Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

GOP to Clinton: Hand Over Your Email Server
CBSNews ^ | March 14, 2015 | REENA FLORES

Posted on 03/14/2015 8:06:16 PM PDT by Steelfish

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-27 last
To: All
The con artists Clintons created the ultimate scam: The Clinton Foundation! .... a slush fund as a "foundation."........or as some uncharitably call it "Hillary's Super-Pac."

The Clintons' controls its officers. Each Clinton family member can be listed as an officer in some capacity. They then get all sorts of tax-free perks..... flying around in private planes, staying in upscale hotels. Thus a significant portion of their real income is shielded from taxes.

The Clintons work the foundation game like an extortion racket.....strong-arming donors and giving them special standing courtesy of their public offices. For Bill Clinton, pretty much every conversation he has can be chalked up to "foundation business"...and written off as "Charity."

"Smile everybody. Another $100 million came in today."

21 posted on 03/15/2015 5:55:29 AM PDT by Liz
[ Post Reply | Private Reply | To 1 | View Replies]

To: Steelfish

22 posted on 03/15/2015 5:59:48 AM PDT by Bratch
[ Post Reply | Private Reply | To 1 | View Replies]

To: Seattle Conservative
I think you are on the right track. I'm not an expert, but I would say this:

1. The NSA knows all. If the House wants the email, they can just ask the NSA. It's probably easiest if Hillary's email was a .gov address, but it may not have been. It could have been a .com address. Still, the NSA can probably hand it over if they were inclined.

2. The ISP probably has records which could be subpoenaed.

3. If she used a Blackberry, all the records are available from RIM. Apple is better about confidentiality, so I'm not sure if the iPhone device will give up its secrets. But I'm also not sure Hillary had an iPhone. I think she has claimed that she did not.

4. Your last point is an important one. If an individual has access to classified documents, they MIGHT be able to say with confidence "I never sent a classified document to anyone." OK, fine. But that individual has NO CONTROL over what other people have sent to them. The Secretary of State receives classified documents through email. That's just a lead pipe cinch. No two ways about it. Therefore, classified documents came into Hillary's private email server. It's ridiculous to say that didn't happen.

23 posted on 03/15/2015 6:00:39 AM PDT by ClearCase_guy (The dog days are over /The dog days are done/Can you hear the horses? /'Cause here they come)
[ Post Reply | Private Reply | To 20 | View Replies]

To: flying Elvis

——She has been down this road before——

The more things change the more they stay the same

Who will be her Vince Foster? Who will put his car keys in his pocket after he arrives in the morgue?


24 posted on 03/15/2015 6:05:36 AM PDT by bert ((K.E.; N.P.; GOPc.;+12, 73, ..... Obama is public enemy #1)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ClearCase_guy
Oh, something else about classified information --

One the one hand, a document might say, "The nuclear access codes to the B-52s is 1-2-3-4-5-6." That would be classified information.

On the other hand, you might say "The B-52s have nuclear access code in accordance with Jupiter protocols." That's not necessarily classified, because it doesn't tell you anything.

Likewise, you might say, "Jupiter protocols include access codes of 1-2-3-4-5-6." Again, this might not really be classified, because it's not useful.

But put those two unclassified bits together, and you have something classified. That's the way this stuff works. Aggregates can create something classified.

Email received by the Secretary of State is going to allow a lot of pieces to be put together, and will reveal a lot of secrets. It's not so much what she controlled and sent -- it's what she received on the server which creates the vulnerability and the security breach,

25 posted on 03/15/2015 6:10:56 AM PDT by ClearCase_guy (The dog days are over /The dog days are done/Can you hear the horses? /'Cause here they come)
[ Post Reply | Private Reply | To 23 | View Replies]

To: ClearCase_guy

Thanks for your great response.

Best,
SC


26 posted on 03/16/2015 5:27:25 AM PDT by Seattle Conservative (God Bless and protect our troops)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Liz; sickoflibs; GOPJ; Jane Long; ken5050; stephenjohnbanker; notted

“THE REPORT WE ALL WANT TO SEE:

<><> dates and times of Hillary’s emails WRT to US foreign policy issues,

<><> dates and times of Obama’s official statements on said foreign policy issues,

<><> dates and times of foreign govt donations to the Clinton Foundation(s).


Let the money laundering, tax evasion and govt fraud investigations begin....start w/ the Clinton Foundation, and its vast tentacles. “

This will take her out.


27 posted on 03/16/2015 8:34:33 AM PDT by stephenjohnbanker (f this controversy dies down, Obama has enougMy Batting Average( 1,000) (GOPe is that easy to read))
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-27 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson