Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

The Clearest (No Spin) Summary of FBI Report on Hillary Clinton Email
Sharyl Attkisson blog ^ | on September 30, 2016 | Sharyl Attkisson

Posted on 10/16/2016 3:54:47 PM PDT by annalex

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-4041-51 next last

Sharyl Atkinson: Investigative Journalist who tries to give you information others don't want you to have. What you do with it is your own business. Do your own research. Seek advice from those you trust. Make up your own mind.

1 posted on 10/16/2016 3:54:47 PM PDT by annalex
[ Post Reply | Private Reply | View Replies]

To: A.A. Cunningham; andyk; AlexW; BatGuano; bayliving; Belteshazzar; bert; Bigg Red; bigheadfred; ...

If you want to be on this right wing, monarchy, paleolibertarianism and nationalism ping list, but are not, please let me know. If you are on it and want to be off, also let me know. This ping list is not used for Catholic-Protestant debates; all confessions are welcome.


2 posted on 10/16/2016 3:55:41 PM PDT by annalex (fear them not)
[ Post Reply | Private Reply | To 1 | View Replies]

To: annalex

Bookmark


3 posted on 10/16/2016 3:58:24 PM PDT by Chgogal (A woman who votes for Hillary is voting with her vagina and not her brain.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: annalex

Please put me on!


4 posted on 10/16/2016 3:59:33 PM PDT by duckbutt (Those who pay no taxes have no check on their appetite for services.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: duckbutt

Sure thing. Thank you.


5 posted on 10/16/2016 4:02:02 PM PDT by annalex (fear them not)
[ Post Reply | Private Reply | To 4 | View Replies]

To: upchuck

Ping to Sharyl’s List Upchuck :D


6 posted on 10/16/2016 4:03:52 PM PDT by KC_Lion ("I Cannot Spare Trump, He Fights" ~ Abraham Lincoln)
[ Post Reply | Private Reply | To 1 | View Replies]

To: annalex

Bookmark


7 posted on 10/16/2016 4:05:57 PM PDT by Flycatcher (God speaks to us, through the supernal lightness of birds, in a special type of poetry.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: annalex

Wow.

And Nixon is more guilty, more despised than Mao AND Stalin AND Lenin for erasing 18 minutes of tape ....

Sobering.


8 posted on 10/16/2016 4:07:45 PM PDT by Robert A Cook PE (I can only donate monthly, but socialists' ABBCNNBCBS continue to lie every day!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Jane Long; GOPJ; RitaOK; Tennessee Nana; sickoflibs; TADSLOS; AuntB; SgtBob; DollyCali; ...
David Kendall, the lawyer who had a thumb drive in his office safe is not a govt employee---and has no clearance to view SAP.

Politico reported 07/30/15 that Kendall, Hillary Clinton’s private lawyer, has a thumb drive containing classified information from as many as five U.S. intelligence agencies — but the State Department told POLITICO the law firm is taking “appropriate measures” to secure the files.

The agency declined to detail steps made to protect the sensitive information in attorney David Kendall’s possession, but the issue is raising concern among Republicans on Capitol Hill who’ve criticized Clinton’s handling of the email controversy. The thumb drive has copies of emails Clinton kept on a private server while she served as secretary of state, a trove now known to contain classified documents.

The agency told POLITICO that Clinton “does have counsel with clearance.” Kendall, a prominent Williams & Connolly attorney who defended former CIA director David Petraeus against charges of mishandling classified information, declined to comment.

Clinton’s campaign echoed the State Department. “The thumb drive is secure,” said Nick Merrill, a spokesman for the Democratic front-runner’s presidential campaign, referring questions to state.

Senate Judiciary Committee Chairman Chuck Grassley (R-Iowa) has asked the FBI to confirm that the thumb drive has been secured. “This raises very serious questions and concerns if a private citizen is somehow retaining classified information,” Grassley’s said in a letter sent late last week. He asked for more information on Kendall’s clearance and whether the lawyer was authorized to “be the custodian of classified national security information.” The FBI has not yet responded.

SOURCE Read more: http://www.politico.com/story/2015/07/hillary-clinton-email-thumbdrive-security-120833#ixzz4NFevKf19

cont

9 posted on 10/16/2016 4:10:51 PM PDT by Liz (SAFE PLACE? A liberal's mind. Nothing's there. Nothing penetrates it.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: All
The Kendall email confirms Hillary and her cronies' committing high crimes and misdemeanors::

<><> opening up the e-mail scandal to further questions;

<><> compromising L/E to evade prosecution;

<><> the reckless mishandling of classified information

<><> exposing our national-defense secrets to hostile powers;

<><>the mass destruction of 1000's of government records after Congress requested them;

<><>the obstruction of government investigations;

<><>the serial lies to Congress and to the public;

<><>the shocking failure to provide security for Americans stationed in Benghazi;

<><> making no attempt to rescue Americans during the terrorist siege in Benghazi;

<><>lying to Americans and to murdered Americans' families about the attack's cause;

<><> inventing a video story to cover inaction in Benghazi;

<><> the trumping up of a prosecution against the video producer;

<><> unbecoming conduct by scapegoating a video producer;

<><>the Clinton Foundation corruption visited on the State Dept;

<><> the sale of State Dept influence for foundation donations;

<><> perks, privileges and favors for shady donors at the expense of national security,

<><> the use of the State Department as an arm of the Clinton pay-to-play enterprise;

<><> profiting by stealing State Dept data belonging to the citizenry.

<><> rampant cronysism;

<><> using the State Dept budget as a personal ATM;

<><> turning the State Dept into a racketeering enterprise;

<><> conducting political activites on govt time.

10 posted on 10/16/2016 4:12:08 PM PDT by Liz (SAFE PLACE? A liberal's mind. Nothing's there. Nothing penetrates it.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: annalex
there's enough right there to put away over a dozen people NOT named Bill or HilLIARy Clinton...
11 posted on 10/16/2016 4:13:05 PM PDT by Chode (You Owe Them Nothing - Not Respect, Not Loyalty, Not Obedience, NOTHING! ich bin ein Deplorable...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: annalex

The sheer volume shows both sophistication and conscious design: it was a communications system deliberately built to handle sensitive documents bypassing government information security guidelines.

It was nothing like casual and personal communications that a politician or a public servant might wish to set up for her privacy.

So the question becomes: what was the purpose?

The recently leaked Podesta emails and leaked conscripts of clandestine speeches to foreign leaders shone a light on the question of purpose. The system was designed to be a secret communications channel to an elite worldwide community. Deniability and destructibility was built into the system: what we see now, with servers and backup drives disappearing or getting bleached clean of the data, is not incompetence. It was a way to communicate goals, methods and operations clearly, bypassing official channels, and then destroying the evidence.

The purpose was treason.


12 posted on 10/16/2016 4:15:21 PM PDT by annalex (fear them not)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Chode

PLEASE TELL me IT’S being reported by the MEDIAPUKES outlets please!!!


13 posted on 10/16/2016 4:15:24 PM PDT by RoseofTexas
[ Post Reply | Private Reply | To 11 | View Replies]

To: Liz

.
BFL
.


14 posted on 10/16/2016 4:15:41 PM PDT by editor-surveyor (Freepers: Not as smart as I'd hoped they'd be)
[ Post Reply | Private Reply | To 10 | View Replies]

To: RoseofTexas

I’m shaking with SHEER ANGER!! Dear God PLEASE HELP US..PLEASE!!!!!!!!!!!!!!!!!


15 posted on 10/16/2016 4:17:25 PM PDT by RoseofTexas
[ Post Reply | Private Reply | To 13 | View Replies]

To: annalex

This is an excellent research project!

Thanx for posting.

Clift notes version: hildabeast basically say FU to the laws


16 posted on 10/16/2016 4:21:00 PM PDT by thinden
[ Post Reply | Private Reply | To 1 | View Replies]

To: annalex

You will never see this list in the public media.

red


17 posted on 10/16/2016 4:23:58 PM PDT by Redwood71 (uad.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: annalex
Put me on your ping list, please!

Jesus Christ: You can't impeach Him and He ain't gonna resign.



18 posted on 10/16/2016 4:29:41 PM PDT by rdb3 (I'm worthless to one, but priceless to two. What am I?)
[ Post Reply | Private Reply | To 2 | View Replies]

To: annalex; rodguy911

Fox News Judge Jeanine Pirro preview from the Trump camp on Justice at 9 PM ET.


19 posted on 10/16/2016 4:35:57 PM PDT by Son House (The American Recovery and Reinvestment Act of 2009; the Original Legislative Fraud.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Redwood71

Of course not. Their method is to

1. Trivialize the purpose. Originally it was, according to them, to have a private life similar to how Colin Powell had it. This is hard to do when you have several servers, smartphones and backup systems destroyed in violation of a subpoena.

2. Trivialize the crime. Systematic destruction of evidence is never brought up; instead it is always some hapless junior help smashing a Blackberry without Hillary’s knowledge.

3. Lying about the security levels. Examples are given of confidential level violated (that is lower level) and of classification expiring on some of them. The complete picture (including 8 top secret items) is never emerging.

4. Presenting a complex and voluminous nature of the security breach as incompetence or forgetfulness, — a series of mishaps by an aging woman lacking information technology savvy. Instead, a massive and brazen, conscious violation of basic information security requirements should be a story in itself, — but it never was.


20 posted on 10/16/2016 4:37:40 PM PDT by annalex (fear them not)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-51 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson