Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: annalex

You will never see this list in the public media.

red


17 posted on 10/16/2016 4:23:58 PM PDT by Redwood71 (uad.)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Redwood71

Of course not. Their method is to

1. Trivialize the purpose. Originally it was, according to them, to have a private life similar to how Colin Powell had it. This is hard to do when you have several servers, smartphones and backup systems destroyed in violation of a subpoena.

2. Trivialize the crime. Systematic destruction of evidence is never brought up; instead it is always some hapless junior help smashing a Blackberry without Hillary’s knowledge.

3. Lying about the security levels. Examples are given of confidential level violated (that is lower level) and of classification expiring on some of them. The complete picture (including 8 top secret items) is never emerging.

4. Presenting a complex and voluminous nature of the security breach as incompetence or forgetfulness, — a series of mishaps by an aging woman lacking information technology savvy. Instead, a massive and brazen, conscious violation of basic information security requirements should be a story in itself, — but it never was.


20 posted on 10/16/2016 4:37:40 PM PDT by annalex (fear them not)
[ Post Reply | Private Reply | To 17 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson