The ongoing analysis of the hard drive of Hunter Biden’s laptop has revealed that there are multiple Department of Defense “encryption keys” on it. These keys allow access to DOD email accounts and databases. The exact number of these keys is still unknown. There may be dozens.
The keys are known more formally as “root encryption certificates.” Some of them appear to have unusually long expiration dates with many lasting twenty years or more. Such keys should not be present on a personal laptop of any kind, and there is no known reason that Hunter Biden would be in possession of them at all.
The keys were discovered only recently by Jack Maxey’s technical team working in Switzerland. Shortly after the discovery of the keys Maxey contacted the U.S. Embassy in Switzerland and reported that he had information that might compromise American national security and would like to talk to someone in the Regional Security Office to report what he had learned. His contact information was taken by the person with whom he spoke, but no one has ever called back to obtain the information in his possession.
According to information provided to Maxey, DOD is now aware of the presence of the keys on the laptop’s hard drive, has determined that the keys were still active, and has taken steps to cancel them.
An IT technical expert advising Maxey’s team has speculated that the keys present on Hunter’s laptop might have allowed Hunter to create throwaway email accounts on DOD servers and thereby route personal and business communications through those servers to escape detection. Such an arrangement would be in effect a much more sophisticated version of Hillary Clinton’s use of her “homebrew” server to evade monitoring of her communications while she was Secretary of State.
This is a developing story. We will provide updates as they become available. It bears worth emphasizing at this stage, however, that Hunter Biden’s laptop has been in the possession of the Federal Bureau of Investigation (FBI) since well before the 2020 election. If the information currently in Maxey’s possession from DOD is correct and encryption keys giving access to DOD systems were still active until Maxey and his team discovered their presence and reported them, that would seem to suggest strongly that the FBI has never bothered to investigate what is on the hard drive.
Sam Faddis is a retired CIA operations officer who has served in Near East and South Asia. He is an author, commentator, senior editor of AND Magazine, public speaker and the host of Ground Truth. This article was originally published on AND Magazine.
One! Hunter doesn’t have a security clearance, so whomever loaded the encryption keys on his laptop, should be in jail.
Two! All encryption keys should be self expiring, every 90 days. And they should self delete at expiration. You have to re-up your key every 30 days for a STE, why not for a computer. Log into a re-up site, have your computer auto swept, auto cleaned, auto sterilized, and get a new certificate/key. Can do easy!