Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Clinton email chain discussed Afghan national's CIA ties, official says (High Ranking Asset Killed)
Fox ^ | February 17, 2016 | Catherine Herridge, Pamela K. Browne

Posted on 02/18/2016 12:55:44 PM PST by xzins

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101 next last
To: xzins

To use Hillary’s phrase to believe that her email leakage of classified information on unsecure servers had nothing to do with this assets death requires the suspension of disbelief...


41 posted on 02/18/2016 1:28:10 PM PST by Typical_Whitey (Obama has destroyed the office of the presidency.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: henkster

It’s beyond “debates” on Fox News, Henster.

It truly is treasonous criminality.

What do we do?


42 posted on 02/18/2016 1:28:29 PM PST by xzins (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 37 | View Replies]

To: jessduntno
If Apple Encryption was protecting her, we never would have this proof of her treachery.

Good thing she was using a blackberry

43 posted on 02/18/2016 1:28:59 PM PST by zeugma (Lon Horiuchi is the true face of the feral government. Remember that. Always.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Typical_Whitey; henkster

Her Carviles and Colmeses will say something like “can’t be proven”.

But that’s the entire point of classification. Violating security renders assets vulnerable. Shouldn’t that violation itself be evidence of complicity in homicide?


44 posted on 02/18/2016 1:31:46 PM PST by xzins (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Art in Idaho
This case ha more “smoking guns” than an old Clint Eastwood western, beyond time for treason charges to be brought.
45 posted on 02/18/2016 1:31:58 PM PST by The Cajun ( Sarah Palin, Mark Levin, Mike Lee, Louie Gohmert....Nuff said.)
[ Post Reply | Private Reply | To 33 | View Replies]

To: jessduntno

You meant to say: If she was using the ENCRYPTED SYSTEMS she was *supposed to be using*, this wouldn’t have happened.

Instead she set up her own little unencrypted system in a closet somewhere, and it got HACKED!


46 posted on 02/18/2016 1:31:59 PM PST by AFreeBird
[ Post Reply | Private Reply | To 10 | View Replies]

To: maggief; holdonnow; Dog

Is it outlandish to think either the Taliban themselves or someone friendly to them was able to access this information? Would that have resulted in this assets murder?

I don’t assume anything, but the circumstances are....odd.

Hillary..cough-cough...may be deep in this one.


47 posted on 02/18/2016 1:34:22 PM PST by SE Mom (Proud mom of an Iraq war combat vet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AFreeBird

Because she is protected.

Why? I don’t know. She is injuring even her ‘friends’.


48 posted on 02/18/2016 1:34:36 PM PST by xzins (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 40 | View Replies]

To: SandRat; HiJinx

More indirect Kringtong HUMINT-related deaths.


49 posted on 02/18/2016 1:34:42 PM PST by DCBryan1 (No realli, moose bytes can be quite nasti!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: xzins

It can be proven if a special prosecutor is directed to investigate it...


50 posted on 02/18/2016 1:34:47 PM PST by Typical_Whitey (Obama has destroyed the office of the presidency.)
[ Post Reply | Private Reply | To 44 | View Replies]

To: Typical_Whitey

What’s the odds of Obama permitting that?


51 posted on 02/18/2016 1:35:33 PM PST by xzins (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 50 | View Replies]

To: xzins
What is wrong with these people? This is worse than negligence. It feels intentional from them.

I think it's very deliberate, yes. I think we're looking at long-planned treason.

52 posted on 02/18/2016 1:36:15 PM PST by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: AFreeBird

I know what I mean to say. If she had Apple protecting her, we might not have caught the deceitful bitch.


53 posted on 02/18/2016 1:36:21 PM PST by jessduntno (Steady, Reliable, and (for now) Republican - Donald Trump, (D, R, I, D, R, I, R - NY) /s)
[ Post Reply | Private Reply | To 46 | View Replies]

To: xzins

More like what’s right with these people?


54 posted on 02/18/2016 1:37:14 PM PST by OLDCU
[ Post Reply | Private Reply | To 24 | View Replies]

To: xzins

I don’t believe the witch has any friends. Just little toadies that fear her and the Clinton Crime Syndicate.


55 posted on 02/18/2016 1:37:50 PM PST by AFreeBird
[ Post Reply | Private Reply | To 48 | View Replies]

To: OLDCU

Amen. They are totally corrupt.


56 posted on 02/18/2016 1:38:02 PM PST by xzins (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 54 | View Replies]

To: AFreeBird

You meant to say: If she was using the ENCRYPTED SYSTEMS she was *supposed to be using*, this wouldn’t have happened.

Yes, it would have. The system was being looked at under a court order. It’s what would have happened with the government approved version and they would have complied. They do not have the hubris that Apple does.


57 posted on 02/18/2016 1:38:58 PM PST by jessduntno (Steady, Reliable, and (for now) Republican - Donald Trump, (D, R, I, D, R, I, R - NY) /s)
[ Post Reply | Private Reply | To 46 | View Replies]

To: Personal Responsibility

The real problem here is not that she, not only, allowed sensitive information to be handled across insecure lines, but in another of her emails she openly instructed subordinates on how to transfer sensitive information without proper security, to include, top secret info, to her server. I worked for uncle sugar for 32 years, and handled sensitive info at all levels of classification. I, like her, signed paperwork to declare I would not allow the release of sensitive info at any level into a compromised status. She not only did it, she instructed others how to do it. That is a federal offence that can be considered espionage. And that is 20 years in a federal prison if convicted. I would venture that having her own words on the topic in the hands of the FBI from her personal computer, would qualify as direct evidence. And she does not have political amnesty in this case. But don’t bet the house she will be prosecuted under the Obama administration. And if she is elected president, she can pardon herself or tomb the evidence. Graft everywhere.


58 posted on 02/18/2016 1:40:17 PM PST by Redwood71
[ Post Reply | Private Reply | To 11 | View Replies]

To: Talisker

Why so much hate toward her homeland? I’ve been around the world to many other countries. Even for those who don’t think this is the best, they all acknowledge it as a good place, a decent place.

Why want to destroy it? I don’t understand the kind of hatred that just wants to destroy.


59 posted on 02/18/2016 1:40:57 PM PST by xzins (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 52 | View Replies]

To: AFreeBird

It is Screwtape’s hierarchy of demons.


60 posted on 02/18/2016 1:41:33 PM PST by xzins (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 55 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson