Posted on 03/03/2016 2:18:06 PM PST by Nachum
Yesterday, the New York Times reported that as part of the FBIs investigation of the Hillary Clinton email scandal, the Bureau is comparing electronic time stamps on classified sources. They hope thereby to figure out whether Clinton aides reviewed the sources and then retyped the information into emails that were sent or forwarded to the Secretarys private server.
Today, a report from Catherine Herridge and Pamela Browne of Fox News suggests that this is part of an effort to determine how sensitive intelligence jumped the gap between the classified systems and Clintons unsecured personal server. Herridge and Browne were told that there are several possible ways that classified information got onto Clintons server:
Reading intelligence reports or briefings, and then summarizing the findings in emails sent on Clintons unsecured personal server.
Accessing the classified intelligence computer network, and then lifting sections by typing them verbatim into a device such as an iPad or BlackBerry.
Taking pictures of a computer screen to capture the intelligence.
Using a thumb drive or disk to physically move the intelligence, but this would require access to a data center. Its unclear whether Clintons former IT specialist Bryan Pagliano, who. . .has reached an immunity deal with the Justice Department, or others had sufficient administrator privileges to physically transfer data.
According to Herridge and Browne, most of these scenarios would require a password. Moreover, all of these practices would be strictly prohibited under non-disclosure agreements signed by Clinton and others, and federal law.
(Excerpt) Read more at powerlineblog.com ...
They are closing in on the witch. Now if we could just change course and nominate a conservative we might have a great election.
Or push it beyond the election. Then Congress would have to impeach if Hillary wins?
I think Hillary is in serious trouble! I don’t know how she doesn’t carry this though the election even if the Justice Dept. refuses to indite her.
Personally, I think Biden is just biding his time, till the convention, ride in and save the day, scooping up Hillary’s delegate denying Bernie his due!
I really think she is damaged goods in a general election!
I fear we are going to get a loud mouth dem running as a republican, with democrat policies, or who knows what this guy believes, I don’t, he’s all over the place. His best comebacks are ‘weak’ ‘looser’ ‘pussy’.
Just having it is a crime, regardless - she was a major originating classifier and was supposed to know when she saw something if it was classified by content/source. It does not matter - in her case - what the aids did or did not do. She had it, therefore, she is guilty - there is no question of the law here; it is quite plain.
One or two instances might get her off if courts were lenient, by not hundreds or thousands which show intent to evade.
Don’t forget: I could have gotten a BJ from Romney!
Muslim Brotherhood agent Huma Abedin became an expert of the ‘cut and paste’. One of the Clinton emails was being WITHHELD by the State Dept. AT THE REQUEST OF ‘LAW ENFORCEMENT’. I’ll give you ONE guess who ‘law enforcement’ is: F-B-I. Allegedly, this ‘email’ discussed use of classified information in emails and the fact all involved KNEW it was illegal.
Okay.
This might indicate how they are going to let Hillary! skate: It is not HER fault that sensitve info ended up on her server. It is the fault of the people who sent it...
” weak looser pussy. “
Maybe he’s practicing for Hillary.
Lets ask Stevens.
All I know is that when the “immunity” word is being thrown around, somebodies in trouble.
must be the 'words" he bragged about when spouting that he went to an ivy league school and " I know words, I have the best words. I have the best, but there is no better word than stupid. .
my5 yr old great granddaughter can speak more intelligently.
According to a friend working at ft Meade for disa, class and unclass networks flow thru the same networks, sharing routing equipment (those two use to have an air gap requirement at all times).
As such, it’s as simple as adding a route to a table to allow classified data to flow to unclass networks.
They’re nitpicking, parsing. That’s usually used as a means to divert attention from the fact(s). The fact is she had an illegal server. She was supposed to be using the government authorized system period. All of this what degree of..., how many of..., crap is strictly diversionary BS.
There is no longer a question that a serious crime was committed. They’ve lined up the sequence for when classified information was available on the secured server and when it ended up on the home brew server. Now the question is who did it and how it was done.
It was emailed to her. Are they dense?
Interesting. Thanks.
Biden is bidin’? That’s classic.
I don’t know your 5 yr. old granddaughter, but I’m sure that you are right!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.