Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

A question I have not seen asked about Hillary's server...
Trteamer | 5/20/2018 | Trteamer

Posted on 05/20/2018 5:21:14 AM PDT by Trteamer

So if Hillary claims to not have used her personal server for classified documents, what server did she use? Have the e-mails on that server been looked at? Just wondering because I don't recall that subject being brought up...


TOPICS: Government; Miscellaneous; Politics
KEYWORDS: corruption; hillary; server
Navigation: use the links below to view more comments.
first 1-2021-29 next last
So if Hillary claims to not have used her personal server for classified documents, what server did she use? Have the e-mails on that server been looked at? Just wondering because I don't recall that subject being brought up...
1 posted on 05/20/2018 5:21:14 AM PDT by Trteamer
[ Post Reply | Private Reply | View Replies]

To: Trteamer

She claimed that couriers carried them into her office, no?

I thought it was in her testimony.


2 posted on 05/20/2018 5:28:36 AM PDT by a fool in paradise (Ads for Chappaquiddick warn of scenes of tobacco use. What about the hazards of drunk driving?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: a fool in paradise

If so, she must have fired up her Turbo Shredder?


3 posted on 05/20/2018 5:29:51 AM PDT by Trteamer ( (Eat Meat, Wear Fur, Own Guns, FReep Leftists, Drive an SUV, Drill A.N.W.R., Drill the Gulf, Vote)
[ Post Reply | Private Reply | To 2 | View Replies]

To: a fool in paradise

bleachbit


4 posted on 05/20/2018 5:30:06 AM PDT by garykfd (American by Birth, Southern by the Grace of God)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Trteamer

But all of the Rats lied. Obama said he didn’t know she used a private server yet he himself sent messages to her non-.gov account.

Reportedly he also used some private email accounts.


5 posted on 05/20/2018 5:30:12 AM PDT by a fool in paradise (Ads for Chappaquiddick warn of scenes of tobacco use. What about the hazards of drunk driving?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Trteamer

Hillary Clinton broke the law. They have emails from her explicity saying “If you forward this to anyone else, remove the CLASSIFIED heading.

That is a felony right there.

Even SHE is not stupid enough to send an email like that on a government server.

When they talk about how careless she was, it was nothing of the sort. They did this to get around FOI (Freedom of Information) requests.


6 posted on 05/20/2018 5:31:29 AM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Trteamer

She claimed all 30k plus emails were about Chelsea’s wedding, recipes (probably cocktails), emails to Bill (who never uses email) and yoga (for the amount of yoga she claims to do, you think she would be in better shape).


7 posted on 05/20/2018 5:34:08 AM PDT by ExpatCanuck
[ Post Reply | Private Reply | To 1 | View Replies]

To: Trteamer

According to recollections, Hillary had 13 servers in different locations that had government correspondence on them. One was in a bathroom. I don’t know if those servers were duplicates, or had independent information on them. That was never revealed. My guesstimate, not that it matters, is that Hillary had at least one email account or txt account linked to every server. That way it would be very hard to follow illegal conversations and pay to play schemes.


8 posted on 05/20/2018 5:34:40 AM PDT by Pete Dovgan
[ Post Reply | Private Reply | To 1 | View Replies]

To: a fool in paradise

Will it ever end? There is sooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo much corruption in our once supposedly “honest” government, it seems totally impossible it will ever recover. How then can any of us expect Trump to MAGA without at least one or two people standing shoulder to shoulder with him?


9 posted on 05/20/2018 5:35:15 AM PDT by DaveA37
[ Post Reply | Private Reply | To 5 | View Replies]

To: rlmorel

If you or I had done this, we would still be in federal prison.


10 posted on 05/20/2018 5:35:19 AM PDT by The_Media_never_lie (The MSM is the enemy of the American people)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Trteamer

My guess is it was an Exchange Server... probably running 2010..

I suppose I’m basing that guess on the fact that the emails we have seen look like they’re printed via Outlook.

It would be really easy to export mail data into small-ish (or large-ish) files called “pst’s”. These files are can be stashed on a USB flash drive.

I’m guessing there are some of these pst files on Carlos Dangers laptop... among other things...


11 posted on 05/20/2018 5:35:53 AM PDT by bryan999
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pete Dovgan

13 servers?? Or 13 mailboxes? I recall she had several mailboxes...

She may have had more than one server... but I don’t think the number was that high.


12 posted on 05/20/2018 5:37:04 AM PDT by bryan999
[ Post Reply | Private Reply | To 8 | View Replies]

To: bryan999

I should clarify that “Exchange Server” and “Outlook” are both Microsoft products.

Outlook is an email / calendaring and contact program...


13 posted on 05/20/2018 5:39:56 AM PDT by bryan999
[ Post Reply | Private Reply | To 11 | View Replies]

To: Trteamer
Hillary will not answer any of these questions. She doesn't want them asked. Why?

18 US Code 793(f) - 18 U.S. Code § 793 - Gathering, transmitting or losing defense information

(a) Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or

(b) Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or

(c) Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or

(d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e) Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,

(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or

(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—

Shall be fined under this title or imprisoned not more than ten years, or both.

(g) If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

14 posted on 05/20/2018 5:41:42 AM PDT by Bryan24 (When in doubt, move to the right..........)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Trteamer

I think all she said was that she never received or sent emails “marked” classified. The implication was that anything classified was handled differently, but I don’t recall anybody saying how they were handled. (Yes, I had the same thought.) She had a classified stu but apparently didn’t use it because her Blackberry wouldn’t work in it.

Her claims are bogus because she was one of only eleven people, including the President, who have the top level of classified access. Also, because she was the Secretary of State, everything she sent was a window into what the government was doing and should have been handled, at a minimum, as confidential. Her server wasn’t even up to that low standard.

The fact that she continues to get away with blatantly violating the law is a blight on our country. Especially when they sent a Navy sailor to prison for a year for taking a selfie showing a classified console in the background. As Obama said, “Well, there’s classified and then there’s classified.” Well, there’s liberals who violate the law and then there’s conservatives who violate the law. Totally different. Rosanne can use different variations on her name to exceed campaign contribution limits but De Sousa goes to prison for writing one check to a friend that exceeds the limit. See how that works?


15 posted on 05/20/2018 5:42:07 AM PDT by Gen.Blather
[ Post Reply | Private Reply | To 1 | View Replies]

To: rlmorel
When they talk about how careless she was, it was nothing of the sort.

I bet she was being paid to nullify the entire document security infrastructure of the state department. Paid by one or more foreign powers.

16 posted on 05/20/2018 5:44:18 AM PDT by Steely Tom ([Seth Rich] == [the Democrat's John Dean])
[ Post Reply | Private Reply | To 6 | View Replies]

To: Trteamer

17 posted on 05/20/2018 5:44:24 AM PDT by Delta 21 (Build The Wall !! Jail The Cankle !!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Trteamer

When you go to the summer of 2008 (Convention time), this whole topic of the job offered (Sec of State) and how things will flow is openly discussed.

What people don’t bring up is that you need four separate systems (private email, unclassified gov’t email, Secret email, and Top Secret Email). Each operates in a slightly different environment, different menus, different looks, and different password/ID card requirements.

Well...Hillary is not multi-capable to grasp this. People knew about this weak nature, and this private email server was the basic reason to eliminate the other three systems and their necessity. If you explained this to a government employee....they’d just start laughing because you’d go to prison for this type of behavior normally.

There’s just one ‘funnel’ and the rest of these emails (the government unclass, secret and TS) would flow out of the office, to Hillary’s funnel, which had the plain regular email. All because she’s marginally capable of handling anything other than this.


18 posted on 05/20/2018 5:44:29 AM PDT by pepsionice
[ Post Reply | Private Reply | To 1 | View Replies]

To: Trteamer
I usually never use Wikipedia references for political issues since Wikipedia is thoroughly untrustworthy, however, the Wikipedia entry Wikipedia: Hillary Clinton email controversy is fascinating and revealing in their descriptions of the circumstances and events without the use of words like "allegedly" or "accused of" which indicates widespread knowledge and acceptance of the illegal practices.

For example, this passage:


"...In various interviews, Clinton has said that "I did not send classified material, and I did not receive any material that was marked or designated classified." However, in June and July 2016, a number of news outlets reported that Clinton's emails did include messages with classification "portion markings". The FBI investigation found that 110 messages contained information that was classified at the time it was sent. Sixty-five of those emails were found to contain information classified as "Secret"; more than 20 contained "Top-Secret" information. Three emails, out of 30,000, were found to be marked as classified, although they lacked classified headers and were only marked with a small "c" in parentheses, described as "portion markings" by Comey. He added it was possible Clinton was not "technically sophisticated" enough to understand what the three classified markings meant.

Clinton personally wrote 104 of the 2,093 emails that were retroactively[105][106][107] found to contain information classified as "confidential." Of the remaining emails that were classified after they were sent, Clinton aide Jake Sullivan wrote the most, at 215.

According to the State Department, there were 2,093 email chains on the server that were retroactively marked as classified by the State Department at the "Confidential" confidential level. TG-4127 accessed Hillary for America Campaign Gmail accounts through spoofed login pages. Victims thought they were standard pages and hackers were able to access their email account.

This is damning. She is a liar, and not an inadvertent or accidental one, either.

19 posted on 05/20/2018 5:55:04 AM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Steely Tom

I believe she was doing it so that (she thought) emails regarding donations to the Clinton Foundation could not be found by FOI requests.


20 posted on 05/20/2018 5:56:28 AM PDT by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-29 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson