Skip to comments.
Archives Staff Was Suspicious of Berger
Washington Post ^
| July 22, 2004
| John F. Harris and Susan Schmidt
Posted on 07/21/2004 9:25:10 PM PDT by Remember_Salamis
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100, 101-120, 121-140 ... 321-330 next last
To: what's up
The Dems recently charged her with being a tool of the white house smear machine.
To: Remember_Salamis
102
posted on
07/21/2004 10:12:14 PM PDT
by
GeronL
(wketchup.com........................www.bushcountryketchup.com)
To: nutmeg
Not page one.
That stinks. So typical.
103
posted on
07/21/2004 10:12:49 PM PDT
by
GeronL
(wketchup.com........................www.bushcountryketchup.com)
To: ScaniaBoy
...but the DOJ (or the WH) didn't do anything (because either they've decided to wait until after the Convention, which would have been much better timing, or the investigation is not finished - take your pick depending on how devious you think GW and Cheney are).I like it. I like it.
104
posted on
07/21/2004 10:13:00 PM PDT
by
Howlin
(~~~~Today is the day AFTER my sixth year FR anniversary~~~~)
To: swheats
"What has Hillary said about all this?"Osama bin Laden has been more available to the press these days than Hillary :-)
105
posted on
07/21/2004 10:13:04 PM PDT
by
MJY1288
("KERRY" & "EDWARDS" ARE TWO "JOHNS" THAT NEED FLUSHING!)
To: Remember_Salamis
Berger, his attorney Lanny Breuer said, checked his office and realized for the first time that he had walked out -- unintentionally, he says -- with important papers relating to the Clinton administration's efforts to combat terrorism. They take us for fools don't they?
The spin, including from Dan Rathernot, and Katie the Cutie that the timing of the release of this information is the crime is beyond reprehensible. There is EVIL among us.
106
posted on
07/21/2004 10:13:38 PM PDT
by
ladyinred
(What if the hokey pokey IS what it's all about? Become a monthly donor and find out!!!)
To: tubebender
The AP.
John Solomon.
Lanny Davis' favorite leakee.
107
posted on
07/21/2004 10:14:30 PM PDT
by
Howlin
(~~~~Today is the day AFTER my sixth year FR anniversary~~~~)
To: Sir Gawain
How do you assassinate his character? He has none if he's filching files and breaking national security rules and laws.
To: Remember_Salamis
Things that make you go hmmm....
109
posted on
07/21/2004 10:14:45 PM PDT
by
adam_az
(Call your State Republican Party office and VOLUNTEER!!!!)
To: Mo1
What I don't understand is why he went back to steal the SAME documents When a document is dispersed for comments, each and every copy with someone's individual comments on becomes a new document. Five copies of a document are given to five different people for comments. They each make individual comments. You now have five different documents, plus the original. The comments documents are edited and merged to create a new document--the report. You now have one draft, five drafts with comments, and a final report.
He was trying to get all the versions.
110
posted on
07/21/2004 10:15:02 PM PDT
by
Samwise
(a little song / a little dance / a little document down your pants.)
To: Steven W.
Maybe he took all five drafts to hide the identity of the one he was ordered to procure...
111
posted on
07/21/2004 10:15:35 PM PDT
by
tubebender
(If I had known I would live this long I would have taken better care of myself...)
To: dano1
112
posted on
07/21/2004 10:15:38 PM PDT
by
Howlin
(~~~~Today is the day AFTER my sixth year FR anniversary~~~~)
To: Remember_Salamis
They need to put hidden cameras in all National Archive reading rooms, after this debacle.
113
posted on
07/21/2004 10:16:12 PM PDT
by
Palladin
(Proud to be a FReeper!)
To: woofie
Berger volunteered that he had also taken 40 to 50 pages of notes during three visits to the Archives beginning in July, the lawyer said. Berger turned the notes over to the Archives. He has acknowledged through attorneys that he knowingly did not show these papers to Archives officials for review before leaving -- a violation of Archives rules, but not one that he perceived as a serious security lapse.
Aren't such notes subject to the same security classification and laws as the original material ? Think so.
114
posted on
07/21/2004 10:16:42 PM PDT
by
1066AD
To: Keith
What did Kerry know and when did he know it? Its time for a Senate Investigation.
To: Howlin; All
When did the 9-11 Commission start its work?
When was it consituted?
116
posted on
07/21/2004 10:16:56 PM PDT
by
ScaniaBoy
(Part of the Right Wing Research & Attack Machine)
To: HAL9000; Peach
It won't truly reach Watergate proportions until it becomes a conspiracy. It won't truly reach Watergate proportions until the media goes into a blood-feeding frenzy.
117
posted on
07/21/2004 10:17:59 PM PDT
by
Samwise
(a little song / a little dance / a little document down your pants.)
To: Samwise
He was trying to get all the versions.And would there be copies of all of these versions as the Dem apologists are now claiming?
118
posted on
07/21/2004 10:18:04 PM PDT
by
Dolphy
To: Peach
Berger had to know he could be caught and probably would be caught. and he did it again after he was caught.
119
posted on
07/21/2004 10:18:49 PM PDT
by
Samwise
(a little song / a little dance / a little document down your pants.)
To: Howlin
To: Owl_Eagle
I've posted this top a few other threads. Please ignore if you've seen it before ...
I called our local Clear Channel station the night after this story broke and spoke for about 10 minutes describing the procedures used to handle classified information. The following is a basic description of what I said ...
1) A person who wishes to review classified information at a given facility must have his/her clearance on file with the security office that has legal custody of the information.
2) Once they arrive to the facility, they must show their credentials to identify themselves, sign into the facility - maybe issued a badge indicating their clearance and access and escorted to the room where the material will be reviewed.
3) Once in the room, the container (probably a safe i.e. a very heavy duty file cabinet with heavy combination locks with different combinations on each drawer) is opened. This process should be logged by security personnel.
4) The documents are taken from the container. All classified documents are stamped (each page) with items such as a control number, date of creation, level of clearance (top and bottom), program name indicating what access is required and eventual dispensation (i.e. when the material is designated to destruction if applicable).
5) If the documents are classified "top secret", each document has a log on the cover sheet. EACH time a person has access to this information, they must sign and date it.
6) The material is not to be removed (ie stuffed in underwear, socks ... etc) without approval of security personnel. If this takes place, the transfer is documented on both ends of the transaction. If the material is top secret or above, it requires at least two cleared people as an escort.
7) If you travel overnight, the material is not to be kept in your hotel/motel room but instead must be taken to an approved facility. Arrangements are usually made in advance. Security people do not like suprise visits. They like to make them but not receive them.
8) No photocopies are to be made or notes copied without the proper security personnel logging this activity and making appropriate markings (mentioned above) on the documents.
9) This material is frequently audited by internal security agents and is subject to "suprise" audits conducted by military, FBI or other external security personnel.
10) People given access to this type of information are briefed and attend classes on how to handle this material - ie. no excuses for "honest mistakes".
11) As the NSA for the clinton administration, I imagine Berger was personally responsible that this protocol was designed, implemented and enforced by his staff - at least in an appropriately managed administration. This would apply to government employees, officials, military personnel and civilians under contract and extended clearances issued by the DoD, DoE or other intel operations.
12) As such, ANYBODY who has worked in this environment and heard Mr. Berger's comments yesterday about being "sloppy" and "an honest mistake" knows beyond any doubt that he was not only lying, but this was a premeditated act.
13) I left the aerospace business(as an engineer) in 1993 so these comments are based upon the security world of that time. Only Lord knows how the clinton adm changed things during his 8 years.
That summarizes what I mentioned to Steve Cannon of WTVN 610 AM (Columbus, Oh) last night.
The latest word I have heard from this morning is that this material was classified "Code Word Access". Folks, if true, this is "Above Top Secret" ie. John Pollard type material.
So the question comes to mind, why would anybody do such a thing under conditions where he knew he stood a huge chance of being caught? The mission must have been extraordinary for such a risk. The presumption is that he wanted to alter or remove and destroy material that implicated either himself, or quite possibly mr. clinton. The fact that some of the material is "lost" implies that regardless of the consequences, the mission has been accomplished with his current situation collateral damage.
Webb Hubbell's infamous quote "I guess I'll have to roll over again for Hillary" comes to mind. Another example of the clinton whirlwind leaving a trail of destruction in its wake.
15 posted on
07/21/2004 1:50:31 PM EDT by
tang-soo (Prophecy of the Seventy Weeks - Read Daniel Chapter 9)
120
posted on
07/21/2004 10:19:04 PM PDT
by
Howlin
(~~~~Today is the day AFTER my sixth year FR anniversary~~~~)
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100, 101-120, 121-140 ... 321-330 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson