BLACK REPUBLICAN BLOG -
The Republican Party is the party of civil rights and the four F’s: faith, family, freedom and fairness.
The Democratic Party is the party of the four S’s: slavery, secession, segregation and socialism (Quote By Author Michael Scheuer).
Tuesday, October 06, 2015
Yes, Hillary Clinton broke the law
By Frances Rice
Without a doubt, Hillary Clinton is an arrogant, career politician who beleves she’s entitled to become our next president, whether we like it or not.
She is also thoroughly corrupt and completely dishonest. On the campaign trail, she is lying and trying to declare illegitimate any questions pertaining to her illegal use of a private email server run out of her home. The liberal press is complicit in trying to hide her lies and illegality from the public.
Fortunately for the American people, the FBI is investigating Hillary Clinton who should be indicted, prosecuted and put in jail.
Yes, Hillary Clinton broke the law
By Ken Cuccinelli
Since there has been much evasion and obfuscation about Hillary Rodham Clinton’s email use, it seems appropriate to step back and simply review what we know in light of the law. It’s also instructive to compare Clinton’s situation to arguably the most famous case of our time related to the improper handling of classified materials, namely, the case of Gen. David Petraeus.
Instead of turning his journals — so-called “black books” — over to the Defense Department or CIA when he left either of those organizations, Petraeus kept them at his home — an unsecure location — and provided them to his paramour/biographer, Paula Broadwell, at another private residence. (None of the classified information in the black books was used in his biography.)
On April 23, Petraeus pled guilty to a single misdemeanor charge of unauthorized removal and retention of classified documents or materials under 18 USC §1924. Many in the intelligence community were outraged at the perceived “slap on the wrist” he received, at a time when the Justice Department was seeking very strong penalties against lesser officials for leaks to the media.
According to the law, there are five elements that must be met for a violation of the statute, and they can all be found in section (a) of the statute: “(1) Whoever, being an officer, employee, contractor, or consultant of the United States, and, (2) by virtue of his office, employment, position, or contract, becomes possessed of documents or materials containing classified information of the United States, (3) knowingly removes such documents or materials (4) without authority and (5) with the intent to retain such documents or materials at an unauthorized location [shall be guilty of this offense].”
The Petraeus case meets those conditions. Does Clinton’s?
Clinton originally denied that any of her emails contained classified information, but soon abandoned that claim. So far, 150 emails containing classified information have been identified on her server, including two that included information determined to be Top Secret.
She then fell back on the claim that none of the emails in question was “marked classified” at the time she was dealing with them. The marking is not what makes the material classified; it’s the nature of the information itself. As secretary of state, Clinton knew this, and in fact she would have been re-briefed annually on this point as a condition of maintaining her clearance to access classified information.
Then there’s location. Clinton knowingly set up her email system to route 100 percent of her emails to and through her unsecured server (including keeping copies stored on the server). She knowingly removed such documents and materials from authorized locations (her authorized devices and secure government networks) to an unauthorized location (her server).
Two examples demonstrate this point.
When Clinton would draft an email based on classified information, she was drafting that email on an authorized Blackberry, iPad or computer. But when she hit “send,” that email was knowingly routed to her unsecured server — an unauthorized location — for both storage and transfer.
Additionally, when Clinton moved the server to Platte River Networks (a private company) in June 2013, and then again when she transferred the contents of the server to her private lawyers in 2014, the classified materials were in each instance again removed to another unsecured location.
Next we have the lack of proper authority to move or hold classified information somewhere, i.e., the “unauthorized location.”
While it’s possible for a private residence to be an “authorized” location, and it’s also possible for non-government servers and networks to be “authorized” to house and transfer classified materials, there are specific and stringent requirements to achieve such status. Simply being secretary of state didn’t allow Clinton to authorize herself to deviate from the requirements of retaining and transmitting classified documents, materials and information.
There is no known evidence that her arrangement to use the private email server in her home was undertaken with proper authority.
Finally, there’s the intent to “retain” the classified documents or materials at an unauthorized location.
The very purpose of Clinton’s server was to intentionally retain documents and materials — all emails and attachments — on the server in her house, including classified materials.
The intent required is only to undertake the action, i.e., to retain the classified documents and materials in the unauthorized fashion addressed in this statute. That’s it.
It borders on inconceivable that Clinton didn’t know that the emails she received, and more obviously, the emails that she created, stored and sent with the server, would contain classified information.
Simply put, Mrs. Clinton is already in just as bad — or worse — of a legal situation than Petraeus faced.
Does this mean she’ll be charged? FBI Director James Comey has a long history of ignoring political pressure. So it’s likely that the FBI will recommend prosecution, and then it will be up to President Obama’s Justice Department to decide whether to proceed. Stay tuned.
Ken Cuccinelli is president of Senate Conservatives Fund and the former attorney general of Virginia.
How Hillary wrecked the State Department’s digital information system
By Paul Mirengoff
Hillary Clinton’s disregard for cyber-security at the State Department, and hence for the national security, is manifest from her use of a private email server. But the wreckage Clinton left behind in State’s main digital information security office arguably demonstrates her disregard even more starkly, and probably posed an even greater threat to national security.
Richard Pollock of the Daily Caller provides the details. He cites scathing audits issued by the State Department’s former acting IG, Harold Geisel, a hand-picked Clintonista. During Hillary’s tenure, Geisel issued eight reports warning about worsening problems and growing security weaknesses within the Bureau of Information Resource Management (IRM). One of Geisel’s reports, issued not long after Clinton left the State Department, was so damning that the IRM became the butt of caustic comments throughout the IT world, according to Pollock.
In 2013, Geisel’s successor, Steve Linick, issued a “management alert” to State Department leadership, warning that IRM’s security deficiencies persisted. “The department has yet to report externally on or correct many of the existing significant deficiencies, thereby leading to continuing undue risk in the management of information,” Linick said.
The IRM was established by Colin Powell after the 9/11 Commission highlighted the failure of key government agencies to exchange anti-terrorist intelligence. Powell and his successor, Condeleeza Rice, built the IRM to ensure secure communications among all U.S. embassies and consulates.
The IRM became the central hub for all of the State Department’s IT communications systems. As Geisel explained in one of his reports, IRM “personnel are responsible for the management and oversight of the department’s information systems, which includes the department’s unclassified and classified networks” and “handles all aspects of information security for the department’s intelligence systems.”
The need to maintain the security of the IRM could not be more obvious. Geisel warned that “the weakened security controls could adversely affect the confidentiality, integrity, and availability of information and information systems” used by U.S. officials around the world. Yet, according to multiple IG reports, Clinton allowed the IRM to degenerate into an office without a mission or strategy. And even after being alerted to the problem, she failed to get it fixed.
The IRM’s deterioration isn’t unrelated to the Clinton email scandal. As Pollock points out, Clinton put Bryan Pagliano, her 2008 presidential campaign IT director, in the IRM in early 2009 as a “strategic advisor” who reported to the department’s deputy chief information officer. Pagliano had no prior national security experience and apparently lacked a national security clearance.
The IRM scandal also brings to mind Benghazi. In that case, Clinton failed to respond to repeated warnings about the deterioration of security at U.S. embassies in the region. In this instance, she failed to respond to repeated warnings about the deterioration of a vital information network.
Clinton likes to talk about being “ready.” But she wasn’t ready to be Secretary of State and she certainly isn’t ready to the President of the United States.