Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: All
At her UN presser last Tuesday, Hillary said she did not use her private server located in her home on Chappaqua to communicate anything confidential.......and that she did not send classified information over the unsecured server.

==========================================================

WHAT DID HILLARY DO WITH CLASSIFIED INFORMATION?

REFERENCE EXCERPT The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic.[1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001.

It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.[2]

The U.S. government specifies in some detail the procedures for protecting classified information. The rooms or buildings where classified material is stored or handled must have a facility clearance at the same level as the most sensitive material to be handled. Good quality commercial physical security standards generally suffice for lower levels of classification; at the highest levels, people sometimes have to work in rooms designed like bank vaults (see Sensitive Compartmented Information Facility - SCIF).

Classified U.S. government documents are typically required to be stamped with their classification on the cover and at the top and bottom of each page. It is often a requirement that each paragraph, title and caption in a document be marked with the highest level of information it contains, usually by placing appropriate initials in parentheses at the beginning of the paragraph, title, or caption.

It is common to require that a brightly colored cover sheet be affixed to the cover of each classified document to prevent observation of a possibly classified title by someone unauthorized (shoulder surfing) and to remind users to lock up the document when it is unattended. The most sensitive material requires two-person integrity, where two cleared individuals are responsible for the material at all times. Approved containers for such material have two separate combination locks, both of which must be opened to access the contents.[citation needed]

There are restrictions on how classified documents can be shipped. Top Secret material must go by special courier. Secret material can be sent within the U.S. via registered mail, and Confidential material by certified mail.

Electronic transmission of classified information largely requires the use of National Security Agency approved/certified "Type 1" cryptosystems utilizing NSA's unpublished and classified Suite A algorithms.

The classification of the Suite A algorithms categorizes the hardware that store them as a Controlled Cryptographic Item(CCI) under the International Traffic in Arms Regulations, or ITAR. CCI equipment and keying material must be controlled and stored with heightened physical security, even when the device is not processing classified information or contain a cryptographic key.

NSA is currently moving towards implementing what it's calling Suite B which is a group of commercial algorithms such as Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA), Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic curve Diffie–Hellman (ECDH). Suite B provides protection for data up to Top Secret on non-CCI devices. This is especially useful in high risk environments or operations needed to prevent Suite A compromise. These less stringent hardware requirements stem from the device not having to "protect" classified Suite A algorithms.[34]

Specialized computer operating systems known as trusted operating systems are available for processing classified information. These enforce the classification and labeling rules described above in software. However, as of 2005, they are not considered secure enough to allow uncleared users to share computers with classified activities. So if one creates an unclassified document on a secret device, the resultant data is classified secret until it can be manually reviewed. Computer networks for sharing classified information are segregated by the highest sensitivity level they are allowed to transmit, for example, SIPRNet (Secret) and JWICS (Top Secret-SCI).

The destruction of certain types of classified documents requires burning, shredding, pulping or pulverizing using approved procedures and must be witnessed and logged.

Classified computer data presents special problems.--snip-- (http://en.wikipedia.org/wiki/Classified_information_in_the_United_States)

======================================================

REFERENCE EXCERPT The Office of Inspector General (OIG) in response to the FY 1999 Intelligence Authorization Act, required the OIG to ". . . conduct a review of State Department Headquarters policies and procedures for handling classified information, and submit a report to the appropriate committees of Congress with any needed recommendations for improvements ...." Congress requested the audit as a result of several reported instances where highly classified information was unaccounted for.--SNIP--

4 posted on 03/18/2015 4:55:02 AM PDT by Liz
[ Post Reply | Private Reply | To 3 | View Replies ]


To: Liz

Rules, laws, regulations etc are for us little people, not the special ones who are appointed to rule over us. I mean, how can Obama and Hillary make our lives better if they are expected to follow the same pesky rules as the rest f us? This would be funny if it wasn’t so sad, and dangerous.


6 posted on 03/18/2015 5:20:38 AM PDT by corlorde (Oath Keeper)
[ Post Reply | Private Reply | To 4 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson