<><>why the need to viscously destroy the devices?
(hat tip UCANSEE2): All part of the draft technique...commonly used on Capitol Hill by our "leaders." Reports say the "draft" technique is what Hillary used on several phones.
(a) create a DRAFT EMAIL and dont send it.
(b) give your phone to whomever you want to communicate with, and get a new phone with the same number.
(c) The person to whom you give the phone, can then see your EMAIL and look at the DRAFT.
(d) Once read, they delete it.
It never gets sent through servers ...there is no electronic trail.....the evidence is gone.
(e) lastly, the phone must be smashed to destroy any remaining data (like a PC, deleted files are not actually erased).
A plan which could only be conceived by a devious mind. Mata Hari strikes again.
Wow. bttt