Godlike Productions - Discussion Forum
Users Online Now: 2,077 (Who's On?)Visitors Today: 969,487
Pageviews Today: 1,617,350Threads Today: 649Posts Today: 11,672
04:11 PM


Rate this Thread

Absolute BS Crap Reasonable Nice Amazing
 

how clinton got classified information on her private e mail

 
s. d. butler
Offer Upgrade

User ID: 974819
United States
01/26/2016 07:46 PM
Report Abusive Post
Report Copyright Violation
how clinton got classified information on her private e mail
[link to thefederalist.com]


clinton should have already been charged and brought to trial.

This is a comprehensive, concise article of what has already been posted in part at the least numerous times on GLP.

It is amazing how people can't see the criminality of what clinton did.




Hillary Clinton’s acolytes are racing to dismiss the latest allegations that classified material was cut and pasted into her emails, but this isn’t some mere oversight that can be hand-waved away with a shrug and a sad trombone honk. One doesn’t spill classified material into an unclassified system accidentally or through mere negligence. What these new revelations show—if they are true—is conduct that was conscious, intentional, and felonious as all get-out.

In basic and open-source terms, there is no one big computer system where innocuous, unclassified material shares space with classified material. They are kept on physically separate computer systems: there is the unclassified system, and there are several classified systems. They don’t connect, unless someone chooses to intentionally connect them.


break cont. article

Filching Information from a Secure Facility


Let’s take a look at what it would take to make this happen. Hillary Clinton refused to use a secure system. She wanted to use her own system because she could control it and unlawfully shield it from the prying eyes of the American people and their representatives. Her minions therefore had to deliberately act to circumvent the rules and procedures put in place to prevent people from doing exactly what Clinton wanted done.

First, someone would have to enter a secure facility—usually called a SCIF—to access a classified document on one of the secure systems. These terminals are behind locked doors with access controls and multiple security measures. You have to have the clearance to enter, and you leave your Android, iPad, laptop, and everything else with a chip outside.

cont at link

Last Edited by s. d. butler on 01/26/2016 07:55 PM





GLP