comparemela.com

The new device i would interface with mr. Pagliano. Rep. Mica did you ever talk about this acting the destruction of a device, did he participate in the destruction of any device . Mr. Cooper no. Rep. Mica are you aware of what happened to his emails . Mr. Cooper he serviced the server. Rep. Mica you set it up and you confirmed with him. Set itper mr. Pagliano up and i was the interface between the users rep. Mica would he have had any emails on the servers . And you have no idea what would have happened to all of his emails . Mr. Cooper i certainly do not. Rep. Mica you were made aware on two occasions to secret service, i think january 2011, that someone was trying to hack the system. Is that correct . Mr. Cooper i used that word to describe what was a series of false logins on the server. Rep. Mica not once but twice. Then you closed down the system briefly to deal with the situation. Mr. Cooper correct. Rep. Mica when were you First Contacted by the fbi . Mr. Cooper i believe it was august of last summer. Rep. Mica was that the first time you sat down with them . Or was that later . That was your first interview . How many times were you interviewed . Mr. Cooper three times. Rep. Mica could you give us the approximate dates . Last summer was the first mr. Cooper last summer, subsequently in the fall, and this spring. Rep. Mica were you offered any type of immunity agreement by the department of justice . Mr. Cooper i was not. Rep. Mica how long have you been represented by your current counsel . Mr. Cooper since my First Contact with the fbi. Rep. Mica and again, you have explained it was the clintons you paid for your counsel and up to that time, and the organization that was set up by the clintons. Mr. Cooper i am the only person who has paid for my counsel. Rep. Mica you pay for your own expenses, they have not pay for any . Mr. Cooper correct. Rep. Mica did you have any kind of a joint Defense Agreement with any other individual involved with the investigation . Mr. Cooper i have no such agreement. Rep. Mica finally, you stepped back from the daytoday activities with the clintons about the time of the transition, is that correct . As she left office . Mr. Cooper yes. Rep. Mica and pagliano took over. Mr. Cooper yes. Rep. Mica you were responsible for helping with the transfer, in fact, you walked her aide over the phone through taking information that they had in emails and archiving it, is that correct . Mr. Cooper at one point, i assisted Monica Hanley in setting up a laptop computer so she could create an offline archive of the emails. Rep. Mica to your knowledge mr. Cooper i do not know the outcome. Rep. Mica you do not know do you know, finally, whether there were attempts to delete any information that had been stored that was going to be transferred in archives . Mr. Cooper i have no knowledge of that. Rep. Chaffetz i recognize miss norton. Rep. Norton thank you, mr. Chairman. The fbi report, the average american with a matter involving ms. Clintons emails to rest for the average person. It was a tough report. And yet, i want to ask you, mr. Cooper, about one of those kernels. One of the most venal of the conspiracy theories to come forward out of that report follows in terms of testimony you gave and the report quotes you, and i take it you were under oath before the fbi . Mr. Cooper i was not under oath. Norton where it says you advised clinton and others, and im quoting a report, when they obtained a new mobile device, helping them back up the data from the old device before transferring it to the new thinking the new device with the clinton server. Mr. Cooper that is correct. Rep. Norton that quote is correct. The summary describes two instances, and here is where the conspiracy theories have been acted out in this house and the president ial campaign. That you recall two instances where you destroyed old mobile devices with a hammer, and mr. Trump claimed who would do that if it did not have anything to hide, and representative desantis picked up that rhetoric and said it obviously shows intent to hide something. Cooper, i want to directly ask you about the destruction of those blackberries. Was your purpose in destroying the old blackberry device ever to hide secretary clintons emails from being saved or disclosed from federal records laws . Mr. Cooper congresswoman, no, not in any way to destroy or hide any information at all. Speak to what would be considered federal records. In fact, the opposite would be the case. I was going out of my way to preserve all the information on those devices, transfer them to the new devices, and make sure the server rep. Norton that was going to be my next question. Before you destroyed them from one blackberry to another, did you transition the very same emails . From the old blackberry to the new one . Mr. Cooper the combination of the backup procedure and activating the new device. It would have ended up on the new device before we went and deleted, using the blackberry tools to wipe the device. You copied the content of the secretarys and loadeded it, it on a new device . Mr. Cooper that is correct. Rep. Norton during the course of the fbis investigation, did you realize you still had retained extra copy of the content of those old blackberry devices on your own machine . Did you provide that information to the fbi . Mr. Cooper in preparing to meet with the fbi and examining my files related to the server, i did describe some files that may have contained content related to this. I turned that content over to my attorneys, who worked with the fbi and the department of justice on capturing that material for their possession. Rep. Norton i take it that was to make the case that you did not intend to destroy the blackberries to hide anything. Mr. Cooper that is correct. Rep. Norton now the fbi has the information that was on every thele blackberry, including last blackberry. Mr. Cooper certainly they have the information for the ones i had backup files on. Rep. Norton in any case, it is from one blackberry to another blackberry with nothing lost in between. Mr. Cooper correct. Rep. Norton thank you very much, mr. Chairman. Rep. Chaffetz i now recognize the gentleman from tennessee, mr. Duncan. Duncan thank you, mr. Chair. Mr. Cooper, do you consider yourself to be an expert in the i. T. Field . Mr. Cooper no, i do not. Rep. Duncan do you think the state department should have had someone more qualified than you to oversee and protect secretary clintons servers from hackers . Mr. Cooper i was not working for the state department. I believe the server to be used by president clintons office. Secretary clinton had a personal account on that server. I cant i am not in a position to discuss what role of the government is on protecting that. Rep. Duncan on january 9, 2011, at 2 57 a. M. , you sent an email to secretary clintons top aide , huma abedin, explaining you had to shut down her server due to someone trying to hack it. How many times did you personally have to shut down the server to prevent it from being hacked . It wasper again, and the server that contains president clintons office and secretary clintons office. This was a series of failed logon attempts, which was brought to my attention on alert in my system. One of the ways to stop that was in the early operations of the server was to shut down the server for a period of time so that the attacks would cease. We would develop more sophisticated ways to filter those sorts of failed login attempts. Rep. Duncan do you know whether powering down the server is the typical way in the i. T. Community to protect against hacks . Rep. Duncan mr. Cooper i cannoto that. Rep. Duncan do you know what a brute force attack is . Mr. Cooper yes, a brute force attack, from my understanding, is a series of highfrequency failed logins using a variety of usernames and passwords. Rep. Duncan how many brute force attacks did you observe on the clintons server . Mr. Cooper i cannot say with any specificity how many had happened. They happened with some frequency of the last two and a half years while she was in office, but we developed systems to tamper these down. Rep. Duncan the term was frequency. Mr. Cooper some frequency. Rep. Duncan i yield my remaining time back to the chairman. Rep. Chaffetz mr. Cooper, how many people had access to the server . Mr. Cooper in terms of administrators . Rep. Chaffetz i want the whole universe. Administrators, users, behold it, the whole gambit. Mr. Cooper there were two people who had some administrative rights. Myself and mr. Pagliano. I cannot tell you exactly how many users there were over the lifetime of the server. But it was less than 20 people. Rep. Chaffetz was there a Remote Access login available . Mr. Cooper the only Remote Access for the server was for myself and mr. Pagliano. Rep. Chaffetz was it encrypted . Mr. Cooper i cannot speak to that. I cannot recall. Rep. Chaffetz you were running it mr. Cooper mr. Pagliano was running it. Rep. Chaffetz did it have dual authentication . Mr. Cooper i do not recall dual authentication. Has 20 oddtz it people who can do it, intermingled with the clinton foundation, Clinton Executive Services, did they also have access to that . Mr. Cooper i cannot say it is intermingled with the clinton foundation. Rep. Chaffetz you were being paid by them, right . There were people being paid either clinton foundation. Who were accessing the system, right . Mr. Cooper individuals who had multiple Job Responsibilities some people did do work for the clinton foundation, yes. Rep. Chaffetz did state department ever contact you or complain or issue any sort of concern . Mr. Cooper they did not have any concern. Mr. Cooper, i understand that in order to make secretary clintons private and secure the statertment department had to lower its own security settings at least temporarily to manage secretary clintons more insecure server. Did you know about the fact that she had this insecure server . Mr. Cooper that is not something i specifically know about. I read accounts of that, but i have no direct knowledge. Rep. Chaffetz we recognize the gentleman from massachusetts. Thank you. Thank you mr. Cooper for being here. Mr. Cooper, the fbi conducted a yearlong investigation that they did not find clear evidence that secretary clinton or her colleagues intended to violate the law in the handling of classified information and he went on to say that he did not see evidence that is sufficient to establish that secretary clinton and with the those with whom she corresponded, when they did it, knew that what they did was against the law. I know youre not a computer in his it is yearlong investigation, the fbi did have a number of technical computer experts on the team and it took about a year, and i want. O recite their conclusion this is director komi comey. He said with respect to potential computer intrusion, we did not find direct evidence that secretary clintons personal email domain was successfully hacked. The fbi investigation summary similarly stated parens analysis did not find evidence confirming that clintons email server systems or compromised why cyber means. Do you have any information that contradicts the fbi findings . Mr. Cooper i do not. Ok. Interviewed brian kegley on a brian pegliano, the expert on the server. When asked about the maintenance and security of the server, he stated there were no security breaches, but he was aware that there were many failed login attempts which he referred to as brute force attacks. Is that statement that i just is that consistent with your recollection . Mr. Cooper it is consistent. Did you take any steps to protect the server when there were these failed brute force, socalled, login attempts . Ano created mr. Pegli a couple of ways to deal with this, including blocking ip addresses manually and automatically. Additional steps were described. Im not sure if it was him who took those steps to improve the security of the server, including establishing secure socket layer certification and internet protocol filtering to block access from wouldbe hackers. Is that consistent with your recollection . Mr. Cooper that is consistent. That is all i have. Rep. Chaffetz we now recognize the gentleman from ohio. I had question for the guys who are not here, that i want to walk the committee through this. We set up the slide. This is an email we think either from one of those guys. I just want to read this. Look at the date, a lot of things happened before august 15. When they told us to cut the backups and have them confirm us for our records, we are starting to think this is covering up a lot of bad stuff. Writingted something in because they knew they were going to get thrown under the bus. We know they change the backup structure because look at the fbi report, page 18. Someoneills instructed who is redacted to modify the email retention policy on clintons clintonmail. Com email account. She wanted to get rid of anything after 60 days. Lets walk through some history. On the fbi report. July 2014, at at the request of cheryl mills, remotely transferring all Hillary Clinton andils to cheryl mills having atops are later bleach bit attached of them. Report, page 15, during the summer of 2014, cheryl mills is giving a head given a heads up by the state department that there is a letter coming requesting all Hillary Clinton emails. Jump forward to december. General mills requests the Network Change the retention policy on her account. What happened right before . What prompted this change . December 2, chairman of Benghazi Committee since a later a letter to David Kendall that says we just found out about this other account. The other account that three clinton has, we would like any emails related to the benghazi situation from that account. Of course right after that, they change the policy and Platte River Network is instructed to delete anything after 60 days. To the amazing month, the one the chairman cited, march 2015. They haveimes reports this one email account, this private server situation. Letter, a preservation and tell them to preserve everyone anything that might be relevant to the investigation. March 4, a subpoena. March 9, Platte River Network is put on notice about a preservation order. March 10, she does her press conference. First, thoseready two days there are Conference Calls with clinton and her lawyers and Platte River Network and on the 31st of that month, is when they take bleach bit to the hold on thing and they get rid of everything the whole darn thing and they get rid of everything. Now we have three guys one on helped mr. Cooper get it set up and took the fifth and got immunity and now we have two guys on the tail end. They did not work for the government, they take the fifth and at least one gets immunity. Go back to the date. August 2015. His guys are wondering we dont have anything in writing. We have been given all these instructions to change the backup, delete things and the race things and the race things. Erase things. That is why it is appropriate for the chairman to see if they would come in here to answer somebody questions. They will talk to the people who can put them in jail, but they wont talk to congress. They will talk to the justice department. They wont talk to us. We cant put them in jail. We just want to get answers for the American People and they wont talk to us. Ive never seen anything like this. No regular american can get away with a kind of behavior secretary clinton gets away with. Two standards and this is what is so wrong and this is why the hearings you are having and the investigation we are doing is entirely appropriate. Rep. Chaffetz we now recognize the gentleman from texas. Thank you and thank you mr. Cooper for being here and testifying before us. Im pretty geeky, so i will ask some geek questions. Had,erver the clintons this was not just a personal computer that everybody had. This is a computer running Business Class software that delivered and forwarded and stored email for dozens of people, is that correct . That is correct. Are you familiar with the people who have this type of equipment in their homes . Mr. Cooper that is correct. Do you know anyone that might have a server like that at home . Mr. Cooper i know some people. It is pretty rare. Are you familiar with what email software was running on the server . Mr. Cooper i do not recall specifically. He told the chairman that it was set up to do emails forwarding to mrs. Clintons blackberry. There were two servers that we are speaking about, and apple server in use for approximately from approximately june 2008 until march 2009. That server was originally set up for president clintons office staff had some Software Running on it. One was an email client and the other was a tool that was supposed to interface with library with blackberry. Does it forward like the verizon blackberry j way . Mr. Cooper i cannot speak to the software. The focus was transitioning her email address. She was simply receiving the messages in, not retaining them on that server. The later server functioned more like what you are probably used to in your day today, where there was a mailbox on that server that could be accessed. Was it opened up to where you could get your email from that server through a web client . Mr. Cooper i do not recall. I think depending on the user, we were customized, brian would help to customize what ports were open based on how that user was accessing. Did you require that users picking up their mail remotely use a secure client . Mr. Cooper i dont recall of the protocols were. What the protocols were. It could have potentially been in clear text. Mr. Cooper i did not turn those over to the fbi. There was an instance where we shared some logs with the secret service when we first experienced failed login attempts. You got a notice when there was a failed login attempts, but someone doing this brute force attack just entered a username and through random passwords right,nd if they got it you would not have gotten a notice, would you . Mr. Cooper i dont want to suppose. You only get notices of failed login attempts. You are notified every time somebody actually login. Mr. Cooper correct. So somebody could have gotten in and you would not have known it. Was there was there a firewall between the internet and this server, a piece of hardware between the server and the internet . Mr. Cooper i believe there was. Was there one with the apple server . Mr. Cooper i do not recall. We talked a little bit about mrs. Clinton going through a variety of blackberries. Were they all the same or did when the newp one came out that you want the latest and greatest . Mr. Cooper it is a little difficult for me to do a time warp into the sequences but blackberry was releasing new models quite frequently. Time, she would move to a newer device with her older device may have been a little bit older or failing. Mr. Cooper do you know security patches were regularly put on these servers. Having kept a server in my house for a while, i gave it up and moved over to an online hosting because it is next to impossible to keep up with the pace of security fixtures. Rep. Chaffetz we recognize the gentlewoman from wyoming. Im glad that we had a geek out because i cannot do that. I have a rancher. Im not as familiar with these technologies. I do know this as an average american, when it comes to technology. We do know that the Chinese Government hires people to hack by day and that those same hackers hack for hire at night. There are people who are innding every single day china, probably russia, other countries, trying to hack into the computers of the u. S. Government officials. Security is a constant problem in this country, especially for highlighted officials or appointed officials high elected officials or appointed officials. I do know that encryption can be used to help prevent that. Dual authentication, processes used to help prevent that kind of hacking. Me cooper, are you telling there was no dual authentication, no encryption, hadthe secretary of state no protection of our secrets when we all know that efforts are being made to hack people just like her in government . I cannot provide you with the details of what specific security functions were on the server. I know there were security functions and they called over time, essentially as technology evolved over time. I would agree that this is something we should all be concerned with, and i saw this again as there is a need to protect the privacy of individuals and their personal lives using their email. We also know that as members of congress, if we travel to a foreign country and we have a device with us, especially in russia, they tell you to wrap the devices in aluminum foil, so there is no transmission, and ofe seen televised examples secretary of state clinton using her Electronic Devices to communicate while she is all over the world, and now that we know that these servers and devices were scattered around in her home, and that there was some sort of management of colorado, how can people like me assure the American People that the information that was on those emails, some of which has been destroyed and is not available to us is not being sifted through, even as we speak by chinese hackers and Russian Hackers . What security does our country have by virtue of what looks to me like some pretty lackadaisical attitudes toward sensitive data, topsecret data, confidential data . Mr. Cooper i am not an expert in computer security. I understand some of the concerns you have expressed, but i have no expertise in that area. Second, i had no knowledge of the content and cannot verify that what the content was on this equipment and third, i have no specific knowledge of which countries secretary clinton chose or chose not to use her device. I yield back. Rep. Chaffetz before you yield back, youll to me for a second. I yield to you. Rep. Chaffetz you get huge brownie points for the committee for showing up and answering questions. I am grateful for your candid nature and expressing the idea that you dont have the expertise to even answer those questions as thoroughly as possible. The problem i have, again, i believe you are doing the best you can. Problem is, it is you, with no experience, no dual authentication, no encryption up against the chinese and the russians. That is what scares us. The cavalier nature in which this was set up, and some of the nations most sensitive and secure information, that is the concern. I will now recognize the derailment from the gentleman from vermont. Thank you very much. I have a few questions and a bit of a statement. Mr. Chairman, you are a good chairman, that i disagree about the excessive focus on Hillary Clinton. I want to give a little perspective. It is a legitimate investigation, but we had the omey who has a unimpeachable record as a prosecutor. He went through every single thing and email and came to the conclusion that there was no criminal conduct that there was no evidence that the email had been hacked, and he said it is not even a close call. Whether that email should have been set up, the private server, whether that was a mistake, there is a legitimate basis to inquire as to what happened, but weve done it in the fbi has i have a feeling that a little bit of this has to do with something other than the emails and it may have to do with something that is looming in november. One of the issues that i have as i listened to many of the questions of my colleagues is that they are essentially asking what witnesses to disprove a negative. My friend from wyoming was asking about the russian and the chinese trying to get into the email. They are trying they probably are trying to get into every department we have, the white house, the joint states of the joint chiefs of staff. That apprehension is wellfounded, but there is no way any of us can disprove or prove that they have ever gotten into the email of the secretary of defense or state, or the white house, or any of the house accounts. Questionstion of the that raises the apprehension that the chinese or the russians are making this determined effort to hack into accounts and focusing it all on Hillary Clinton acts as though that intentionality of the russians and the chinese does not apply across the board to anybody and everybody that has been government or may have access to information they want. Talking about mr. Cooper having the guts to come in here, thank you, but you cant prove or disprove any more than anyone else can whether the russians successfully penetrated anyones email account, let alone secretary clintons. Repetitionere is a of an initial assertion that somehow, someway, not only did secretary clinton make a mistake by having a private server, but ist in the insinuation is that she actually jeopardized secrets and there is a memory gap here because this committee omey inone that had mr. C here and he sat here i dont know how many hours, but he answered every question that we had. It was that exhaustive information investigation that he had and demonstrated at the fbi that there was no evidence of criminal violation and he saw no evidence that the emails had been penetrated. Whichs the basis upon many of us leave this committee, all of us are proud to serve on role that is beyond oversight and investigation. It is kind of at advocate advocacy. Do you have any indication, mr. Cooper, that any secret information has been taken by the russians, the chinese or any other actor . Mr. Cooper i have no indication. In all your discussions with your colleagues, has anyone else indicated that they had a shred of evidence that any National Security information of the United States was penetrated as a result of the Clinton Emails . Mr. Cooper i dont think i have had any conversations to that effect. Is it a big deal for people to change their devices . Mr. Cooper i think it is rather commonplace. I thank you and yield back my time. Rep. Chaffetz before the gentleman yields back. I appreciate the comments. Lets remember, we have multiple people pleading the fifth, afraid of criminal wrongdoing. We also have the fbi director, what are the questions was did you look at what secretary clinton said under oath . There are other equities we have in the destruction of documents and he said he did not look at any of that. He did not even look at that part. Gentleman andhe his yielding. We now recognize the gentleman from North Carolina. Thank you for your answers, mr. Cooper, as we look into this further. You set up a server for the sole relates to miss clinton, so that she could use a domain name and have those s, is thatmail correct . Mr. Cooper we set up just go servers, oath with the primary both with the primary purpose of servicing president clinton staff. You put her domain name on Service Emails on that server. Use i havenot a device that has a domain name that i own that i get emails that, and it is much cheaper for me just to have a server that does that. Why would you not have done that . We had the solution in place, so it was certainly an option. I think there were some appeals to this, in that the data was contained in one place. It was physically in a secure location, and i think that some of the tools that you or i may employ today, even with a personalized domain were not available at that time. In 2009 they were because i was using them. What you are saying is the reason to not have another youre getting advice from your counsel, will you hold the clock for a second . The other aspect of this is you made a conscious decision to put her email address on this server to keep it from being viewed by other people that might have a server. Is that your testimony . Mr. Cooper i was not the decisionmaker. Who was . Here is that whom aberdeen said she would prefer to have ms. Clintons email on a private server versus a server that would actually was actually managed by somebody else. Mr. Cooper that was communicated to me. That is eliminating because of that it illuminating case, that is the mr. Cooper this was a server that was already in existence for the use of president clintons office and it provided a convenient and what was intended to be a reliable solution for her personal emails. How many email addresses did she have . Mr. Cooper she primarily used one at a time. How many did she have . They have numbers behind it and everything else. Mr. Cooper if you count her at t email address, that is one and then two others on the clinton domain. As you are managing this, i guess the other concern that i have aave is did you blackberry Exchange Server on your server . Mr. Cooper there was. You had the Push Technology on your server. Mr. Cooper correct. Betweenthe discussion attorneyser and the and all of that happened in march, were you part of that discussion to clean and erase some of those emails from the servers . Mr. Cooper i was not part of those discussion. S. Is a commonplace when you have discussions about the racing emails to have an attorney on a discussion with a client . Is that common . I was in business a long time and that never happened with me. Mr. Cooper that is not something i could comment on. You have the ability to, your choosing not to you are choosing not to. Mr. Cooper have you ever been you the conversation personally . Mr. Cooper i personally have had no experience there. Said that you are paying for your attorneys fees here. Have you ever been reimbursed or have you ever had any potential reimbursement for fees for attorneys from anyone other than your own personal accounts mr. Cooper . Accounts . Mr. Cooper no. Do you anticipate any reimbursements . Mr. Cooper now. No. I want to begin by saying how shameful it is that so many of our witnesses are no longer here. Frankly, the appearance that they could care less about our National Security and are less concerned about defending our country than they are in either being absent or pleading the fifth and it was brought up earlier that they are willing to meet with and talk with others, those who have the potential of prosecuting them. Who knows what possible deals have been made in some of those discussions, but they refused to meet with us and it begs the question what in the world are they hiding. I want to thank you, mr. Cooper for your willingness to be here with us and to provide some answers. Did secretary clinton at any time have more than one device e . Mr. Cooper i dont recall her having more than one email device. I have come to learn that at some points, she had some ipad devices that she may have used simultaneously. There is a possibility she had more than one device at a time . Mr. Cooper it is possible. You have referred to yourself as not being an i. T. Expert. At any time, did you consult Cyber Security experts when you were setting up the initial server . Mr. Cooper we consulted with apple and their Business Solutions program to set up the first server. Later, we consulted consulted with mr. Pegliano. Consult with any agency or department within the government . Mr. Cooper i did not. When you referred earlier to some of the hacks that were , did you report those hacks or potential hacks to the fbi or the secret service . Mr. Cooper as i mentioned earlier when we first experienced some of the repeated failed login attempts, they referred them to the secret service. Do you know if anything was done when it was reported . Did they come to investigate or search anything out . Mr. Cooper the secret service reviewed some of the logs from the server and made some recommendations about the possible origins of those failed logins and some techniques you might use. Did any of the agencies or other Cyber Security experts express any concern over this being a private server . Mr. Cooper not directly to me. So even when they came and did some investigation and research, that question was never brought up to you. Mr. Cooper correct. How does bleach network . Bleach bit work . Are you familiar with that . Mr. Cooper i am not. It seems to me, everyone in this room and everyone in the country, we know how dangerous it is of information getting into the hands of our adversaries. You have related that that possibility exists. Y was right when he said this is an 8 this was extremely careless, what has taken place, and unfortunately, you are right in the middle of that. As the chairman brought up, we have nations coming up after us coming after us and we have andstanding up as defense the words of the director had be directed to you as well, it has been extremely careless what has taken place. Your handling of the i. T. Admitsructure, even in mr. Xperience chairman, i am grateful for your continued commitment to pursue and try to get to this and those who refuse to answer our questions and plead the fifth to protect their own hide as opposed to protecting our National Security is shameful. I thank you for pursuing this and i yield back. Rep. Chaffetz we now recognize the gentleman from texas. Thank you. Mr. Cooper, thank you for being here. You have said many times you are not an expert in computer security, so i wont try to get to detailed. Have you ever worked in the federal government before . Mr. Cooper i worked in the white house in 2001. Were you involved in handling classified information . Mr. Cooper no. Pagliano work for you . Can you clarify . You were responsible for setting up the servers, correct . Mr. Cooper i oversaw the setup of these servers. Who was your boss . Mr. Cooper president clinton. When you set up the servers, pagreached out to mr. Liano. Was he a consultant . Mr. Cooper yes. Was he working at the state department at the time . Mr. Cooper not at the time. Did he provide consulting his services to your organization . Mr. Cooper yes. Is that normal . Mr. Cooper i have no basis to judge that. As the person responsible was setting up these servers, did you ever engage a third party to do stuff like technical owner ability assessment . Mr. Cooper i left that responsibility with mr. Pagl iano. And he was responsible from the beginning . Mr. Cooper he was not responsible for the apple server, he was responsible for the transition to what we call the pagliano server. That server was backed up to an external hard drive from may 2011 to june 2012, is that correct . Mr. Cooper as i understand it. We have a report from the fbi that you would periodically delete these emails from the backup. Mr. Cooper i have no knowledge of how that proceeded. Who was responsible . Mr. Cooper mr. Pagliano. When the decision was made to make a separate server, or you part of that conversation . Mr. Cooper yes. Why was the decision made to not use a commercial Service Versus doing something yourself . Setup ofr the initial both servers was in consideration of a small group of users from president clintons office. This was a solution we felt was as youopriate solution can tell at a fact that we transition quickly from the apple system to another system. We were moving to a more robust piece of equipment. At someaid yourself point, did you say you do not have the Technical Expertise . Mr. Cooper i was not in a position to be the technical expert on either server. There is a conversation about whether or not the server had been hacked, brute force, you name it. Has the fbi to your knowledge investigated whether there was indeed was there a forensic investigation on the servers to see whether there was evidence of an attack . Mr. Cooper i would refer to the fbi for that. Were you ever asked questions about that . Were you monitoring whether data left the network . Mr. Cooper i would referred to the fbi for that. You ever suspect classified information was being emailed to them from the secretary clinton from the secretary . Mr. Cooper now. No. Do you think that common for good cyber hygiene was used in the development of these servers . Mr. Cooper im not familiar with what common practices are but i believe some were likely used. Who were you using for guidance from what was good digital system hiking . Pagliano andr apple the first time. You have said apple a few times, did you like use their Service Center at the mall . I yield back. I thank thez gentleman. We now go to the gentleman from alabama. Thank you mr. Chairman. It was indicated that the location of clinton devices would frequently become unknown as she transitioned to new devices. Did you make any inquiry about any of the missing devices to make sure they were properly secured and the data was properly recorded . Mr. Cooper i can say with some certainty that when there was a transfer, there was always the goal in process to transfer all the data from the previous device to the new device. You are specifically asking about what happened to the devices that i know i personally did not dispose of. I cannot speak to that. I may have asked those in the process of doing that for secretary clinton to also properly dispose of the. You were responsible for setting up the servers and these devices. Setupoper mr. Pagliano the server. For someone to transfer to a new blackberry device for wires someone to tell the server there is a limited time for a user to login with a onetime. When your transfer from one device to another, did you have any responsibility in handling the device that was no longer being used . On occasion, i was the person who gave the transfer and ensuring that it was on the new device, wiping the old device. I render them unusual unusable. Are you aware that there is a missing laptop and external storage device . Mr. Cooper based on the reading of the fbi report, im. You know that the report was that it was lost in the mail. Mr. Cooper that is as much as i know. Do you know who mailed it . Mr. Cooper i have no details on that. You are aware that the director described secretary clintons use of a private email server as extremely careless. You read the fbi report. Mr. Cooper i am aware of the report. In your handling of the servers, did you have any concerns that her use of a personal server or the use of Outdated Technology might be a problem . I viewed her use as a personal use of a blackberry and a server that we kept uptodate. You have been around the clintons for a pretty good time, havent you . Mr. Cooper yes. Aware of the highly sensitive material that mrs. Clinton as secretary of state was handling, that would pass through her Communications Devices and her services servers. That therebe aware was Sensitive Information. Mr. Cooper if i was generally aware that secretary clinton encountered Sensitive Information, how that was transferred to her was not something i was aware of. In your disposal of these devices that you said you made sure they were wiped and you took other measures to dispose of them. Did you receive any instructions making sureabout that the data on those systems were properly recorded . Did anyone talk to you about that . Mr. Cooper i had no significant specific instructions about that. When you consider your handling of these devices as possibly careless russian mark possibly careless . I think you have been a good witness and i appreciate the fact that you have stayed. Listening to the questions and your lack of knowledge of some of the cyber technology, of the Cyber Protection technology, things like that. My concern is, it is almost an atmosphere of indifference. I really hope that is not the case, because although some of our colleagues try to make this about her candidacy, it is really about our National Security, and how we handle things going forward. That is the great concern that this committee has, is that we make sure that we dont put our National Security at risk, that we dont put our Intelligence Officers at risk. That is my concern, particularly with this missing laptop that apparently nobody has made an effort to recover. Rep. Chaffetz we now recognize the dome and from North Carolina we recognize the gentleman from North Carolina. I would like to start by making a couple of statements. Thatnd it interesting calix to my right have not necessarily been truthful in the accusations they have made. When otherhat members talked about this was some kind of relentless pursuit by republicans to damage present secretary clintons president ial hopes and others that only this is some kind of photo up. Let me remind everybody of what director komi sai director comey said. This is an investigation not caused by congress, but by the Inspector General based on the intelligence we have been able together. This is not republican driven. Another thing they tried to make a case for was that this was some sort of republican witchhunt. I specifically asked director comey if he felt this way and he said it did not. Theremocratic friends say is no evidence that the emails were hacked. January 9, 2011, you became aware of an attempt to hack Hillary Clintons private email server. Is that correct . Mr. Cooper i believe you are referring to an email and the i said that i was , but what itd hack was was a series of failed login attempts. The way we manage to put an end to them was to put a shut was to shut down the server or a brief period of time. Do you agree that there is no evidence that the server could have been hacked . The best of my knowledge is to refer to the fbi report. You dont have a take on it. Mr. Cooper i have no knowledge that there was a successful hack. Chineseere aware of the and russians trying to attack us. Mr. Cooper i was not aware. It is interesting that if it wasnt what you consider maybe a hack sadness hacked sad hacked status mr. Cooper i believe the email was to miss aberdeen. Aware that more of the email services might be offline. How many times did you send an email that was the same reference . Mr. Cooper i do not recall sending a great line of those emails. I cannot say it was the first time. Pretty rare, though . You are now describing that the hack was probably not the best description of it. But you were concerned . Mr. Cooper i was mostly making her aware that i was shutting down the email. Were there any other times are attacked you were aware of that the server was in a vulnerable position . Mr. Cooper as there was an increase in the failed login attempts, we made the secret service aware, and they reviewed the logs and made some recommendations. Do you have a rough number . How many times it might have happened . Mr. Cooper i cannot give you a specific number. Less than a thousand . Mr. Cooper yes. You might have mentioned this earlier. Again, how youme were compensated . Can you tell me who compensated you for all this . Mr. Cooper i worked for the clintons for 15 years and was compensated in a number of ways depending on what my activities were. Helping president clinton write his memoirs and subsequent books. I traveled the world to support the foundation. I had varying sorts of income. A little gray area. When you say you were compensated in a variety of ways , does that include being paid with cash . Mr. Cooper now. No. So you were paid. Mr. Cooper yes, taxable, i was a full employee. What was the title . There were multiple payrolls, there was a Clinton House payroll, a clinton a Clinton Executive Services payroll. They were checks. Mr. Cooper they were through a Employer Services can company. Rep. Chaffetz we now recognize the gentleman from oklahoma. Thank you. Thank you, mr. Cooper for your patience and also your answers you have provided. Alerted folks to possible breach attempts and were concerned about the security as we have heard in your testimony. In january 2013 according to the a user logged into a staffer of president clintons account and browsed emails and folders of that persons account. Were you aware of that breach . Mr. Cooper i was not aware of that breach. Did it cause you concern . Once i read it, sure. In the spring of 2013, according to the fbi, Sidney Blumenthals aol account was clintons email exchange with mr. Blumenthal was made public. Were you aware of that . Mr. Cooper i was. What was your response . Mr. Cooper at that point, i was transitioning out of the role or responsibility with the servers. Various teams were selecting a network to take over the email services and i dont know that i had any direct response. Mr. Cooper did you book did you believe there was Sensitive Information that would qualify as very private, being at the position that clinton held . Mr. Cooper certainly private information. The fbi reported finding emails marked secret on a prn server and you assisted with the transfer of data to the prn server. Mr. Cooper i did not actually assist with the transition, nor was i even with the missing laptop that you did not lose but apparently got lost after prn received it . Mr. Cooper i had no knowledge of that. You did have knowledge of providing the laptop. Cooper, you conveyed to mr. Meadows and we appreciate the insight you have given us that when allassisted it of this was being set up. Create or did aberdeen or cheryl mills or Jacob Sullivan have a user account on the private server . Mr. Cooper aberdeen had one. Are you aware that in the fbi report, it states on page 10 that mrs. Clintons immediate aids to include aberdeen, cheryl mills and Jacob Sullivan told the fbi that they had no knowledge of the existence of a private server until after mrs. Clintons 10 year tenure at state . That would not have been true, would it . Mr. Cooper i cannot speculate on whether comments were. But you just stated that miss aberdeen knew of the server, she had an account on the server, so how is it possible that she could not have known about it server while mrs. Clinton was at state . Mr. Cooper i cannot speak to her recollection. That would be contrary to the facts, wouldnt it . Mr. Cooper i can just tell you that i know she had an account on the server and that she was using it. At the time that mrs. Clinton was at stake. Thank you for establishing those facts for us. We know there were preferences on functions and systems going back and forth, a lot of different devices, and we also know there was a lot of black there were blackberries that were provided by the senate with the warning these could all be freedom of information act, so they elected not to use that blackberry. There were others use associated with the server, how are they obtained . Were they thirdparty obtained . Obviously they were not through state. Mr. Cooper i cannot speak to them being obtained by the state department. For the obtained through thirdparty . Were they obtained through thirdparty . They were not obtained by thirdparty like ebay, amazon. Mr. Cooper not to my knowledge. With that, my time has expired. Was ansaid that there email marked secret and we wanted to know what that was because we never saw that. Rep. Chaffetz i will let you work that out. We now recognize the gentleman from wisconsin. I want to nail down a little bit more followup on what representative walker said. Withirst became involved thenpresident clinton in 1999. Mr. Cooper yes. An at the time, you were in aide. In 1999, i was still an intern. Mr. Cooper what being an intern will lead to. When president Clinton Left Office, from then until today, you say you worked for the clintons. Was it the clintons, personally, was the foundation, who was cutting the checks come time to time . Mr. Cooper the organization evolved over a. Of time evolved over a period of time. Officen the transition of the First Six Months out of office. Tohen worked for clinton write his memoirs. So then it was bill, personally . Mr. Cooper a combination of bill and his publisher. Was on the household payroll for a series of years. List . I want to see where your involved in the thing if it is not too much bother. From one bill Clinton Left Office to today, who we working for. See what im saying . We getting w2s or 1099s . Mr. Cooper i can get my attorneys to give it to you. I would like that. When you interacted with the clintons, did you usually hear from bill directly, hillary directly . Who was the person usually heard from . Mr. Cooper i primarily work for president clinton and work with him on a daily basis. Did you ever get emails from uma or hillary . Mr. Cooper maybe once a month. Did you have any coronation with the foundation . Mr. Cooper yes. There . Wish or Contact Contact . S your bill again . Primarily my role at the foundation was supporting president clintons activities with the foundation. Did you ever hear from huma or hillary about the foundation . Mr. Cooper at various times. When did the Foundation Kick in . Mr. Cooper officially, the foundation was launched as we were leaving the white house in support of the president ial library. Before it became the Charitable Institution it became. Mr. Cooper correct. Did you receive emails from secretary clinton or whom aberdeen as to the state Department Business . Mr. Cooper not that i recall. Usually when they contact you , is it personal business or Foundation Business . Mr. Cooper personal business. Example . U give me an mr. Cooper asking where the president was. I will yield my remaining time to the chair. I would like to see a chronology of weve got the w2s from an 2002 to 2003, 2004. One more question. Was it usually just one person cutting the check each month . Where there months in which you got a check from bill personally and the foundation . Mr. Cooper it varied over time. Mr. Cooper, who were you employed by now . Mr. Cooper i have my own consulting firm. I have a variety of clients i work with to help them with their thought leadership, to identify does that include any array of clinton entities . Mr. Cooper it does not involve any current clinton entities. Or persons . It is not involve any of the clintons. We now recognize the gentleman from new york. York. Tlewoman from new i would like to begin by quoting from Bernie Sanders. He famously said in one of the debates, he said enough of these emails. I think that those of us with sets of this hearing today can say the same. We are seeing a predictable pattern from the Republican Party where they, out and make all kinds of accusations that i believe are politically motivated. They make all kinds of accusations against secretary clinton. Onesmake really reckless that are criminal accusations and then they call for an investigation. Then the investigation happens and what comes out of investigation does not support the accusation. Then they move on to the next email attack that they put forward. We saw this with the discredited and ghazi hearings and accusations and reviews. Where the fbi and other independent investigators found no evidence, none whatsoever, of a crime with the emails. What do we have again . Another accusation of claiming email criminal activity. The latest one is that secretary orderedand her top aide the destruction of emails to conceal these emails from investigators. Example, my good friend, and he really is my good friend, representative meadows, i heard him on National Television where he claimed that the emails were deleted as a result of a directive from the clinton campaign. There is no evidence to support this accusation. Fitz made aafe similar claim on september 6, claiming that secretary clintons attorneys issued to ons order during a call march 2015. These claims were already andstigated by the fbi guess what . There was not any evidence to support these claims. Explains thaty after secretary clintons attorneys finished perusing her workrelated emails, she no longer needed her remaining personal emails. The fbi is there for a reason. Investigate,e to make determinations and to come forward with conclusions. They have concluded that there is no evidence. So why are we here . Why are we trying to contradict what the fbi found . The bottom line is that the fbi, based on the reviews, based on the professionals that they have looking at this, they came forward and said, the director said it before this committee, we do not find any evidence of evil intent and intent to instruct obstruct justice. This is the head of the fbi relying on a complete investigation of his personnel on the issue. He also said and i am quoting him. We did not find evidence to indicate that they did anything to try to erase or conceal anything of any sort. The fbi has artie made their determination. I one question to you mr. Cooper. In all of your work and understanding, did you see anything that contradicts the conclusions of the fbi professionals and director ey who testified before this congress who saw no criminal activity. Hes a no abuse of justice. To you see anything to contradict this conclusion . Mr. Cooper to the best my knowledge, no. Ok. I want to remind everyone that the fbi, we are here for one day. They conducted a yearlong thattigation and concluded no charges were appropriate. They had, i would say, an allstar team. We have very good investigators, but i would say yearlong investigation by the fbi with , they arestar teams professionals, trained professionals, they came forward and said that there were no charges that no charges were appropriate. I want to join Bernie Sanders and saying enough is enough. We have had investigation after investigation, accusation after accusation, now we have another accusation after the investigation was completed by an unmatchedh has record in protecting our citizens, preserving the law this country and preserving the integrity of government. I rest my case. The time is expired. I was just warming up mr. Chairman. [laughter] we will now recognize the gentleman mr. Smith, the chairman of the science and technology committee. We are thankful for the close working relationship with the community. Committee. Tothank you for inviting me attend todays hearing to examine the security ofs former secretary clintons private server. And emailserver arrangement is of particular importance to your committee and to the science, space and technology committee. The Science Committee has a whichsibility to examine branches and agencies and private entities can improve practices. Security as part of the Science Committees ongoing investigation, i have issued questions to three Different Companies that perform maintenance work. Two of the companies received lawfully issued subpoenas for work they performed. Flat River Networks and second produceave refused to documents. Both companies have purposely misinterpreted the plain language of the subpoena. Both have stated that they do thee response materials. Which is demonstrably false. These companies decision to obstruct the committees investigation and if i a lawfully issued subpoena continues the clinton habit of secret rather than secrecy rather than transparency. This may be of interest to the , theewoman from new york council confirmed to my staff that the clintons prime it private llc is directly engaged in instruction to congressional subpoenas. This is a clear obstruction of justice. Americans deserve to know the truth, which is now being blocked by the clinton organization. Providehe companies did responsive materials to the subpoena. These documents have shed light on the unique arrangement undertaken by secretary clinton to set up a private server. This includes the lack of even basic Cyber Security measures applying to the information stored on the server such as encryption. It is inconceivable that a secretary of state who was entrusted with our National Security secrets would not take every available step to safeguard our nations classified information. Throughrmation sought the investigation of the Science Committee, Oversight Government Reform Committee and senator ron johnson in the senate, Homeland Security and Government Affairs committee is crucial in determining the degree in which our National Security was unprotected and perhaps in danger. I look forward to continuing to work forward work with you mr. Chairman. If it is all right, as a couple of questions. Mr. Cooper. First of all, thank you for being here today and being willing to answer questions. You deserve credit for being willing to do that. That compares to those who refuse to come here today and answer questions. Let me ask my first question which is, you heard me say a minute ago, this morning, have said the Clinton Executive Service corporation is in effect obstructing my committees investigation. Is a Standard Practice for the Clinton Executive Services corporation . In aooper im not position to comment or have any knowledge of that. Have you seen any other have triedhere they to prevent information from getting to a committee . Mr. Cooper i am not aware at all. Many of the documents provided include indications of flat River Networks. Should they have information in his in its possession about the work related to Hillary Clinton server . Mr. Cooper my interaction with them was handling handing over usernames and passwords. That is my totality of interactions. Ive not had information with them beyond that. Likelyd you save their or not to have that information . What information you had over to them . Mr. Cooper i handed over some usernames and passwords at the beginning of the transitional process. Thank you, mr. Chairman. That completes my questions. Thank you, chairman. We do appreciate it. I will recognize the gentleman from georgia, mr. Carter. Thank you, mr. Chairman and thank you mr. Cooper for being here. In secretary clintons new york homes, didton d. C. She have a desktop computer . Mr. Cooper there were apple imacs in the homes. Had you know that . I had the opportunity to work out of those rooms. Who was able to open them . Mr. Cooper they were there for the purpose of staff visiting the home or the staff at work in the home. Was it ever less left unsecured . Left out for some of to get to it. Mr. Cooper these were personal computers in their homes secured by the secret service. Who had access to it . Mr. Cooper the Clinton Family and their staff. You about two occasions in 2011 where you were concerned that someone was trying to hack into Hillary Clintons private email server. Would made you concerned that someone was trying to hack in as described in the email you sent . Mr. Cooper my concern at the time was i was colloquially using the term hack to describe what was a multiple failed login attempt on the server. What was really conveying to her was the concern of that activity and more so that we were dealing with it by shutting down the server for an amount of time. So later on that day you emailed her and said there was a second attempt. You said we were hacked again so i shut the server down for a few minutes. Help me out. When i think the hack on a computer, i think of someone who is trying to get in. Mr. Cooper i was using very colloquial language. So that is not what you meant when you said attack hack . Mr. Cooper these were multiple failed login attempts on the server. Wing to describe that as someone who is trying to get an unauthorized . Mr. Cooper i would describe it is that yes. Was it the same attempt as the previous one . Mr. Cooper i cannot recall if it was the same or being able to determine that. Did you shut the server down on the day in january . Mr. Cooper to the best of my recollection based on the emails you have, yes. What good would that have done . What was the purpose in doing that . Mr. Cooper my understanding was these were automated attempts and once they did not ping a server on the other side, they would stop. We had reports and we read numerous reports that mr. O was no. Cooper mr. Paglia on was letting me know about failed login attempts. What is the difference between a failed login attempts and a hack . Mr. Cooper a failed login attempt is when someone tries to log into the server and fails. What is an attack . Define an attack for me . The word attack is colloquial. Describe what you would define it as. Mr. Cooper multiple failed login attempts trying different usernames in no specific pattern. Would you agree that most people attack it asthma something much more than that as something much more than that . Mr. Cooper i would agree. We have discovered that Hillary Clintons old phones were destroyed with a hammer. Were these phones connected to the private email server in question . Mr. Cooper i described earlier that when the transition from one device to the next, we take the old device, back it up, make sure all the content was transferred to the new device, linked to the server, then once that was completed, on occasion i render them unusual. Why would use that kind of method . It seems kind of barbaric. Mr. Cooper i think it is practical to not just throw a whole device into some sort of garbage receptacle where someone might pick it up out of curiosity and try to use it. Here we are, with all due respect, the definition of an attack that you have and the definition that i have and most people have are completely different. We are taking an old phone and destroy it with a hammer. Where you instructed to do that . Mr. Cooper that was not something i was instructed to do. Was that normal procedure . Mr. Cooper i felt it was a good practice. Ok. I yield my time. A few other questions as we conclude here. I give you great credit for being here and answering the questions. Imagese there no backup prior to june 23, 2013 made available to the fbi as part of their criminal investigation . Mr. Cooper that is not something i have knowledge or insight into. Mr. Pagliano were running the ship. Why were there no backups . Mr. Cooper technically he handled that component of the server. I was not managing to backups. Thatt their report states that server was backed up to an external hard drive between may of 20 2009 and june of 2011. Is that your understanding . Mr. Cooper it is my understanding from reading the same report. The report states you would periodically delete the records and maintain the backup as disk space ran out . Mr. Cooper i was not responsible for those deletions. You didnt do any of those . Mr. Cooper no. Was there any consideration to get a backup or external hard drives . Mr. Cooper at one point we upgraded the backup system attached to the server. So rather than backing this stuff up, you deleted it . Mr. Cooper i was not the one responsible for doing any deletion. Fbi was unable to locate or procure any of the 13 mobile devices used by secretary clinton during your tenure. Are you aware of any of the locations of these devices . Mr. Cooper i am not aware. Did secretary clinton ever use the computer use set up for . Mr. Cooper the computers in her homes . Yes. Did she know how to use it . Mr. Cooper i dont know that she did or use those computers . So you bought a computer, set it up, you never saw her use it . Mr. Cooper i dont believe i ever saw our use it. Who had access . Mr. Cooper she had household staff in each home and i believe her personal aide who would come to her house before travel who would predominantly use those to print off clips and briefing material. They could access that when it became a skip . Mr. Cooper i am not aware. It when theyer use were in the skiff . Mr. Cooper i do not recall using it when it was a skiff. Email . D printer mr. Cooper i cannot say if it would. I dont know if it printed her email. Did you ever see the computer in her skiff . Mr. Cooper i have seen the skiff and i know the computer was in there. You put a little qualifier there. You are telling you for four years, you never went in that room . Mr. Cooper i cant say a specific occasion i walked in that room. So youre talking to the secretary chu walks in that room, you stop at the door . Mr. Cooper i dont recall a situation of that type. Do you know how tight the skiff was secured . Mr. Cooper i was there when it was set up and i believe it locks on the doors. What happened when the fbi showed up . Today sees things . Did they seize things . Were you there . Mr. Cooper no. Are you aware that they seized anything . Mr. Cooper i am not aware. The very same day that Hillary Clinton started her Senate Confirmation was the very same day you registered clinton email. Com and evidently set up the server. Correct . Mr. Cooper that was the day we registered clinton email. Com. Im not sure it was the same day we set up the server. What was she doing three days before that . Mr. Cooper i have no recollection of where she or i were three days before that. Why not set up a Gmail Account . Mr. Cooper the consideration was there was an executive existing server that allowed her to maintain a personal email address. She was using at t blackberry address before that which had limited ability to retain emails or view them in any other way decides on the blackberry. Besides on the blackberry. I want to reiterate how much here,eciate your being subject news of the questions before congress. Im sure is not something you set out early in life to do. You are here and you have answered. For that, we are very much appreciative. We are very grateful of that. But we recognize before we recess here mr. Cummings. A lot of times we have these , a lot of people dont seem to realize that there is life after the hearing. Do your family . Do you have a family . Mr. Cooper i do not. I also want to thank you for your testimony. I think you have been very straightforward. Thank you for your cooperation with the fbi. Your testimony has been very helpful. Having practiced law for many , it is painful and short of have to pay legal bills. Im sure to pay legal bills. It is money you can probably be doing some other things with. Im sorry you have to go through all this. Life. Ct is, it is part of i just want to thank you very much. I can understand based on the testimony why director call me came to the conclusion they did, particularly with regard to you. Intention of the chair to recess the hearing to reconvene at a later date, will provide ample notice of the date and time. The committee stands and rita recess. Coming up next on cspan, washington journal. The house returns to work on a va bill. Theres also a possible of a democratic protest for a vote on gun control. Ing up in 45 minutes, mike senator mike rounds joins us. Efforts to fight the zika virus and the latest on campaign 2016. Then, texas congressman beto overwork talks about changes to the veterans bill. After that, gideon rose discusses military changing to the changing field. Host good morning. Is wednesday, september 14, 2016. The senate scheduled to reconvene today at 9 00 a. M. The house begins its day with the two usual morning hour at with its usual morning hour at 10 00 a. M. A sharp increase in household the steepest decline in the with poverty rate in nearly 50 years. We want to hear whether yo

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.