FBI Admits Clinton Used Software Designed To “Prevent Recovery” And “Hide Traces Of” Deleted Emails –
South Carolina Representative Trey Gowdy appeared on Fox News today and disclosed new details about the Clinton email scandal that seem to indicate intent to destroy evidence. Per the clip below, Gowdy reveals that Clinton used “BleachBit” to erase the “personal” emails from her private server.
For those not familiar with the software, BleachBit is intended to help users delete files in a way to “prevent recovery” and “hide traces of files deleted.” Per the BleachBit website:
Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery,wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster.
During his appearance on Fox, Gowdy clearly indicates that Clinton’s use of BleachBit undermines her claims that she only deleted innocuous “personal” emails from her private server.
“If she considered them to be personal, then she and her lawyers had those emails deleted. They didn’t just push the delete button, they had them deleted where even God can’t read them.
“They were using something called BleachBit. You don’t use BleachBit for yoga emails.”
“When you’re using BleachBit, it is something you really do not want the world to see.”
Gowdy also questioned whether Hillary considered “Clinton Foundation” emails to be “personal” and, if not, asked why the FBI’s investigation revealed minimal emails about Foundation-related topics.
https://www.youtube.com/watch?feature=player_embedded&v=WTC9DwgFseY
So Dear Reader, we leave it to you to decide whether – like FBI Director Comey – you see no “intent” to hide or obfuscate any of the deleted emails; or – like Rep. Gowdy – you see the facts as proving Hillary Clinton’s intent to ensure no trace was left of these harmless emails about yoga routines or wedding plans.
The IT team for presidential candidate Hillary Clinton used the open source cleaning software BleachBit to wipe systems “so even God couldn’t read them,” according to South Carolina Rep. Trey Gowdy on Fox News. His comments on the “drastic cyber-measure” were in response to the question of whether her emails were simply about “yoga and wedding plans.”
Rep. Gowdy told Fox News:
She and her lawyers had those emails deleted. And they didn’t just push the delete button; they had them deleted where even God can’t read them. They were using something called BleachBit. You don’t use BleachBit for yoga emails or bridemaids emails. When you’re using BleachBit, it is something you really do not want the world to see.
Palancar concluded, “Bleachbit stifles investigation” of Hilary Clinton.
Perhaps Clinton’s team used an open source application because, unlike proprietary applications, it can be audited, like for backdoors. In response to the Edward Snowden leaks in 2013, privacy expert Bruce Schneier advised, “Closed-source software is easier for the NSA to backdoor than open-source software,” in an article in which he stated he also uses BleachBit. Ironically, Schneier was writing to a non-governmental audience.
Last year when Clinton was asked about wiping her email server, she joked, “Like with a cloth or something?” It turns out now that BleachBit was that cloth, according to remarks by Sen. Gowdy.
@ThreatcoreNews compared the situation to the 18 minutes of audio erased from tapes from President Richard Nixon’s Oval Office.
Jonathan Zdziarski quoted on CNN.com argued, “Someone trying to cover their tracks would likely pay for and use a much more expensive, specialized data destruction tool,” but commercial tools leave a money trail.
As of the time of writing BleachBit has not been served a warrant or subpoena in relation to the investigation. BleachBit is free of charge to use in any environment whether it is personal, commercial, educational, governmental, Republican, or Democrat. The cleaning process is not reversible.
Immediately when the story broke the morning of August 25, traffic to the BleachBit web site and download servers spiked. As the story went viral on Twitter, a second, larger wave of traffic came to the site. The new servers are fully handling the loads.
See also the article: How to Delete Secret Emails from Microsoft Exchange Server .
Members of the press: please see the press center.