Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI General Counsel Talked to Hillary's Lawyer re: Comey’s Letter on Weiner Laptop Clinton Emails
www.judicialwatch.org ^ | FEBRUARY 11, 2019 | Staff

Posted on 02/12/2019 7:26:39 AM PST by Red Badger

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 next last
To: Red Badger

“Nothing to see here”

FReeps won’t get it.


21 posted on 02/12/2019 7:44:42 AM PST by bigbob (Trust Trump. Trust the Plan.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Lurkinanloomin

“Covering it all up.”

Not THAT well, as it’s all coming out, but per Post #17, who’s going to risk BJ’s wife’s handlers’ wrath?


22 posted on 02/12/2019 7:44:42 AM PST by treetopsandroofs
[ Post Reply | Private Reply | To 16 | View Replies]

To: an amused spectator

My good friend was there, 12 years old, and clearly remembers the events.


23 posted on 02/12/2019 7:45:12 AM PST by bert ( (KE. N.P. N.C. +12) Honduras must be invaded to protect America from invasion)
[ Post Reply | Private Reply | To 15 | View Replies]

To: All

Obama used a pseudonym in emails with Clinton, FBI documents reveal
By JOSH GERSTEIN and NOLAN D. MCCASKILL, 09/23/2016

Pres Barack Obama used a pseudonym in email communications with Hillary Clinton and others, according to FBI records made public Friday. The disclosure came as the FBI released its second batch of documents from its investigation into Clinton’s private email server during her tenure as secretary of state.

The 189 pages the bureau released includes interviews with some of Clinton’s closest aides, such as Huma Abedin and Cheryl Mills; senior State Department officials; and even Marcel Lazar, better known as the Romanian hacker “Guccifer.”

In an April 5, 2016 interview with the FBI, Abedin was shown an email exchange between Clinton and Obama, but the longtime Clinton aide did not recognize the name of the sender. “Once informed that the sender’s name is believed to be a pseudonym used by the president, Abedin exclaimed: ‘How is this not classified?’” the report says. “Abedin then expressed her amazement at the president’s use of a pseudonym and asked if she could have a copy of the email.”


24 posted on 02/12/2019 7:46:11 AM PST by Liz ( Our side has 8 trillion bullets; the other side doesn't know which bathroom to use.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: grumpygresh

“Trump needs to something decisive like this otherwise the indictments at SDNY, DC and Chicago kangaroo courts will eat him up.”

I ideally picture a scene during his 2021 inauguration like the baptism of Michael Corleone’s niece, haha.


25 posted on 02/12/2019 7:47:51 AM PST by treetopsandroofs
[ Post Reply | Private Reply | To 19 | View Replies]

To: All

Just wondering.....
<><> Who transported S/Of/S Hillary’s server from NY to NJ’s Platte River Networks?
<><>Did the Secret Service (who Hillary insists had been guarding it since it was really Bill’s Library/Foundation asset) accompany and supervise the transport of the server?
<><> Per the interview with Platte River Networks, did they just take it, lock it up, not power it up, connect it to the internet, or not have it functioning as an active email server?
<><> Was there continuity of server activity between May 2013 to August 2015, or did the server go off-line starting in June 2013?
<><> Who received actual server in NJ - the name of the Platte River Networks employee/technician? What WAS it - make/model/form factor, etc.?
<><> Did the Clinton Foundation (or issuer of the RFP on Hillary’s behalf) indicate that the company that would provide data services qualified to handle national-security-level data?
<><> In various interviews and reports, Platte River Networks repeatedly stated they were to “upgrade, manage, and secure” the server. What - specifically - does that mean?
<><> What did Hillary’s RFP/contract order the data center to do specifically?
<><> Does Platte River Networks have sufficient security clearance to handle this type of contract?
<><> What were the firewall protocols in place at the time?
<><> Who - by name - had access to the server, and the administrative authorization to wipe and cleanse the server? When was that done?
<><> Does “upgrade, manage, and secure” the server mean that they PRN was given the task to remove all data from the server when it received it in June 2013?
<><> Was malware or antivirus also on the server?
<><> Was the inherent firewall, virus protection, or operating system “upgraded, managed, and secured”?
<><> Any incidents reported such as DOS attack, hacking, etc.? What were they? How were they resolved?
<><> Other than arranging for the server to be moved from NY to NJ, what was the Denver company contracted to do in relation to maintaining the server?
<><> What tangible evidence is there that the server arrived in functioning condition, was being used as an email server, was “upgraded, managed, and secured”, then wiped just prior to seizure by the FBI?
<><> Were normal and regular backup procedures executed on the server, and where would the back ups be kept?
<><> If no backups were taken, was there a disaster recovery location?
<><> Where was that? If no backups and no disaster recovery, what was the plan if the equipment failed or found to have been wiped of any functionality?
<><> Were any foreign nationals employed at Platte River Networks, or at Datto, that had access to the Clinton server?


26 posted on 02/12/2019 7:47:55 AM PST by Liz ( Our side has 8 trillion bullets; the other side doesn't know which bathroom to use.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Red Badger

FBI Talks to Hillary’s Lawyer About Her Weiner Problem

Now with a proper headline, I can read the article

Stay freep.


27 posted on 02/12/2019 7:48:05 AM PST by themidnightskulker (And then the thread dies... peacefully, in it's sleep....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

Sen Charles Grassley writes to express concerns about the process by which Congress was allowed to view the Wilkinson letters (an atty for Hillary aides Cheryl Mills and Heather Samuelson) that inappropriately restricted the scope of the FBI’s investigation, and that the FBI inexplicably agreed to destroy the laptops knowing that the contents were the subject of Congressional subpoenas and preservation letters.

“These limitations would necessarily have excluded, for example, any emails from Cheryl Mills to Paul Combetta in late 2014 or early 2015 directing the destruction or concealment of federal records. Similarly, these limitations would have excluded any email sent or received by Secretary Clinton if it was not sent or received by one of the four email addresses listed, or the email address was altered. “Further, the Wilkinson letters memorialized the FBI’s agreement to destroy the laptops. This is simply astonishing given the likelihood that evidence on the laptops would be of interest to congressional investigators. “The Wilkinson letters raise serious questions about why DOJ would consent to such substantial limitations on the scope of its investigation, and how Director Comey’s statements on the scope of the investigation comport with the reality of what the FBI was permitted to investigate.” Full text of the letter follows:

The Wilkinson letters raise serious questions about why DOJ would consent to such substantial limitations on the scope of its investigation, and how Director Comey’s statements on the scope of the investigation comport with the reality of what the FBI was permitted to investigate. So we can better understand the Department’s basis for agreeing to these restrictions, please respond to the following questions as soon as possible, but no later than October 19, 2016:

1. What is the basis for the FBI’s legal authority—in any circumstance—to destroy records which are subject to a congressional investigation or subpoena?

2. Why did the FBI agree to terms that allowed it to destroy both laptops?

3. Has the FBI, in fact, destroyed any evidence acquired from the laptops or the laptops themselves?

4. Is there any circumstance in which an email from Ms. Mills to Mr. Combetta (and only Mr. Combetta) in December of 2014 or March of 2015 discovered on Ms. Mills’ laptop or Ms. Samuelson’s laptop would have been turned over to the investigative team under the terms of the Wilkinson letters? If so, please explain.

5. Given that the range of emails the FBI could view under the terms of the Wilkinson letters were only those sent or received while Secretary Clinton was Secretary of State, how did the FBI intend to investigate the laptop files for evidence of possible intentional destruction of records or obstruction of evidence given the fact many of those emails were out of the allowed date range?

6. Did the filter team identify any emails that were otherwise responsive but were not turned over to the investigative team because they were privileged? Did anyone create a privilege log for such emails?

7. How many total documents were reviewed by the filter team from both laptops? Of those, how many were deemed privileged? Of the total, how many were sent to the investigative team?

8. How many total documents were withheld from the investigative team because they fell out of the date range imposed by the June 10, 2016 agreements?

9. How many of the documents acquired by the FBI from both laptops were classified? Please list each document, the classification level, and the classifying agency.

10. The Wilkinson letters apparently provided for different treatment of email fragments from Secretary Clinton’s email addresses on the “clintonemail.com” domain versus her email addresses on the “blackberry.net” domain. Specifically, email fragments without a date sent to or received by either of the clintonemail.com addresses were included, while email fragments without a date that were sent to or received by either of the blackberry.net addresses were excluded. Please explain the difference in treatment of these email addresses.

11. The Wilkinson letters included a caveat that the FBI was not assuming custody, control, or ownership of the laptops for the purpose of any request under the Freedom of Information Act (FOIA).
a. How does that statement square with the reality that the FBI had both laptops in its possession?
b. Has DOJ ever used that statement or a similar statement to avoid compliance with FOIA?


28 posted on 02/12/2019 7:50:55 AM PST by Liz ( Our side has 8 trillion bullets; the other side doesn't know which bathroom to use.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Rennes Templar
Yeah but why do we have to learn this from Judicial Watch? What have our effin congressmen and DOJ been doing for the past two years?

Just because YOU haven't heard anything doesn't mean that nothing is going on behind the scenes.

https://twitter.com/FuctupMike/status/1095170275132493824

29 posted on 02/12/2019 7:51:09 AM PST by Yo-Yo ( is the /sarc tag really necessary?)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Red Badger

The documents also further describe a previously reported quid pro quo from the Obama State Department offering the FBI more legal attaché positions if it would downgrade a redaction in an email found during the Hillary Clinton email investigation “from classified to something else.”


Good to know what the FIB’s priorities are. Overseas paid vacations for you and your family it is. These are the types of plums that keep the “rank and file” fully supportive of the Deep State.


30 posted on 02/12/2019 7:51:30 AM PST by lodi90
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger; P-Marlowe
The documents also further describe a previously reported quid pro quo from the Obama State Department offering the FBI more legal attaché positions if it would downgrade a redaction in an email found during the Hillary Clinton email investigation “from classified to something else.”

That is a crime.

Even if they were discussing a deal involving confidential info, it is still a significant classification. Confidential info can be used by intel experts to build a picture of more highly classified activity. That is the whole point of military intelligence analysis.

31 posted on 02/12/2019 7:51:50 AM PST by xzins (Retired US Army chaplain. Support our troops by praying for their victory.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Buckeye McFrog

Also sure if someone speaks, their family and their lives will be on the line! These people play for keeps!!!!


32 posted on 02/12/2019 7:56:52 AM PST by LoveMyFreedom
[ Post Reply | Private Reply | To 11 | View Replies]

To: Red Badger

The FBI used to be a top detective agency that was respected worldwide. After Obama and Comey it is now a big joke for everybody all over the world. Very sad.


33 posted on 02/12/2019 8:01:13 AM PST by seawolf101 (Member LES DEPLORABLES)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JonPreston
Would you come forward? Trump can't even seem to get ahead of this story and those around him keep ending up in court.
34 posted on 02/12/2019 8:06:28 AM PST by CaptainK ('No collusion, no obstruction, he's a leaker')
[ Post Reply | Private Reply | To 6 | View Replies]

To: JonPreston

the deep state and swamp sit firm, in the drivers seat.


35 posted on 02/12/2019 8:06:41 AM PST by himno hero (had'nff)
[ Post Reply | Private Reply | To 6 | View Replies]

To: outofsalt

and on the next thread, dangling from the treason tree.


36 posted on 02/12/2019 8:09:02 AM PST by himno hero (had'nff)
[ Post Reply | Private Reply | To 20 | View Replies]

To: treetopsandroofs

It’s not too far fetched, of course the CIC can do this under the aegis of law. But we really had and still have a coup d’état going on. You can’t just put these people though a normal court proceeding because this essentially a declaration of WAR by the instigators of the coup. He has to protect from and enemies foreign and DOMESTIC. Trump can’t continue to believe that the judicial system will somehow uphold justice especially since it has been the DOJ itself that has fomented the coup.
Remember when Mia Farrow told Al Pacino that Senators and politicians don’t have people killed. He quickly disabused her of that quaint notion.


37 posted on 02/12/2019 8:13:55 AM PST by grumpygresh (The only check on a rogue DOJ and FBI is jury nullification.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: JonPreston

The practical reality is that in spite of laws proclaiming it, there is no protection for whistle-blowers.


38 posted on 02/12/2019 8:20:30 AM PST by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Red Badger

All Trump has to do is suspend the National Security Clearances of Mueller and his team for failing to report the leak of Roger Stone’s raid to CNN while the case was under seal. So not only the leak, but knowing of the leak and not reporting it is also a felony.

Without security clearance the communications of the insurrectionist U.S. Intelligence community become subject to public exposure.


39 posted on 02/12/2019 8:26:46 AM PST by RideForever
[ Post Reply | Private Reply | To 1 | View Replies]

To: Liz; Bratch; LucyT; bitt; Jane Long

The article below is filled with details and analysis also the summary below is the text - there are screenshot images and a scribd document.

https://theconservativetreehouse.com/2019/02/11/judicial-watch-uncovers-email-between-clinton-lawyer-david-kendall-and-fbi-lawyer-james-baker-same-day-fbi-was-forced-to-re-open-investigation/

Summary:

There were only three people in the Mid-Year-Event team granted authority to physically do the Clinton email review.
They were: FBI Agent Peter Strzok, FBI Attorney-1 Tashina “Tash” Gauhar, and an Sally Moyer, the lead analyst.
FBI Agent Peter Strzok says they were able to cull the number of emails through the use of “some amazing things to rapidly de-duplicate” the emails.
The New York FBI case agent assigned to the Weiner investigation, a certified Digital Extraction Technician, as well as the FBI forensics team in Quantico say it was impossible to use the conflicted metadata to “de-duplicate” the emails.
Someone is lying.
FBI Director James Comey said his investigative unit used some form of “wizardry” to review the content of the Huma Abedin and Anthony Weiner laptop.
The Inspector General makes no determination as to who is telling the truth; and never asked the question of whether an actual review of the laptop emails took place.
The FBI still has possession of the Abedin/Weiner laptop?

.Email chain
https://www.scribd.com/document/399428924/Kendall-to-Baker-Email-October-28-2016


40 posted on 02/12/2019 8:27:47 AM PST by Whenifhow (when, if and how will Obama be gone?)
[ Post Reply | Private Reply | To 26 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson