Skip to comments.
GOP Leaders Seek Probe of Berger Papers
Breitbart/AP ^
| 10/11/2006
| ERICA WERNER/ AP
Posted on 10/11/2006 11:51:57 AM PDT by tobyhill
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20 ... 141-160, 161-180, 181-200, 201-218 last
To: tobyhill
Will they check Sandy's Instant Messages too?
To: Darkwolf377
or at least the concept of november elections a month away.
To: Clintonfatigued; Txsleuth; ravingnutter
Berger stole the after action reports for the millenium bombings. the notes that were written in the margins - we will never know what they were, and why it was so vital he take them.
To: tobyhill; All
This is an article I posted last year when this story first broke. I make the point through personal experince with classified data, that Berger's claims of an 'honest' mistake is an absolute lie.
As with the Clintonistas' Modus Operandi in the past, they count on the media not asking the difficult questions. Also, they count on those in the public with no personal experience or knowledge to know any difference when they lie. My goal with this article is to pose the difficult questions and to inform those without personal knowledge of how classified data is handled how the circumstances posed by Berger and his defenders is a lie.
I called our local Clear Channel station the night after this story broke and spoke for about 10 minutes describing the procedures used to handle classified information. The following is a basic description of what I said ...
1) A person who wishes to review classified information at a given facility must have his/her clearance on file with the security office that has legal custody of the information.
2) Once they arrive to the facility, they must show their credentials to identify themselves, sign into the facility - maybe issued a badge indicating their clearance and access and escorted to the room where the material will be reviewed.
3) A quick sidebar on program access and document marking. The term "Access" refers to the concept of "Need to Know". The fact you have a clearance that matches the level required to have access to the material does not establish your "need to know". It must be determined by someone like a program manager or security personnel that your job function requires access to certain information. If you are granted access, you may be required to go through another level of investigation. Some levels of access (at least the ones I was exposed to) are known as "Special Need to Know" or SNTK (pronounced Snick) and "Special Access Required" or SAR. Programs with these designations require special prominent markings on each page of a classified document along with the classification level. Believe it or not, after all the markings (top and bottom) there usually is enough room for the content of the page.
4) I should also mention that each paragraph of the document starts with a designation indicating the classification level of that paragraph. This would look like (U), (C), (S), (S/SAR), (S/SNTK), (TS) or (TS/SAR). Every page is marked top and bottom based upon the highest level of any paragraph on that page. ie. it's possible to have an unclassified page in a top secret document. And as you might think, the overall classification of the document is classified at the highest level of any single page.
5) This next point is especially important in light of the current investigation. Every page is marked "Page x of y Pages". For example page 13 of a 32 page document would be clearly marked in the banner section of the page "Page 13 of 32 Pages". This is done for obvious reasons - if any page is missing, it can be accounted for. The page count is also part of the document's registration in the security catalog.
6) Once in the room, the container (probably a safe i.e. a very heavy duty file cabinet with heavy combination locks with different combinations on each drawer) is opened. This process should be logged by security personnel.
7) The documents are taken from the container. All classified documents are stamped (each page) with items such as a control number, date of creation, level of clearance (top and bottom), program name indicating what access is required and eventual dispensation (i.e. when the material is designated to destruction if applicable).
8) If the documents are classified "top secret", each document has a log on the cover sheet. EACH time a person has access to this information, they must sign and date it.
9) The material is not to be removed (ie stuffed in underwear, socks ... etc) without approval of security personnel. If this takes place, the transfer is documented on both ends of the transaction. If the material is top secret or above, it requires at least two cleared people as an escort.
10) If you travel overnight, the material is not to be kept in your hotel/motel room but instead must be taken to an approved facility. Arrangements are usually made in advance. Security people do not like suprise visits. They like to make them but not receive them.
11) No photocopies are to be made or notes copied without the proper security personnel logging this activity and making appropriate markings (mentioned above) on the documents.
12) This material is frequently audited by internal security agents and is subject to "suprise" audits conducted by military, FBI or other external security personnel.
13) People given access to this type of information are briefed and attend classes on how to handle this material - ie. no excuses for "honest mistakes".
14) As the NSA for the Clinton administration, I imagine Berger was personally responsible that this protocol was designed, implemented and enforced by his staff - at least in an appropriately managed administration. This would apply to government employees, officials, military personnel and civilians under contract and extended clearances issued by the DoD, DoE or other intel operations.
15) As such, ANYBODY who has worked in this environment and heard Mr. Berger's comments yesterday about being "sloppy" and "an honest mistake" knows beyond any doubt that he was not only lying, but this was a premeditated act.
16) I left the aerospace business(as an engineer) in 1993 so these comments are based upon the security world of that time. Only Lord knows how the Clinton administration changed things during his 8 years.
That summarizes what I mentioned to Steve Cannon of WTVN 610 AM (Columbus, Oh) the night after the story broke.
I should have added another issue that may pertain to the current case. The concept of "Working papers". This would be scratch material that is never intended to end up in a document being prepared. For example, preliminary drafts, graphics with various scales, handdrawn sketches, ... etc. Usually, this kind of material is kept in a folder or envelope which is marked as a regular document would be. This folder falls under the same criteria as a regular document ie locking up when not being used ... etc. Usually, this material is collected on a regular basis when the work is finished and tossed into a "burn barrel". The burn barrel is emptied periodically by cleared personnel and either burned or processed through an approved shredder (ends up as dust).
The latest word I have heard is that this material was classified "Code Word Access". Folks, if true, this is "Above Top Secret" ie. John Pollard type material.
So the question comes to mind, why would anybody do such a thing under conditions where he knew he stood a huge chance of being caught? The mission must have been extraordinary for such a risk. The presumption is that he wanted to alter or remove and destroy material that implicated either himself, or quite possibly Mr. Clinton. The fact that some of the material is "lost" implies that regardless of the consequences, the mission has been accomplished with his current situation collateral damage.
Webb Hubbell's infamous quote "I guess I'll have to roll over again for Hillary" comes to mind. Another example of the Clinton whirlwind leaving a trail of destruction in its wake.
I should stress that I'm no security expert - but I did work in that environment for nearly 12 years as an engineer in the aerospace industry (stealth technology). Amongst my duties, I was also the secured computer contact person during our department's audits with "The customer" and the FBI. This included things like proving procedures were being followed concerning the registering, cataloging and tracking of classified storage media, secured networks, hardcopy audit trails ... etc. It was not very exciting work - very boring but also needed.
Because of this work, I have a good idea of what that part of the world looks like. Who knows though after #42 and his crowd. I remember how O'leary (spelling) turned the DoE upside down with her wacky ideas of security. Remember the classified media supposedly found behind the copy machine during the Wen Ho-Li case? I have a friend who works for a private computer consulting firm that is contracted by the DoE and I think the DoD to perform inspections at government and contractor facilities. He told me the rules changed significantly during Clinton's years (to the worse) but I have no first hand knowledge.
204
posted on
10/11/2006 7:52:29 PM PDT
by
tang-soo
(Prophecy of the Seventy Weeks - Read Daniel Chapter 9)
To: tang-soo
To: Clintonfatigued; Txsleuth
To: tennmountainman
It was the good ole boy network. Don't mess with us and we won't mess with you. Seems like the democrats broke their "Truce". You know the story about the frog and the scorpion?
207
posted on
10/11/2006 7:59:18 PM PDT
by
Mad_Tom_Rackham
(Democrats. French, but more cowardly.)
To: tobyhill
What took so freakin long?
To: Ben Chad
They weren't going to say or investigate anything as long as Berger kept his mouth closed but he started running the muck about Bush and NK so now he becomes fair game.
209
posted on
10/11/2006 8:05:18 PM PDT
by
tobyhill
(The War on Terrorism is not for the weak.)
To: oceanview
Wow...that post had a lot of information...
No wonder the "big guns" are campaigning for Sestak in PA...
They were given orders to go after the terrorists using visa problems, anything...but, didn't, even though Able Danger had a lot of them indentified.
Yeppers...Weldon better be careful...because if he wins, he could be in "danger"...
210
posted on
10/11/2006 8:37:47 PM PDT
by
Txsleuth
(FREEPATHON TIME--You need FR, you know you do, so please don't forget to donate!!)
To: WoofDog123
Hey, whatever gets them off "We want Democrats to LIKE us" mode...
211
posted on
10/11/2006 9:06:57 PM PDT
by
Darkwolf377
(Republican, atheist, pro-life)
To: Txsleuth
To: Enchante
The name Gore-Lick, I know freepers have said it before but its just too sick. And maybe Gods poetic justice?
To: Darkwolf377
The Republicans are at last discovering their Inner Adult.The "Adult" needs to get busy and fix stuff.
214
posted on
10/11/2006 9:50:26 PM PDT
by
madison10
(Live your life in such a way that the preacher won't have to lie at your funeral.)
To: sweetiepiezer
To: tang-soo
Good post.
My reaction was by using the description of working papers the hunt was more about who was working on the papers. It would not be acceptable in their orchestrated 9/11 Commission to find the initials or the mention of a certain HRC anywhere on classified documents.
To: tang-soo
I thought this whole affair had been successfully buried.
I'm happy to see somebody is attempting to do the right thing, but Berger still got off far too light.
If this had been Rove it would have been front page news for six months.
To: tang-soo
Thanks for the info.... and on a personal note, I have several family members who have worked with very high levels of classification who say that careers have been destroyed for far far far less than what Sandy Burglar did and that there can be no doubt that he should not only be barred from ever again working with classified materials, but he should be doing some serious jail time. Fry the bastard!!
218
posted on
10/12/2006 10:01:30 AM PDT
by
Enchante
(There are 3 kinds of lies: Lies, Damned Lies, and the Drive-By Media)
Navigation: use the links below to view more comments.
first previous 1-20 ... 141-160, 161-180, 181-200, 201-218 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson