Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Private Emails Reveal SoS Clinton Aide’s Secret Spy Network (nothing about bridesmaid's dresses)
propublica.com ^ | 3/27/15 | JEFF GERTH w/ Sam Biddle of, Gawker

Posted on 03/28/2015 3:56:18 AM PDT by Liz

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-84 next last

1 posted on 03/28/2015 3:56:18 AM PDT by Liz
[ Post Reply | Private Reply | View Replies]

To: Liz

Sid needs a subpoena.

L


2 posted on 03/28/2015 3:57:24 AM PDT by Lurker (Violence is rarely the answer. But when it is it is the only answer.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Liz

Having destroyed her copies Hillary has no way to refute purported hacked emails detailing all manner of bestiality. (Bwahha ha!)


3 posted on 03/28/2015 3:58:20 AM PDT by Gen.Blather
[ Post Reply | Private Reply | To 1 | View Replies]

To: Liz

Frankly, it looks like Hillary was running her own covert intelligence network outside the confines of the US Intelligence Center system.

If she ever had a US clearance, then she should have been required to sign statements regarding her loyalty and commitment to the overall intelligence posture of this country. Running your own unsanctioned network is counterintuitive to that tenet. At the very least, she committed a very serious criminal act IMO.


4 posted on 03/28/2015 4:03:28 AM PDT by Gaffer
[ Post Reply | Private Reply | To 1 | View Replies]

To: Liz

With all of the wedding planning she had to work on, showers for the bride, invite lists, flowers, etc. Hillary couldn’t have had time to read such emails. And, what difference does it make, at this point? /s


5 posted on 03/28/2015 4:07:52 AM PDT by doosee (Captain, we are approaching a new level of Hell.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Liz

We came, we saw, HE DIED. . .CACKLE, CACKLE, CACKLE!!!


6 posted on 03/28/2015 4:09:11 AM PDT by McBuff
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lurker
It’s unclear who tasked Blumenthal, known for his fierce loyalty to the Clintons, with preparing detailed intel briefing memos. It’s also not known who was paying him, or where the operation got its money. The memos were marked “confidential” and relied in many cases on “sensitive” sources in the Libyan opposition and Western intelligence and security services. Other reports focused on Egypt, Germany, and Turkey.

Golly watta treasure trove of valuable intel that someone with a "foundation" could peddle for big buck donations (/smirk).

7 posted on 03/28/2015 4:13:03 AM PDT by Liz
[ Post Reply | Private Reply | To 2 | View Replies]

To: Liz

The entire Clinton Crime Syndicate needs to be indicted on RICO charges. That the Democrats should even consider running her for president marks a new low for this country.


8 posted on 03/28/2015 4:15:29 AM PDT by txrefugee
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cindy

in case you’re lurking


9 posted on 03/28/2015 4:17:02 AM PDT by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gaffer
Does Blumenthal and Hillary and Obama know anything about MANPADs shoulder fired missiles being sold to ISIL/ISIS and AQIL in order to fight Assad? (verified by available intelligence).

REFERENCE ......though the intel memos were sent under Blumenthal’s name, the reports appear to have been gathered and prepared by Tyler Drumheller, a former chief of the CIA’s clandestine service in Europe who left the agency in 2005. Since then, he has established a consulting firm called Tyler Drumheller, LLC.

Tyler Drumheller has also been affiliated with a firm called DMC Worldwide, which he co-founded with Washington, D.C., attorney Danny Murray and former general counsel to the U.S. Capitol Police John Caulfield.

DMC Worldwide’s now-defunct website describes it at as offering “innovative security and intelligence solutions to global risks in a changing world.”

10 posted on 03/28/2015 4:18:18 AM PDT by Liz
[ Post Reply | Private Reply | To 4 | View Replies]

To: Liz

Likely because of TD and DMC principals’ former IC connections they may have trafficked in classified information or knew of it as being classified. Their former clearance requirements about disclosure and knowledge still remained in effect, as well as Herr Clinton’s duties.

In an apolitical intelligence context, these people would be prosecuted


11 posted on 03/28/2015 4:24:24 AM PDT by Gaffer
[ Post Reply | Private Reply | To 10 | View Replies]

To: All
FREEPERS, CALL YOUR REPS--Did the DOJ's Computer Forensics Division look into Hillary's State Dept server?

If not, why not?

======================================

REFERENCE Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is a crime in which a computer plays an essential part. Computer crime is a felony violation of section 1030 of the United States Code. Computer crime also violates copyright laws and property rights in some cases.

This type of crime is the illegal exploitation of computer technologies, usually to support crimes such as fraud, identity theft, sharing of information, and embezzlement. A link to the U.S. Department of Justice's website about e-crime and the DOJ's computer forensics activities is at their web site.

Examples of computer crime are:

<><> * Fraud achieved by the manipulation of computer records.

<><>* Spamming wherever outlawed completely or where regulations controlling it are violated.

<><> * Deliberate circumvention of computer security systems.

<><>>* Unauthorised access to or modification of programs (see software cracking and hacking).

<><>* Intellectual property theft, including software piracy.

<><* Industrial espionage by means of access to or theft of computer materials.

<><>* Identity theft where this is accomplished by use of fraudulent computer transactions.

<><>>* Writing or spreading computer viruses or worms. <>* "Salami slicing" is the practice of stealing money repeatedly in extremely small quantities

<><>* Denial-of-service attack, where company websites are flooded with service requests and their website is overloaded and either slowed or crashes completely

<><>* Making and digitally distributing child pornography

==================================================

•United States Code, Title 17 - Copyrights,January 1, 1998,

1.Chapter 1 - Subject Matter And Scope Of Copyright

2.Chapter 2 - Copyright Ownership And Transfer

3.Chapter 3 - Duration Of Copyright

4.Chapter 4 - Copyright Notice, Deposit, And Registration

5.Chapter 5 - Copyright Infringement And Remedies

6.Chapter 6 - Manufacturing Requirements And Importation

7.Chapter 7 - Copyright Office

8.Chapter 8 - Copyright Arbitration Royalty Panels

9.Chapter 9 - Protection Of Semiconductor Chip Products

10.Chapter 10 - Digital Audio Recording Devices And Media

11.Chapter 11 - Sound Recordings And Music Videos

==============================================

•United States Code, Title 18 - Crimes And Criminal Procedure (Part I - Crimes),January 1, 1998, Chapter 25 - Counterfeiting And Forgery

•Alabama Computer Crime Act, Computer Crime Statutes, May 1, 1995, Chapter 25 - Counterfeiting And Forgery

•Federal Guidelines For Searching And Seizing Computers

•Communications Privacy Act Of 1986, Chapter 119. Wire And Electronic Communications Interception And Interception Of Oral Communications

•Electronic Communications Privacy Act Of 1986, Chapter 121--Stored Wire And Electronic Communications And Transactional Records Access

•Research Needs For Computer Crime

•Privacy Protection Act Of 1980, Chapter 21a - Privacy Protection Subchapter I--First Amendment Privacy Protection

•Preparation Of Search Warrants For Computer-Related Evidence

•Excerpts From Computer Search Warrants

•Code Of Virginia, Title 18.2, Chap. 5 Crimes Against Property, Article 7.1. Computer Crimes

•2004 CSI/FBI Computer Crime And Security Survey

•2005 CSI/FBI Computer Crime And Security Survey

Computer Crime Research Center
http://www.crime-research.org/news/26.11.2005/1661/

12 posted on 03/28/2015 4:25:25 AM PDT by Liz
[ Post Reply | Private Reply | To 10 | View Replies]

To: Liz

13 posted on 03/28/2015 4:25:25 AM PDT by BerryDingle (I know how to deal with communists, I still wear their scars on my back from Hollywood-Ronald Reagan)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BerryDingle

Nice find.


14 posted on 03/28/2015 4:29:01 AM PDT by Liz
[ Post Reply | Private Reply | To 13 | View Replies]

To: Fedora; Travis McGee; Cincinatus' Wife

Merc bump


15 posted on 03/28/2015 4:30:04 AM PDT by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sickoflibs; GOPJ; Jane Long; TADSLOS; Tennessee Nana; AuntB; SgtBob; Grampa Dave; ...

ping


16 posted on 03/28/2015 4:30:52 AM PDT by Liz
[ Post Reply | Private Reply | To 14 | View Replies]

To: Liz

Ol’ Tyler Drumheller’s an interesting character...


17 posted on 03/28/2015 4:32:43 AM PDT by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ChiefJayStrongbow; Blue Highway; CivilWarBrewing; blueunicorn6; Don Corleone; PROCON; Drago; DB; ...

PING


18 posted on 03/28/2015 4:35:35 AM PDT by Liz
[ Post Reply | Private Reply | To 2 | View Replies]

To: doosee

You forgot yoga emails!


19 posted on 03/28/2015 4:36:44 AM PDT by PghBaldy (12/14 - 930am -rampage begins... 12/15 - 1030am - Obama's advance team scouts photo-op locations.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: The_Media_never_lie; tom paine 2; twister881; PistolPaknMama; Savage Beast; bmwcyle

ping


20 posted on 03/28/2015 4:40:46 AM PDT by Liz
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-84 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson