Starting today August 7th, 2024, in order to post in the Married Couples, Courting Couples, or Singles forums, you will not be allowed to post if you have your Marital status designated as private. Announcements will be made in the respective forums as well but please note that if yours is currently listed as Private, you will need to submit a ticket in the Support Area to have yours changed.
You forgot to log into your other account.Yes it very apparent there are two sets of systems concerning justice, and we the common people don't meet their grade
If we were guilty of the same, it would be maximum fine and 10 years in prison, while Hillary sits on the beach in Tahiti sipping Mai-Tais, looking back and laughing (Injustice) or (Just4Us)?
Thanks corrected, doing my best with a 6th grade education, my parents were poor, had to work for a living"Insecure servers" implies that the servers need therapy.
The servers were "unsecure." The proper word is "unsecure."
Only one account here at Christian Forums to my knowledge, Truth7t7 that's meYou forgot to log into your other account.
Then why are you replying to your own post?Only one account here at Christian Forums to my knowledge, Truth7t7 that's me
Because I felt like it, is there a rule against that, smiles!Then why are you replying to your own post?
I'm not familiar with the Rice/Powell allegations, it's all been verbal without Any supporting articles or informationRice...Powell...Clinton - do you think they had the Geek Squad from Best Buy set up their private servers? Maybe they patched it together on a weekend themselves crawling around under the desks in their offices? Or, is it more likely they said to their government underlings, -tech people who are supposed to know - "I want to be able to work from home, set me up?" Did Powell, Rice, Clinton know that their setup created a security hole?
I wonder how many posting here truly understand networks, servers, data encryption, or the security of their own devices? I am supposed to be working over a secure, encrypted, HIPAA compliant platform. And, I think I am, But am I? I was told I am. How do I know really?
I'm not casting the first stone, and I think this is much different than carting Top Secret docs home in cardboard boxes. That's my $0.02 on the matter.
If they violated the law, charge and try them, it's that simpleTHE TRUMP ADMINISTRATION’S QUESTIONABLE EMAIL PRACTICES
From Nikki Haley’s use of a non-classified email system for classified communications to the extensive use of personal email accounts for official business on the part of White House Senior Adviser Ivanka Trump, Education Secretary Betsy DeVos and former VA Secretary David Shulkin, the Trump administration supplied numerous examples of officials who seemed to have forgotten that the rules apply to them, too.
In November 2019, the Daily Beast reported on emails obtained by American Oversight that show former Ambassador to the United Nations Nikki Haley had sent multiple emails containing classified information over an unclassified system because she had lost her password for such protected communications. Those emails, sent shortly after a July 2017 North Korean missile test, contained a number of redactions indicating that the content of fell under the Freedom of Information Act’s “classified national defense” exemption.
I knew about Powell but not about Rice, but it's not secret info.I'm not familiar with the Rice/Powell allegations, it's all been verbal without Any supporting articles or information
As far as I know, Clinton did not transmit "Top Secret" or even store such. She did have some classified stuff that she was sent. If you have evidence to the contrary please cite.Of course Hillary knew she was transmitting and storing "Top Secret" info outside the legal custody of the protected US government servers and computers, and it's my opinion her defense attorney wouldn't convince a jury of 12 otherwise "Guilty"!
As far as I know, Clinton did not transmit "Top Secret" or even store such. She did have some classified stuff that she was sent. If you have evidence to the contrary please cite.
Emailing about "matters" that were Top Secret is not the same as "removing" documents.It's apparent you didn't read the opinion in post #1 of this thread as seen below
FBI.GOV NEWS
Statement by FBI Director James B. Comey on the Investigation of Secretary Hillary Clinton’s Use of a Personal E-Mail System
From the group of 30,000 e-mails returned to the State Department, 110 e-mails in 52 e-mail chains have been determined by the owning agency to contain classified information at the time they were sent or received. Eight of those chains contained information that was Top Secret at the time they were sent; 36 chains contained Secret information at the time; and eight contained Confidential information, which is the lowest level of classification.
For example, seven e-mail chains concern matters that were classified at the Top Secret/Special Access Program level when they were sent and received. These chains involved Secretary Clinton both sending e-mails about those matters and receiving e-mails from others about the same matters. There is evidence to support a conclusion that any reasonable person in Secretary Clinton’s position, or in the position of those government employees with whom she was corresponding about these matters, should have known that an unclassified system was no place for that conversation. In addition to this highly sensitive information, we also found information that was properly classified as Secret by the U.S. Intelligence Community at the time it was discussed on e-mail (that is, excluding the later “up-classified” e-mails).
None of these e-mails should have been on any kind of unclassified system, but their presence is especially concerning because all of these e-mails were housed on unclassified personal servers not even supported by full-time security staff, like those found at Departments and Agencies of the U.S. Government—or even with a commercial service like Gmail.
We also assess that Secretary Clinton’s use of a personal e-mail domain was both known by a large number of people and readily apparent. She also used her personal e-mail extensively while outside the United States, including sending and receiving work-related e-mails in the territory of sophisticated adversaries. Given that combination of factors, we assess it is possible that hostile actors gained access to Secretary Clinton’s personal e-mail account.
Hillary Clinton conducted business of a "Top Secret" basis on a private server outside the secured place of custody on government servers and computersEmailing about "matters" that were Top Secret is not the same as "removing" documents.
The media makes that error all the time.Thanks corrected, doing my best with a 6th grade education, my parents were poor, had to work for a living
Yes we need just laws applied evenly in our country, there's a reason for the espionage act, and Hillary Clinton violated it, guilty of up to 10 years in prison, and she walked away without being charged before the world watching "Laughing"Do we truly want what the "law" says or does this depend on where you sit as in left or right? No offense. Then it all depends on who is in office and who is running the Senate and house.
That's not espionage.Hillary Clinton conducted business of a "Top Secret" basis on a private server outside the secured place of custody on government servers and computers
Sorry, that just doesn't work. As cited, she would have to had "move" some document from its place and that didn't happen. If Donald could have found something to pin on her, he would have - but he didn't.If you want to delete the word "Removed" feel free, she conducted "Top Secret" government business outside the secured place of custody on her personal unsecured server and devices, a direct violation of the espionage act as cited
Read It Real Slow This TimeThat's not espionage.
Sorry, that just doesn't work. As cited, she would have to had "move" some document from its place and that didn't happen. If Donald could have found something to pin on her, he would have - but he didn't.
Way to make your case, kittycat.Read It Real Slow This Time
Baloney! This is nothing more that an attempt at tit-for-tattery.Hillary Clinton was in lawful possession of "Top Secret" information, she through gross negligence permitted this to be removed from its proper place of custody, and put on her private unsecure servers, computers, and mobile phones "Fact"
Hillary Clinton had full knowledge that this "Top Secret" information was removed from its proper place of custody, and placed on the private insecure devices mentioned above
Hillary Clinton was/is in violation of The Federal Espionafe Act, Section18 U.S. Code 793 (f) punishable by fine or maximum sentence of 10 years in prison, or both
18 U.S. Code § 793 - Gathering, transmitting or losing defense information
(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.
FBI.GOV NEWS
Statement by FBI Director James B. Comey on the Investigation of Secretary Hillary Clinton’s Use of a Personal E-Mail System
From the group of 30,000 e-mails returned to the State Department, 110 e-mails in 52 e-mail chains have been determined by the owning agency to contain classified information at the time they were sent or received. Eight of those chains contained information that was Top Secret at the time they were sent; 36 chains contained Secret information at the time; and eight contained Confidential information, which is the lowest level of classification.
For example, seven e-mail chains concern matters that were classified at the Top Secret/Special Access Program level when they were sent and received. These chains involved Secretary Clinton both sending e-mails about those matters and receiving e-mails from others about the same matters. There is evidence to support a conclusion that any reasonable person in Secretary Clinton’s position, or in the position of those government employees with whom she was corresponding about these matters, should have known that an unclassified system was no place for that conversation. In addition to this highly sensitive information, we also found information that was properly classified as Secret by the U.S. Intelligence Community at the time it was discussed on e-mail (that is, excluding the later “up-classified” e-mails).
None of these e-mails should have been on any kind of unclassified system, but their presence is especially concerning because all of these e-mails were housed on unclassified personal servers not even supported by full-time security staff, like those found at Departments and Agencies of the U.S. Government—or even with a commercial service like Gmail.
We also assess that Secretary Clinton’s use of a personal e-mail domain was both known by a large number of people and readily apparent. She also used her personal e-mail extensively while outside the United States, including sending and receiving work-related e-mails in the territory of sophisticated adversaries. Given that combination of factors, we assess it is possible that hostile actors gained access to Secretary Clinton’s personal e-mail account.
Sounds like a biased response to me, your lady of liberty has her blind fold removed, with her scale being tipped fully to the left IMHOBaloney! This is nothing more that an attempt at tit-for-tattery.
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?