Posted on 05/20/2018 5:21:14 AM PDT by Trteamer
So if Hillary claims to not have used her personal server for classified documents, what server did she use? Have the e-mails on that server been looked at? Just wondering because I don't recall that subject being brought up...
She claimed that couriers carried them into her office, no?
I thought it was in her testimony.
If so, she must have fired up her Turbo Shredder?
bleachbit
But all of the Rats lied. Obama said he didn’t know she used a private server yet he himself sent messages to her non-.gov account.
Reportedly he also used some private email accounts.
Hillary Clinton broke the law. They have emails from her explicity saying “If you forward this to anyone else, remove the CLASSIFIED heading.
That is a felony right there.
Even SHE is not stupid enough to send an email like that on a government server.
When they talk about how careless she was, it was nothing of the sort. They did this to get around FOI (Freedom of Information) requests.
She claimed all 30k plus emails were about Chelseas wedding, recipes (probably cocktails), emails to Bill (who never uses email) and yoga (for the amount of yoga she claims to do, you think she would be in better shape).
According to recollections, Hillary had 13 servers in different locations that had government correspondence on them. One was in a bathroom. I dont know if those servers were duplicates, or had independent information on them. That was never revealed. My guesstimate, not that it matters, is that Hillary had at least one email account or txt account linked to every server. That way it would be very hard to follow illegal conversations and pay to play schemes.
Will it ever end? There is sooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo much corruption in our once supposedly “honest” government, it seems totally impossible it will ever recover. How then can any of us expect Trump to MAGA without at least one or two people standing shoulder to shoulder with him?
If you or I had done this, we would still be in federal prison.
My guess is it was an Exchange Server... probably running 2010..
I suppose I’m basing that guess on the fact that the emails we have seen look like they’re printed via Outlook.
It would be really easy to export mail data into small-ish (or large-ish) files called “pst’s”. These files are can be stashed on a USB flash drive.
I’m guessing there are some of these pst files on Carlos Dangers laptop... among other things...
13 servers?? Or 13 mailboxes? I recall she had several mailboxes...
She may have had more than one server... but I don’t think the number was that high.
I should clarify that “Exchange Server” and “Outlook” are both Microsoft products.
Outlook is an email / calendaring and contact program...
18 US Code 793(f) - 18 U.S. Code § 793 - Gathering, transmitting or losing defense information
(a) Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or
(b) Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or
(c) Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or
(d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or
(e) Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or
(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer
Shall be fined under this title or imprisoned not more than ten years, or both.
(g) If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.
I think all she said was that she never received or sent emails “marked” classified. The implication was that anything classified was handled differently, but I don’t recall anybody saying how they were handled. (Yes, I had the same thought.) She had a classified stu but apparently didn’t use it because her Blackberry wouldn’t work in it.
Her claims are bogus because she was one of only eleven people, including the President, who have the top level of classified access. Also, because she was the Secretary of State, everything she sent was a window into what the government was doing and should have been handled, at a minimum, as confidential. Her server wasn’t even up to that low standard.
The fact that she continues to get away with blatantly violating the law is a blight on our country. Especially when they sent a Navy sailor to prison for a year for taking a selfie showing a classified console in the background. As Obama said, “Well, there’s classified and then there’s classified.” Well, there’s liberals who violate the law and then there’s conservatives who violate the law. Totally different. Rosanne can use different variations on her name to exceed campaign contribution limits but De Sousa goes to prison for writing one check to a friend that exceeds the limit. See how that works?
I bet she was being paid to nullify the entire document security infrastructure of the state department. Paid by one or more foreign powers.
When you go to the summer of 2008 (Convention time), this whole topic of the job offered (Sec of State) and how things will flow is openly discussed.
What people don’t bring up is that you need four separate systems (private email, unclassified gov’t email, Secret email, and Top Secret Email). Each operates in a slightly different environment, different menus, different looks, and different password/ID card requirements.
Well...Hillary is not multi-capable to grasp this. People knew about this weak nature, and this private email server was the basic reason to eliminate the other three systems and their necessity. If you explained this to a government employee....they’d just start laughing because you’d go to prison for this type of behavior normally.
There’s just one ‘funnel’ and the rest of these emails (the government unclass, secret and TS) would flow out of the office, to Hillary’s funnel, which had the plain regular email. All because she’s marginally capable of handling anything other than this.
For example, this passage:
This is damning. She is a liar, and not an inadvertent or accidental one, either.
I believe she was doing it so that (she thought) emails regarding donations to the Clinton Foundation could not be found by FOI requests.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.