Please circulate this information in your email groups and clubs.
To: Doctor Raoul
Berger took those stolen documents to his corporate office. Who cleans that office? Certainly not anyone with a security clearance. Considering he was breaking the law to steal those code word documents, I doubt Berger took the protections necessary to protect our nations security while they were in his office.
2 posted on
04/02/2005 6:47:04 PM PST by
Doctor Raoul
(Support Our Troops, Spit On A Reporter)
To: Doctor Raoul
7 posted on
04/02/2005 6:58:30 PM PST by
ex-Texan
(Mathew 7:1 through 6)
To: Doctor Raoul
We get the Government that we deserve, Jefferson was certainly right.
What was the JFK quote about intellect in or at (Monticello?) that never had there been such a collection of Intellect gathered in one place with the exception of when Jefferson dined there alone.
8 posted on
04/02/2005 7:00:01 PM PST by
TexasTransplant
(NEMO ME IMPUNE LACESSET)
To: Doctor Raoul
IF I'm being old-n-senile, forgive me.
But, isn't this info that was exposed years ago, here at FR??? And no one paid attention? And we were labeled the VRWC out to get the klintler regime?
To: Doctor Raoul
A Patriot Died Protecting What Sandy Berger Stole And Clinton Laughs) Why not? The wimpy liberals and Democrats are spitting in the face of our soldiers WHILE they are dying in service to our country. Hell, they wanted to elect a traitor for President.
Scares me that we came so close to having our Chief Executive be a traitorous wuss who hates this country and will gladly sell it to the highest bidder. And to have Teresa as our first later would nauseate any thinking person who remembers what classy first ladies Barbara, Laura and Nancy were. Hildy is another matter but at least she tried to keep her fangs at bay while first lady.
To: Doctor Raoul
Exactly what was his government status that allowed him access to sensitive material? Seems like he was no more entitled to be there than someone off the street..and no punishment?? this is bogus what is he an Illegal immigrant to be judged in a manner Superior to us ordinary citizens!!! Why do we coddle criminals!!
16 posted on
04/02/2005 7:17:22 PM PST by
Fast1
(Destroy America buy Chinese goods,Shop at Wal-Mart 3/18/05 American was gone when I woke up)
To: Doctor Raoul
Oh rook, nukreer secrets
35 posted on
04/02/2005 9:53:57 PM PST by
John Lenin
(The constitution has been overthrown....... Isn't protecting the border in there ?)
To: Doctor Raoul
Where are the journalists? Who are the Woodward & Bernstein of the right?
42 posted on
04/03/2005 11:01:28 PM PDT by
lainie
To: Doctor Raoul
This is a vanity article I posted last summer when this story first broke. I make the point through personal experince with classified data, that Berger's claims of an 'honest' mistake is an absolute lie.
As with the Clintonistas' Modus Operandi in the past, they count on the media not asking the difficult questions. Also, they count on those in the public with no personal experience or knowledge to know any difference when they lie. My goal with this article is to pose the difficult questions and to inform those without personal knowledge of how classified data is handled how the circumstances posed by Berger and his defenders is a lie.
I called our local Clear Channel station the night after this story broke and spoke for about 10 minutes describing the procedures used to handle classified information. The following is a basic description of what I said ...
1) A person who wishes to review classified information at a given facility must have his/her clearance on file with the security office that has legal custody of the information.
2) Once they arrive to the facility, they must show their credentials to identify themselves, sign into the facility - maybe issued a badge indicating their clearance and access and escorted to the room where the material will be reviewed.
3) A quick sidebar on program access and document marking. The term "Access" refers to the concept of "Need to Know". The fact you have a clearance that matches the level required to have access to the material does not establish your "need to know". It must be determined by someone like a program manager or security personnel that your job function requires access to certain information. If you are granted access, you may be required to go through another level of investigation. Some levels of access (at least the ones I was exposed to) are known as "Special Need to Know" or SNTK (pronounced Snick) and "Special Access Required" or SAR. Programs with these designations require special prominent markings on each page of a classified document along with the classification level. Believe it or not, after all the markings (top and bottom) there usually is enough room for the content of the page.
4) I should also mention that each paragraph of the document starts with a designation indicating the classification level of that paragraph. This would look like (U), (C), (S), (S/SAR), (S/SNTK), (TS) or (TS/SAR). Every page is marked top and bottom based upon the highest level of any paragraph on that page. ie. it's possible to have an unclassified page in a top secret document. And as you might think, the overall classification of the document is classified at the highest level of any single page.
5) This next point is especially important in light of the current investigation. Every page is marked "Page x of y Pages". For example page 13 of a 32 page document would be clearly marked in the banner section of the page "Page 13 of 32 Pages". This is done for obvious reasons - if any page is missing, it can be accounted for. The page count is also part of the document's registration in the security catalog.
6) Once in the room, the container (probably a safe i.e. a very heavy duty file cabinet with heavy combination locks with different combinations on each drawer) is opened. This process should be logged by security personnel.
7) The documents are taken from the container. All classified documents are stamped (each page) with items such as a control number, date of creation, level of clearance (top and bottom), program name indicating what access is required and eventual dispensation (i.e. when the material is designated to destruction if applicable).
8) If the documents are classified "top secret", each document has a log on the cover sheet. EACH time a person has access to this information, they must sign and date it.
9) The material is not to be removed (ie stuffed in underwear, socks ... etc) without approval of security personnel. If this takes place, the transfer is documented on both ends of the transaction. If the material is top secret or above, it requires at least two cleared people as an escort.
10) If you travel overnight, the material is not to be kept in your hotel/motel room but instead must be taken to an approved facility. Arrangements are usually made in advance. Security people do not like suprise visits. They like to make them but not receive them.
11) No photocopies are to be made or notes copied without the proper security personnel logging this activity and making appropriate markings (mentioned above) on the documents.
12) This material is frequently audited by internal security agents and is subject to "suprise" audits conducted by military, FBI or other external security personnel.
13) People given access to this type of information are briefed and attend classes on how to handle this material - ie. no excuses for "honest mistakes".
14) As the NSA for the Clinton administration, I imagine Berger was personally responsible that this protocol was designed, implemented and enforced by his staff - at least in an appropriately managed administration. This would apply to government employees, officials, military personnel and civilians under contract and extended clearances issued by the DoD, DoE or other intel operations.
15) As such, ANYBODY who has worked in this environment and heard Mr. Berger's comments yesterday about being "sloppy" and "an honest mistake" knows beyond any doubt that he was not only lying, but this was a premeditated act.
16) I left the aerospace business(as an engineer) in 1993 so these comments are based upon the security world of that time. Only Lord knows how the Clinton administration changed things during his 8 years.
That summarizes what I mentioned to Steve Cannon of WTVN 610 AM (Columbus, Oh) the night after the story broke.
I should have added another issue that may pertain to the current case. The concept of "Working papers". This would be scratch material that is never intended to end up in a document being prepared. For example, preliminary drafts, graphics with various scales, handdrawn sketches, ... etc. Usually, this kind of material is kept in a folder or envelope which is marked as a regular document would be. This folder falls under the same criteria as a regular document ie locking up when not being used ... etc. Usually, this material is collected on a regular basis when the work is finished and tossed into a "burn barrel". The burn barrel is emptied periodically by cleared personnel and either burned or processed through an approved shredder (ends up as dust).
The latest word I have heard is that this material was classified "Code Word Access". Folks, if true, this is "Above Top Secret" ie. John Pollard type material.
So the question comes to mind, why would anybody do such a thing under conditions where he knew he stood a huge chance of being caught? The mission must have been extraordinary for such a risk. The presumption is that he wanted to alter or remove and destroy material that implicated either himself, or quite possibly Mr. Clinton. The fact that some of the material is "lost" implies that regardless of the consequences, the mission has been accomplished with his current situation collateral damage.
Webb Hubbell's infamous quote "I guess I'll have to roll over again for Hillary" comes to mind. Another example of the Clinton whirlwind leaving a trail of destruction in its wake.
I should stress that I'm no security expert - but I did work in that environment for nearly 12 years as an engineer in the aerospace industry (stealth technology). Amongst my duties, I was also the secured computer contact person during our department's audits with "The customer" and the FBI. This included things like proving procedures were being followed concerning the registering, cataloging and tracking of classified storage media, secured networks, hardcopy audit trails ... etc. It was not very exciting work - very boring but also needed.
Because of this work, I have a good idea of what that part of the world looks like. Who knows though after #42 and his crowd. I remember how O'leary (spelling) turned the DoE upside down with her wacky ideas of security. Remember the classified media supposedly found behind the copy machine during the Wen Ho-Li case? I have a friend who works for a private computer consulting firm that is contracted by the DoE and I think the DoD to perform inspections at government and contractor facilities. He told me the rules changed significantly during Clinton's years (to the worse) but I have no first hand knowledge
43 posted on
04/03/2005 11:24:00 PM PDT by
tang-soo
(Prophecy of the Seventy Weeks - Read Daniel Chapter 9)
To: Doctor Raoul
47 posted on
04/04/2005 5:23:49 AM PDT by
SeaBiscuit
(God Bless all who defend America and the rest can go to hell.)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson