Posted on 01/25/2016 5:38:46 PM PST by Sean_Anthony
Golly, how could that have happened?
Hillary Clintonâs use of an insecure secret email server was obviously a problem in and of itself, but the steady drip, drip, drip of information has revealed that Mrs. Clintonâs latest scandal goes well beyond mere procedural issues. Just last week we learned that her communications contained information from some of the countryâs most secretive and highly guarded programs. We also learned that China and Russia probably had access to it. Now, because itâs a day that ends in âY,â Hillaryâs email scandal has gotten worse.
According to the New York Post, the FBI is interested in exactly how such sensitive and tightly controlled information made its way to Hillaryâs server. The answer seems to be âher team ignored regulations and cut & pasted it into their emails.â
Okay, so I just tried this with the free version. I took a picture of my last post (on my laptop display) with it and OCR’d it. It worked and fast. Got a few things wrong, but those could be easily correct.
I hear what you’re saying, but you can use any camera to take the picture. It doesn’t have to be the phone the app is on.
I guess the point is, there are probably plenty of ways to jump the air gap. Pencil being another one.
One of the places that I had worked did not allow cell phones, pagers, or outside laptops. I had to bring in programs via floppy disk, which was scanned when arriving and leaving the facility. Still some people were smuggling out hard drives, with data winding up in disreputable hands.
Aren’t they physically blocked, too? I’ve heard they are epoxy potted or CA glued shut in addition to being electronically deactivated.
.
You could do that. But think of the effort to hand write out more than 1300 emails, transcribe them and then email them.
Technically, you’re not allowed to bring in a USB or a disc (or a phone) into the building where these systems are housed.
I’ve been in there as a guest.
I was held in a tiny ‘break room’. I was searched. I had to leave my purse and anything in my pockets.
As I walked through the building, people were very friendly, but everyone was stuck at their desks. They had all covered their monitors with sheets. They had to stay like this until I was officially gone.
No electronics were allowed in. No USB or discs of any kind. NO PHONES.
In order for this to have happened, people would’ve had to intentionally found a way to burn the info into a drive or disc - that would’ve had to have been smuggled into the building - get it out, then put the information onto a non-secure computer and emailed to Clinton.
These are extreme measures. Not a possible ‘mistake’. Not a ‘cut and paste’ job.
Hell. The freaking lines in this system have to be at least three feet away from basic internet cables. Yes. EVEN THE LINES are secure. This is a totally independent system.
These are SERIOUS crimes. Not only Clinton, but whatever aid enabled this, committed treason. The sheer number of laws that would’ve had to have been broken to do this would be enough to bury a person UNDER the jail.
The ‘copy and paste’ narrative is trying to downplay the deliberate intent of the actual actions.
This is Snowden-level espionage.
I’d like to see Kendal, Blumenthal,Cheryl Mills and Huma Weiner all get Schlonged.
Maybe Bill and Chelsea too. Can they be prosecuted for sharing the data? I would love to see the whole crime family get schlonged.
In the Bill Clinton years we were selling Nuclear technology to China for Clinton campaign funds.
One day the true cost for Bills blow jobs will be paid with a shower of nukes on American soil.
Not talked about much, but the Blackberry she used was a personal, unsecured device. Any foreign intelligence agency with passing interest could have intercepted phone calls, text messages and email.
Imagine this possible scenario:
Humma takes Hillarys Blackberry and password, and reads all top secret data, then emails “need to know” to the Clinton crime server.
Need to know would be data that Bill needs for squeezing foreign leaders for speech money.
I’m thinking Humma, the Muslim, was in reality calling our State Department shots.
When she read requests for more security, Clinton never got them. Infidels don’t need security. But data for cash was sent.
I have heard that the FBI is now looking at the cash operation.
Hillary was in charge of drinking, traveling, and setting up payoffs to Bill. Our foreign policy was slush fund for the Clinton crime gang. Nothing more than that.
I thought she had some type of secured phone and email from State, and that she chose to use an additional email server and phones.
I’m thinking Humma had all her Id’s and passwords, and was probably emailing orders from Hillarys state hardware and ID’s.
I’m thinking Hillary was just drinking and bedding muslim girls.
Why Isn’t General Petraeus out on every Sunday morning show shouting “foul” after his indictment of far less intrusive data to his mistress?
**********************************************
Maybe that’s why Ash Carter, SedDef, is now reviewing and deciding whether to demote Petraeus to a 3-star general. It will have large financial consequences for Petraeus if Carter does this (will have to pay back money he’s received while retired as a 4-star general). This is happening after Petraeus testified before the Benghazi committee (in private) & Gowdy said it was very helpful, so helpful in fact that he wants to talk to Petraeus again. Evidently Petraeus was helpful in the area of what assets were available to help those calling for help in Benghazi and if not available, why not. Between this & Hilly’s email problem, I’m guessing pressure is being brought to bear for Petraeus to stay quiet.
you can scan and .pdf and then take a snapshot
Many systems have audits.
A record written in a journal. Who signed on and when, what they looked at.
If Hillary was in Russia and someone is at her desk in the USA, signing in and emailing, a muslim sisterhood lover, the Chinese, God knows who else.... we have an audit trail of crimes. Even Bill Clintons server could have audits indicating crime.
So audit utilities of the system are probably being used to build a criminal case. You can’t lock up a former first Lady without rock solid proof, so I bet they are looking at more than we know.
In fact, I bet they now have proof of perjury.
Can you please clarify what you mean when you say it is “Physically Impossible to Copy and Paste?” Are you saying that in a classified email the cut and paste function, like you would see in a routine word document, does not work?
Copy and Paste only works between programs running on the same computer. The classified information was on a network that was isolated from the public internet - no computer connected to that network is allowed to also connect to the public internet.
Hillary's mail server was connected to the public internet, and you had to connect to the public internet to send email to her. You cannot copy and paste between two different computers connected to two different networks that can't talk to each other.
Thank you.
yes
Even receiving classified email and not reporting it is criminal.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.