Rush Limbaugh

For a better experience,
download and use our app!

The Rush Limbaugh Show Main Menu

Listen to it Button

RUSH: Now, Mrs. Clinton. This is a fascinating little addendum to the server story. As you know, ladies and gentlemen, I’ve made a note many times here that my hobby is staying abreast with gadgets, high-tech. And it’s now become even more than that. Now it has become a way that I study the social-political trends of Millennials, ’cause most of the tech blogger community fits into that demographic.

And it’s fascinating to read what they write, to listen to the things that they say, because they’re like all young people, they think they know it all. They think they know everything, and the older people don’t know beans, they’re old-fashioned, they’re squirts, they’re just to be tolerated. But the young are hip, and the young are cool, and the young know what’s what and what’s not.

I remember when I was that age, and I remember the humility I had. I always, when I was that age, I never thought I knew more than people older than I. Exceptions, of course. I mean, if you’re around somebody that’s been an idiot all their lives and doesn’t know anything, but as a general sense, I always had enough humility and respect for older people. To me, they were resources for advice, knowledge, and learning and so forth.

This group, I don’t think that’s the case so much. But I found this piece interesting because this is from the Dvorak News Blog. It’s by a guy named Mark Perkel. And he has outlined how Mrs. Clinton left her e-mail wide open to anyone. He spends his entire post here documenting how absolutely risky and silly and dangerous Mrs. Clinton’s home server setup was, and at the end of it says he would still vote for her because the Republicans suck.

Now, let me give you what’s in between. The reason that her e-mails were, for a time — and, by the way, he’s right — for a time her e-mails were wide open. There was nothing secure or encrypted about them. It works this way. “Not often do we break news on Dvorak News but today we do. Hillary Clinton used a spam filtering service MxLogic to filter her spam and viruses. What this means is — employees at MxLogic, now owned by McAfee — had full access to all her classified state department email in unencrypted form.” And then he provides links to the MX records for clintonemail.com for the various domains.

Now, we were talking the other day because somebody asked me, “Hey, could I have a home server, could I set up my own email like Mrs. Clinton?” Yeah, anybody can, because any computer can be made into a server for all intents and purposes. A server is just a hard drive. It’s the software that makes the server, but if you do that, you’re taking on everything, you’re taking on the SSL security, you gotta pay for the security of the sockets, you gotta do all the spam filtering. If you’re gonna run your the e-mail, you gotta buy a domain.

So if you want your own e-mail address rather than go through iCloud or Gmail or Yahoo or AOL or whoever, if you want to have your own domain, then you’ve gotta do your own spam filter, you have to do everything yourself, which means, in Mrs. Clinton’s case, you have to go hire somebody to do it, ’cause she doesn’t know this stuff, and Bill doesn’t know this stuff. She did this for utter privacy. We know she did this for privacy. She did this precisely and specifically to avoid oversight. And we know this because James Carville admitted it.

This is not even a matter of speculation anymore. Carville admitted it Sunday on This Week on ABC when he said, “Well, I imagine she didn’t want Louie Gohmert looking through her e-mails.” Here, listen to the sound bite. This is how it happened Sunday morning, ABC’s This Week with George Stephanopoulos.

CARVILLE: It was something that she did, it was legal. I suspect she didn’t want Louie Gohmert rifling through her e-mails, which seems to me to be a kind of reasonable position for someone to take. So it amounts to — just like everything else before it, it amounts to nothing but a bunch of people flapping their jaws about nothing.

RUSH: Right. But that’s not what it is. It’s not flapping their jaws about nothing. She set up this private server specifically to avoid any oversight by either the State Department where she worked, or Congress. And that’s not legal, despite what Carville says.

Now, I maintain when I played this sound bite yesterday, I maintained that the Carville of 20 years ago would not have made this mistake. If this were the 1990s, which the Clintons still clearly think it is in the terms of the way they can strategize and beat this stuff, Carville would have never given up the ghost this way, and everybody knows that he did. We had a little montage from yesterday and last night, Ron Fournier, Mark Halperin, it’s a whole bunch of people commenting, as I did yesterday, on what you just heard Carville say.

RON FOURNIER: What Carville did is give up the goods. He gave up the goods. He sold her out.

MARK HALPERIN: Carville says he suspects Hillary Clinton withheld the e-mails because she didnÂ’t want Congressional oversight.

SAM STEIN: What Carville essentially said was she was doing this to hide stuff.

ANDREW NAPOLITANO: Jim Carville is apparently saying don’t believe what she said last week.

ED HENRY: James Carville revealed a truth.

ANDREA MITCHELL: James is saying it wasn’t convenience. With friends like that (laughter) you don’t need Ken Starr.

RUSH: And that last voice, of course, Andrea Mitchell, NBC News, Washington. So everybody agrees Carville blew it by admitting that what Mrs. Clinton was doing with a private server was hiding. She did not want congressional oversight. She didn’t want anybody to be able to see what she was doing, and there are any countless reasons for that. She is soliciting donations for the Clinton Family Foundation, from foreign governments, from foreign businesses, for who knows what purpose down the road.

I’m telling you, I tell you today as I told you yesterday the Democrats are flat-out nervous as they can be about that. They don’t care that she had a private server. They can handle that. They don’t care that she didn’t want Louie Gohmert reading e-mail. They can handle that. They got the media on their side. If that’s all this was, no sweat. The problem is all of that money that she was soliciting. The problem is all of those donations that she was soliciting for the Clinton Family Foundation. Now that we know, in some cases from who and how much, I mean, it leads to clear conflict-of-interest problems.

Ron Fournier is back again today with yet another piece on how damaged Hillary is and how precarious her position is and how the Democrats are scared to death. You know, I’m beginning to wonder, Ron Fournier’s had six or seven pieces on this now. And I’m beginning to think he may know something that has yet to surface about this, ’cause, I mean, he’s not pulling any punches. He’s not saying “if this and if that, then she could be…” He’s saying flat-out the Democrats are scared to death about the foundation.

But before we get to that, let’s go back to this e-mail business and despite the fact she did this to keep it from everybody, that she was hiding, she didn’t want anybody to see her e-mails, she inadvertently made it possible for every one of those e-mails to be disseminated publically. Didn’t happen, but she made it possible by virtue of her choice. She hired a spam filtering service.

Now, you have an e-mail account say at Gmail or iCloud, I don’t care where it is, they provide the spam service for you. It’s the junk filter, and you can turn it on, and you can change the sensitivity. The risk is that a bunch of stuff you need is gonna be determined as junk or spam and it’s gonna be sent off to the junk or spam folder, and if you don’t regularly check what’s in there, you may miss something important.

So spam filters are actually very precise things. You can enhance or decrease the sensitivity. If you decrease the sensitivity, you’re gonna get a lot of junk in your inbox that’s gonna clog it up and frustrate you. You’ll have to manually put it in another folder. You can increase the sensitivity, but a professional spam filtering service allows you to designate. You get an e-mail that’s spam, you can designate the incoming e-mail address to the spam filter and anything ever again arriving with that e-mail address automatically goes there.

Spam filtering services are good, bad, better, best, it’s just depending on what you want to pay for and who you want to buy and how detailed with it you want to get, but it’s something you have to do if you are going to set up your own server in your basement like the Clintons did in Chappaqua or wherever the heck it was.

In her case, the filtering service she used is MxLogic. What happens, in a nutshell, is that all e-mail is encrypted, both sent and received, but when the spam filter gets it, the spam filter decrypts it and this all happens in microseconds, by the way. The spam filter gets the e-mail, decrypts it, searches it, scans it, determines what its state is, then reencrypts it and sends it on.

Now, there are human beings that work at these spam filtering services, and every e-mail that comes in is, for a time, decrypted. And anybody working at the spam filtering service — not anybody, but certain people, certain clearances — could have access, in this case, to every e-mail that arrived on Mrs. Clinton’s server. I mean, it’s just part and parcel of the process. So if you’re Mrs. Clinton right now, if you’re Bill Clinton, if you’re Huma, if you’re anybody that had an address on that server, you don’t know, you can’t be sure that some of those e-mails haven’t been seen. You can’t be sure that some of those e-mails weren’t copied. You can’t be sure that some of those e-mails weren’t saved and are being held for potential later user.

The odds are it didn’t happen, but that’s not the point. The point is it’s entirely possible because it does happen. The e-mails end up decrypted for a time while the spam filter — I’m really shortening the process here of explanation. But basically mail comes to your server from the Internet and then is decrypted and goes through the spam filter. After the spam filter finishes with it, it’s then reencrypted and sent to your server. So, the point is, it does not arrive first at your server. It goes to your spam service first. And depending on who’s at the spam service and depending on how curious they are, and depending on a whole bunch of human characteristics and factors, people at the spam service could have no interest and not care. Or you could have some, “Hey, this is Hillary Clinton’s e-mail, wow, wonder what…” Anything is possible. That’s the point.

This is one of the reasons why they have rules in government that you use their servers, because they control all of this. They own the spam service. They own every aspect. E-mails from the time they hit the Internet to the state employee’s server, it never leaves government control. And that’s why the rules are in place. In Mrs. Clinton’s case, her e-mails made a stop before they got to her server, and at that stop they were decrypted, they were plane text English, anybody could have read them. So the point is they weren’t secure. She’s doing all this ostensibly for security and privacy, keeping it away from prying eyes. And we also know that she was doing this to avoid congressional oversight.


RUSH: So here, ladies and gentlemen, is the bottom line regarding Mrs. Clinton and her servers and all this. While that e-mail, after it comes from the Internet to the spam service — in Mrs. Clinton’s case, this is McAfee, they own the spam service MxLogic — while that e-mail is at the spam service being investigated for spam, anybody who works at the spam service who has access to the spam filtering system can read any e-mail coming in to Mrs. Clinton’s domain. Which means that, say, Vladimir Putin could bribe somebody at this spam service to send him anything that mentions him or Ukraine or whatever, Iran, whatever he wants.

If somebody at the spam service works actually at the filtering system — spam services have a lot of employees who do a lot of things, but somebody’s involved in the actual filtering system when the e-mail’s decrypted, they can tap on it, they see it in an inbox just like you have it, tap and read any e-mail going to the Clinton address, the domain, and that means that any employee there would be subject to being bribed. Or it may not be an employee, could just be a plant.

The point is, Mrs. Clinton’s e-mails — and we know official e-mail having to do with her secretary of state duties arrived on her server. The point is before it got to her server it went through her spam filtering service, and while it’s there it’s decrypted, and anybody in the actual filtering department at the spam service company could tap into it and read it and then forward it on to, say, a Putin or a Yang Ying Lang or whoever. It’s possible, is the point.


RUSH: Now, just one thing before we go back to the phones, ladies and gentlemen. The little tech blogger who provided much of the information I just passed on to you regarding McAfee, Mrs. Clinton’s spam filter and how it all works — and, by the way, this company, McAfee was hacked by a bunch of white hat hackers back in March 2011. A white hack hacker is a hacker that hacks something to help the hacked find out how they can be hacked and cover it up.

A white hat hacker is somebody that exposes vulnerabilities in assistance in helping people close them. A black hat hacker is a criminal. So white hat hackers released a report that they had identified serious vulnerabilities to security at McAfee.com, this company that owns Mrs. Clinton’s service, 2011, this is when this thing was up and running. There were vulnerabilities in the spam server company she was using, and they pointed out flaws that could have led to information disclosure and other issues.

Anyway, the little tech blogger who I just want to read the end of his post here. “What email went through this system that could have been tapped? Emails about Libya, Syria, Egypt, Israel, Putin, ISIS, the Bin Laded raid, and ChelseaÂ’s wedding guest list! OMG!”

Shouldn’t the secretary of state of the United States use a server that isn’t weak? And then, “I have been a Clinton supporter. If sheÂ’s the candidate I would still vote for her in the general election over any Republican. But in the primary – I still dream of Elizabeth Warren, but IÂ’ll settle for Biden. And isnÂ’t that just a little sad. … The bottom line – none of this would have happened if she had just played by the rules.”

See, this what I mean by they think they’re smarter than everybody else. This is someone who’s been totally exposed as a fraud, as somebody trying to act in secret and botching it big time, exposing her work to vulnerability and who knows what kind of danger, and the guy says, “I’d still vote for her over any Republican.” Yuk. And they think they’re smart. They think they’re the brightest people out there.


RUSH: Mark in Pittsburgh, you’re next. Great to have you on the EIB Network. Hello.

CALLER: Mega happy St. Patrick’s Day dittos to you. My question about the server is, how do you know the e-mail was encrypted? I’ve got 20 years’ experience in running e-mail servers. I own a small ISP, and you don’t have to encrypt to send and receive e-mails. You can receive e-mails from port 110. That’s not encrypted. That’s always open.

RUSH: No, they —

CALLER: Own your own e-mail server, you have a dedicated connection, so you’re allowed to send out on port 25.

RUSH: Talking about the spam filtering service —

CALLER: No, no. I’m talking about the actual machine itself, the e-mail server itself. You know, it’s either gonna be a Linux box, UNIX box or Microsoft Exchange Server.

RUSH: I’m talking about what happens to e-mail before it gets to her server.

CALLER: What I’m saying is the e-mail itself can be sent unencrypted by the server because the server supporters it. I mean, you don’t know if she is sending the mail encrypted. You have to set up your e-mail client, and even then the e-mail server may send out on port 25 by default. You’d have to change that physically.

RUSH: Well, that’s all academic. The point is what happens at the spam server. She did not have her own spam server software. She hired it third party and it was there, supposedly, ostensibly, that the e-mails coming from the Internet before getting to her server were decrypted and sent through the spam filter. It happens in microseconds, understandably, but if somebody is there at the time and is in that part of the company where they’re doing the filtering, they could have access to the decrypted e-mail that’s coming in. That’s the whole point. We don’t know that it happened.

The point of this is that while Mrs. Clinton was doing all of this to stay hidden and to avoid detection, the fact is that she ran the risk of having every e-mail she received or sent being exposed, potentially. Don’t know that it was. But she defeated her own purpose here by virtue of the way she had things set up, according to the tech gods that have looked into her server setup and what she had running. They’ve accessed it themselves.


RUSH: Fortune magazine, March 11th. Are you ready? By the way, folks, I’ve got a bunch of stuff here that has nothing to do with Hillary, and I’m hell-bent on getting to it today, so I’m gonna have to take a break from Hillary stuff to get some of this other stuff, then go back to the Hillary stuff, ’cause I’ve got some audio sound bites furthering the idea the Democrat Party is nervous as it can be. They’re nervous over the money, the foundation, that Clinton was soliciting while she was secretary of state with this non-secure private server in the backyard, wherever it was.

But Fortune magazine, March 11th issue: “For 3 Months Hillary ClintonÂ’s Email Access Was Unencrypted, Vulnerable to Spies — Venafi, a Salt Lake City computer security firm, has conducted an analysis of clintonemail.com and determined that ‘for the first three months of Secretary ClintonÂ’s term, access to the server was not encrypted or authenticated with a digital certificate.'” That’s not even legal. Well, it’s not a matter of being legal, but, for crying out loud, I had to just cough up like $1,600 bucks last week for the certificates for the next year on our servers. Don’t think you can get into ’em, either, ’cause you can’t. We’re not the Clintons here.

I mean, this is incredible here. For the first three months, secretary of state access to the server was not encrypted or authenticated with a digital certificate. In other words, for three months Clinton’s server was wide open to snooping, hacking, and spoofing. “Without a proper digital certificate to stop them, bad actors can easily wedge themselves between users and the machines theyÂ’re attempting to access on a network and, in so doing, collect private information, and possibly even steal credentials such as usernames and passwords. Digital certificates — known more technically as X.509 certificates.”

That’s why you don’t want to do this at home, folks. You have to do all this yourself. If you go someplace for your e-mail, all this is done behind the scenes on the back end, you don’t even see it, you don’t even know about it. In Hillary’s case she did this herself with her server in the backyard probably out by the swing set for the upcoming grandkids. Hell, who the hell knows. She relied on her IT guy to do all this. Do you think she has the slightest idea what any of this is? She just says, “I need e-mail, I need it private, I don’t want anybody to ever be able to see it.” Guy goes to town, does whatever, and she has to trust him.

So, I mean, for the first three months that she was secretary of state her e-mails were not encrypted at all. But even after that, after they became encrypted, when they went to her spam service, they were decrypted so that the spam program can do its work. The spam filter can’t work on encrypted e-mails. Well, that’s not entirely true, either. I don’t want to get too in the weeds on this stuff. Folks, the bottom line is, she was wide open here. Her e-mails, her server was wide open at any number of points along the way.

Pin It on Pinterest

Share This