commercial networks, which is where SIGINT operators lurk, searching for nuggets of gold.
They hunt for data with search terms called “selectors”—a specific phone number, a chatroom handle, an email address: here Ms. Clinton’s use of the “clintonmail.com” server was the SIGINT equivalent of waving a huge “I’m right here” flag at hostile intelligence services. Since the number of spy agencies worldwide capable of advanced SIGINT operations numbers in the many dozens, with Russia and China in the top five, that Ms. Clinton’s emails wound up in the wrong hands is a very safe bet, as any experienced spy will attest.
The amount of ignorance on this issue spouted by her defenders is both staggering and terrifying.