Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Plans For Hidden IT Network To Help Clinton Skirt Rules Uncovered by Judicial Watch
Judicial Watch ^ | February 1, 2016

Posted on 02/02/2016 9:00:15 AM PST by jazusamo

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-64 next last
To: PIF

I laughed at that. DOS should be a disqualification from ever being allowed to use a computer again.


41 posted on 02/02/2016 10:14:27 AM PST by Vince Ferrer
[ Post Reply | Private Reply | To 9 | View Replies]

To: PIF

I’m guessing she had an Apple laptop.


42 posted on 02/02/2016 10:14:41 AM PST by nascarnation
[ Post Reply | Private Reply | To 9 | View Replies]

To: Ozark Tom

Conspiracy is what gets ‘em every time. First, because it’s illegal, and second because there’s somebody to squeal.


43 posted on 02/02/2016 10:17:36 AM PST by PLMerite (The Revolution...will not be kind.)
[ Post Reply | Private Reply | To 38 | View Replies]

To: jazusamo
Where would President Hillery hide her secret, against the rules - stand alone P.C. server in the WHITE HOUSE ? In the Blue Room , in the Map Room, maybe in kitchen in a fake dishwasher cutout? Maybe put a little tool shack out in the Rose Garden to hide it. Who knows. Tell me.
44 posted on 02/02/2016 10:28:51 AM PST by timestax (American Media = Domestic Enemy)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Ann Archy
 photo 1e1649c2-d60c-491f-80b0-153e9775cf79_zpsq1bqsij6.jpg
45 posted on 02/02/2016 10:33:07 AM PST by timestax (American Media = Domestic Enemy)
[ Post Reply | Private Reply | To 7 | View Replies]

To: timestax
 photo d724efc7-8fd8-4745-89bb-1cbe25ad403c_zpsb74jvksm.jpg

46 posted on 02/02/2016 10:39:34 AM PST by timestax (American Media = Domestic Enemy)
[ Post Reply | Private Reply | To 45 | View Replies]

To: PIF

DOSE is not Disk Operating System. It stands for Department of State.


47 posted on 02/02/2016 10:50:58 AM PST by Bryan24 (When in doubt, move to the right..........)
[ Post Reply | Private Reply | To 9 | View Replies]

To: PIF
...A DOS PC are you kidding? This is the Onion, right?...

Department of State.

48 posted on 02/02/2016 10:52:55 AM PST by FReepaholic (Stupidity is not a crime, so you're free to go.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: kevkrom

She had NO state department email. Would it not cross your mind that senior, and even some junior, State Department officials might want to email something job related to her? Hillary’s intent from the beginning was to have none of her decisions or communications ever captured by email.

That is a clear violation of the spirit and letter of the Federal Records Act.


49 posted on 02/02/2016 10:58:56 AM PST by Bryan24 (When in doubt, move to the right..........)
[ Post Reply | Private Reply | To 32 | View Replies]

To: GOPJ; Jane Long; Arthur Wildfire! March; Grampa Dave; RitaOK; ExTexasRedhead
Judicial Watch announced it received records from the Department of State disclosing that senior State Department officials planned to set up a "stand-alone PC" so that Clinton could check her emails in an office "across the hall" through a separate, non-State Department computer network system.

We demand the Congress look into this. Did the DOJ's Computer Forensics Division look into Hillary's State Dept server?

======================================

REFERENCE Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is a crime in which a computer plays an essential part. Computer crime is a felony violation of section 1030 of the United States Code. Computer crime also violates copyright laws and property rights in some cases.

This type of crime is the illegal exploitation of computer technologies, usually to support crimes such as fraud, identity theft, sharing of information, and embezzlement. A link to the U.S. Department of Justice's website about e-crime and the DOJ's computer forensics activities is at their web site.

Examples of computer crime are:

<><> Fraud achieved by the manipulation of computer records.

<><> Spamming wherever outlawed completely or where regulations controlling it are violated.

<><> Deliberate circumvention of computer security systems.

<><> Unauthorised access to or modification of programs (see software cracking and hacking).

<><> Intellectual property theft, including software piracy.

<><> Industrial espionage by means of access to or theft of computer materials.

<><>*Identity theft where this is accomplished by use of fraudulent computer transactions.

<><>>* Writing or spreading computer viruses or worms.

<><>* "Salami slicing" is the practice of stealing money repeatedly in extremely small quantities

<><> Denial-of-service attack, where company websites are flooded with service requests and their website is overloaded and either slowed or crashes completely

<><> Making and digitally distributing child pornography

==================================================

United States Code, Title 17 - Copyrights,January 1, 1998,

1.Chapter 1 - Subject Matter And Scope Of Copyright

2.Chapter 2 - Copyright Ownership And Transfer

3.Chapter 3 - Duration Of Copyright

4.Chapter 4 - Copyright Notice, Deposit, And Registration

5.Chapter 5 - Copyright Infringement And Remedies

6.Chapter 6 - Manufacturing Requirements And Importation

7.Chapter 7 - Copyright Office

8.Chapter 8 - Copyright Arbitration Royalty Panels

9.Chapter 9 - Protection Of Semiconductor Chip Products

10.Chapter 10 - Digital Audio Recording Devices And Media

11.Chapter 11 - Sound Recordings And Music Videos

==============================================

United States Code, Title 18 - Crimes And Criminal Procedure (Part I - Crimes),January 1, 1998, Chapter 25 - Counterfeiting And Forgery

Alabama Computer Crime Act, Computer Crime Statutes, May 1, 1995, Chapter 25 - Counterfeiting And Forgery

Federal Guidelines For Searching And Seizing Computers

Communications Privacy Act Of 1986, Chapter 119. Wire And Electronic Communications Interception And Interception Of Oral Communications

Electronic Communications Privacy Act Of 1986, Chapter 121--Stored Wire And Electronic Communications And Transactional Records Access

Research Needs For Computer Crime

Privacy Protection Act Of 1980, Chapter 21a - Privacy Protection Subchapter I--First Amendment Privacy Protection

Preparation Of Search Warrants For Computer-Related Evidence

Excerpts From Computer Search Warrants

Code Of Virginia, Title 18.2, Chap. 5 Crimes Against Property, Article 7.1. Computer Crimes

2004 CSI/FBI Computer Crime And Security Survey

2005 CSI/FBI Computer Crime And Security Survey

SOURCE: Computer Crime Research Center

50 posted on 02/02/2016 12:10:11 PM PST by Liz (SAFE PLACE? A liberal's mind. Nothing's there. Nothing can penetrate it.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: GOPJ; Arthur Wildfire! March
Sen Grassley probes Clinton aide's refusal to cooperate with investigators / By Sarah Westwood / Wash/Examiner / Feb 2, 2016

A top aide to Hillary Clinton "refused" to cooperate with investigators looking into whether the Clinton team suppressed a 2012 records request that could have exposed their private email use years before a separate congressional inquiry did so, Sen. Chuck Grassley said Monday.

Senate Judiciary Committee chairman Grassley raised concerns about the role Cheryl Mills, then-chief of staff to Clinton, played in blocking a Freedom of Information Act request for Clinton's email use in a pair of letters to the State Department and the agency's inspector general Monday.

Grassley cited an inspector general report made public in January that detailed, among other things, the extent of officials' knowledge of Clinton's private email use throughout the State Department. Dozens of agency staff were aware Clinton used private addresses to shield her communications.

But Mills intervened when a watchdog group, Citizens for Responsibility and Ethics in Washington, submitted a FOIA request for records "sufficient to show the number of email accounts of, or associated with, Secretary Hillary Rodham Clinton."

"Ms. Mills and senior department officials knew about Secretary Clinton's use of private email for official correspondence since they were sending emails to her non-government email address," Grassley wrote in his letters Monday. "They would have known instantly of records responsive to that request."

"Yet, it was approximately five months later before the department officially responded to CREW's request for email accounts associated with Secretary Clinton," the Iowa Republican continued. "And its response was misleading, at best: 'no records responsive to your request were located.' "

However, more recent FOIA requests over Clinton's emails have forced the release of thousands of responsive records, including the 55,000 pages of her emails presently published or under review by the State Department.

Grassley said Mills "refused to speak with" officials in the State Department's inspector general office when they approached her about her involvement in smothering CREW's records request in 2012.

According to the inspector general, a State Department spokesman had flagged the potentially damaging FOIA request for Mills, who passed it on to a trusted staffer and White House liaison and instructed her to find out how the agency planned to handle the request. Months later, the watchdog group received a notice that the records they sought did not exist.

Grassley demanded to know why the State Department waited so long to respond to such a simple request, and why the eventual response failed to turn up documents that clearly existed.

he State Department has come under fire over the past year for its handling of FOIA requests, which more than doubled after the discovery of Clinton's private email use in March of last year.

Agency officials have battled dozens of FOIA lawsuits in court, only to have judges shoot down State's arguments against releasing Clinton's records. A handful of such federal cases has forced the agency to hand over documents related to her diplomatic tenure.

http://www.washingtonexaminer.com/grassley-probes-clinton-aides-refusal-to-cooperate/article/2582202

51 posted on 02/02/2016 12:29:26 PM PST by Liz (SAFE PLACE? A liberal's mind. Nothing's there. Nothing can penetrate it.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: jazusamo

bkmk


52 posted on 02/02/2016 12:33:18 PM PST by AllAmericanGirl44
[ Post Reply | Private Reply | To 1 | View Replies]

To: jazusamo; Liz; LucyT
I wonder who/what was "REDACTED"?

Surprised to see A Lewis. New name in Hillary email scandal? Ann Lewis, Dem strategist?

Anne Lewis is CEO of Anne Lewis Strategies, a Democratic fundraising firm with clients in both the political and nonprofit world.

Movers & Shakers: Anne Lewis

Hmmm..................

53 posted on 02/02/2016 1:31:55 PM PST by thouworm ("The further a society drifts from truth, the more it will hate those who speak it." --Orwell)
[ Post Reply | Private Reply | To 1 | View Replies]

To: thouworm

Sood catch....seems like the clintonoids made out like bandits.

Taxpayers were relegated to the loser list.


54 posted on 02/02/2016 2:00:52 PM PST by Liz (SAFE PLACE? A liberal's mind. Nothing's there. Nothing can penetrate it.)
[ Post Reply | Private Reply | To 53 | View Replies]

To: thouworm

It looks Like those emails are addressed to Lewis A. Lukens, at that time the Dep Asst SOS.


55 posted on 02/02/2016 2:39:01 PM PST by jazusamo (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 53 | View Replies]

To: jazusamo

thanks for correction! I was getting ready to post another sleuthing post. :-)

How did I repeatedly misread the punctuation? only excuse.... Iowa Caucus prevented me from getting enough sleep. ;)

Now Ann Lewis is still suspect in my mind. lol


56 posted on 02/02/2016 2:55:14 PM PST by thouworm ("The further a society drifts from truth, the more it will hate those who speak it." --Orwell)
[ Post Reply | Private Reply | To 55 | View Replies]

To: thouworm

Don’t feel bad, when I first went back and looked I thought you were right until I remembered writing a keyword “Lewis Lukens.”

I checked and found out his middle initial is A. :-)


57 posted on 02/02/2016 3:13:40 PM PST by jazusamo (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 56 | View Replies]

To: Liz

58 posted on 02/02/2016 6:00:24 PM PST by Grampa Dave (Delegate count to date: Cruz 8, Trump 7, Rubio 7, Carson 3, Bush 1, Paul 1)
[ Post Reply | Private Reply | To 50 | View Replies]

To: Grampa Dave

I love those graphics, FRiend! :-)


59 posted on 02/02/2016 6:22:27 PM PST by jazusamo (Have YOU Donated to the Freep-a-Thon? https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 58 | View Replies]

To: Nailbiter

bflr


60 posted on 02/03/2016 1:50:04 AM PST by Nailbiter
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-64 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson