Posted on 07/07/2013 5:02:23 PM PDT by penelopesire
And Kerry was NOT on his yacht! ...
We can trust the DOS? Was it spokesperson, Psaki?, making the claim?
My, my, my. ..
An extremely clear non-denial:
If I tell you, "I'll pay ya $100k to kill Mr. Smith.." did I give you AUTHORITY do kill Mr. Smith..? Or didn't I simply INCENTIVIZE his murder..?
If I deny GIVING AUTHORITY, in fact I could be guilty of murder but also making a true statement of fact.
I’d say contact the Attorney General of the United States, but Eric the Corrupt was probably in on it .... some of his Fast and Furious agents and lawyers.
The perps in the KDFW-TV news report look like SEIU community organizers.
*******************************************************************
I agree 100%!!
Yep...we are suppose to believe a proven democrat hack liar.
Sure are a lot of dots needing connecting on this administration. Looks like a roadmap to high treason, abuse of power and high crimes and misdemeanors to me and most clear thinking people.
Okay. Post an itinerary of your plans, smart guy.
The resistance needs martyrs, as well as leaders.
********************************************************************
Sven, you seem to show a great deal of interest in folks who may be taking action to expose the Obamanistas and their operatives.
Good catch! Sounds like Bob Baeur wrote it. Next it will be ‘just a few rogue agents’.
The Democrat party.....a culture of thievery and incompetence.
Police are looking for Princess Leia Organa or Alderaan.
Why would the state department brake in and take three computers. They have access to better methods to get the info. The best way would be to get the info is with out the people they are taking it from knowing they ever got it. If you can’t get it remotely how hard would it be to make a device that could copy the hard drive in a short period of time. In or out of the machine. It is easy to make a copy of any drive regardless of encryption. It more like wiki-leak wannabes or a lower person trying to get in good with higher ups.
This is a real, live Watergate. RATS just now learning this are quaking. They just saw their pistol ripped away and pointed straight right back at them, ESPECIALLY Hillary, who made her political bones in the actual Watergate.
Yet it surely wouldn’t have been the only copy. Still, they could learn what the evidence is and manufacture whatever counter-evidence they might deem necessary.
You could be right or the law firm has a dirty player scooping up info for the Chicago or Arkansas thugs.
Yep...it sure smells like a Watergate!
The way of the thug, some administration players aren't rocket scientist.
He was White and a Republican..His worstest most heinous crime was, he prosecuted Alger Hiss, and succeeded. Never forgotten by the Dems.
When was Nixon ‘impeached’?
OT:
Seems someone hit a nerve here...
http://www.whitehouse.gov/the-press-office/2012/10/01/press-gaggle-press-secretary-jay-carney-10112
For Immediate Release
October 01, 2012
Press Gaggle by Press Secretary Jay Carney, 10/1/12
Westin Lake Las Vegas
Las Vegas, Nevada
EXCERPT
Q We saw the cyber-attack information from a background source. But — (laughter) —
MS. PSAKI: Never heard of that guy.
Q You never heard of that guy. However, one newspaper reported that the cyber-attack was specifically on the White House Military Office, which supposedly controls the nuclear launch codes. Any response to that specifically?
MR. CARNEY: The attack youve mentioned was whats known as a spear-phishing attack against an unclassified network. Lets be clear — this is an unclassified network. These types of attacks are not infrequent, and we have mitigation measures in place. In this instance, the attack was identified, the system was isolated, and there is no indication whatsoever that any exfiltration of data took place. Moreover, there was never any impact or attempted breach of any classified system.
Q So what does the network control if its unclassified?
MR. CARNEY: Im sorry?
Q If that network is unclassified, then what does it control? What is it in charge of? What information is stored in that network?
MR. CARNEY: Well, Im not going to get into specifics about classified and unclassified networks, except that there are distinctions between those networks that have — contain classified information and those that dont. And the attack was against an unclassified network.
Chinese hackers attack White House office in charge of nuclear launch codes
Ya Got me he resigned first didn’t he?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.