Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Here’s how the FBI pieced together Hillary Clinton’s email

Forensics experts talk about how investigators were able to put Humpty Dumpty back together.

Hillary Clinton Addresses Nat’l Education Association Representative Assembly
Hillary Clinton Addresses Nat’l Education Association Representative Assembly
Alex Wong / Getty

FBI Director James Comey used a jigsaw puzzle analogy to describe how investigators pieced together Hillary Clinton’s email correspondence over the four years she served as secretary of state.

The process was more complicated than it appeared.

Clinton used several email servers and numerous devices during her tenure with the Obama Administration. As hardware was replaced, the older servers were taken out of service, stored and decommissioned in a variety of ways.

“Piecing all of that back together — to gain as full an understanding as possible of the ways in which personal email was used for government work — has been a painstaking undertaking, requiring thousands of hours of effort,” Comey said.

For example, one of the original servers had its email software removed. That didn’t obliterate the emails, of course. It just left millions of bits of information without any organizational structure, as if someone removed the frame from a giant jigsaw puzzle and dumped all the pieces on the floor, Comey said.

Investigators also found several thousand work-related emails that had not been among the 30,000 Clinton turned over to the State Department — some had been deleted over the years, but traces of them remained on devices.

FBI investigators were able to reassemble the pieces to determine whether the email contained classified information at the time it was sent or received. We talked with forensic experts about the process of putting Humpty Dumpty back together again.

Rene Novoa, an expert in forensics and “eDiscovery” at DriveSavers Data Recovery, said Clinton’s systems administrators appear not to have wiped the email servers — a process of overwriting the data with random characters or zeros to make the information unintelligible.

“One wipe of the system, done correctly, can permanently overwrite [the data],” said Novoa. “If they got that much data back, that tells me it wasn’t a secure wipe.”

Recovering emails involves combing through the server’s hard drive, looking for files with telltale signs (technically speaking, the headers) that identify the bits as email. Deleted files wind up in unallocated space that’s invisible to the user, but still there — until another file writes over it, like a fresh coat of paint.

“You use a technique called file carving, which is a fancy way of saying you’re looking for files inside the haystack,” said Jonathan Zdziarski, an independent security researcher. “You don’t have any directory structure at this point.”

Forensics experts can pull together strings of information to determine whether a particular piece of Clinton’s electronic correspondence deals with confidential information or a personal exchange about flowers at Chelsea’s wedding.

The time required to do this depends on a number of variables — including the capacity of the server, the file system, encryption and the software used.

“Most server software will store all of the messages inside a container, like a mailbox file,” Zdziarski said. “Some spit up headers and body and do funky things with the way it stores the content. That can get trickier.”

The political stakes of this particular forensics exercise gave it a high profile. But corporations increasingly rely on such techniques to monitor employees, for instance in the days or weeks leading up to termination to ensure a disaffected worker isn’t giving confidential information to a competitor.

This article originally appeared on Recode.net.

See More:

More in Technology

Technology
The case for AI realismThe case for AI realism
Technology

AI isn’t going to be the end of the world — no matter what this documentary sometimes argues.

By Shayna Korol
Politics
OpenAI’s oddly socialist, wildly hypocritical new economic agendaOpenAI’s oddly socialist, wildly hypocritical new economic agenda
Politics

The AI company released a set of highly progressive policy ideas. There’s just one small problem.

By Eric Levitz
Future Perfect
Human bodies aren’t ready to travel to Mars. Space medicine can help.Human bodies aren’t ready to travel to Mars. Space medicine can help.
Future Perfect

Protecting astronauts in space — and maybe even Mars — will help transform health on Earth.

By Shayna Korol
Podcasts
The importance of space toilets, explainedThe importance of space toilets, explained
Podcast
Podcasts

Houston, we have a plumbing problem.

By Peter Balonon-Rosen and Sean Rameswaram
Technology
What happened when they installed ChatGPT on a nuclear supercomputerWhat happened when they installed ChatGPT on a nuclear supercomputer
Technology

How they’re using AI at the lab that created the atom bomb.

By Joshua Keating
Future Perfect
Humanity’s return to the moon is a deeply religious missionHumanity’s return to the moon is a deeply religious mission
Future Perfect

Space barons like Jeff Bezos and Elon Musk don’t seem religious. But their quest to colonize outer space is.

By Sigal Samuel