It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(1) Hillary Clinton’s e-mails with Clinton Foundation employee Sidney Blumenthal contain proof that she knowingly retained “classified information” on her private server and also communicated information of “the national defense” with someone “not entitled to receive it.”
Many have suspected that Clinton’s entire rationale for having the private server was not “convenience” as she has said, but rather to keep under wraps what looks like an, unofficial, unvetted intelligence network run by Blumenthal, Tyler Drumheller, an ex-CIA intelligence officer, and Cody Shearer, a long time Clinton family friend
Now you are getting there. That is the whole point
She says retroactively classified... classification run amok. The FBI and other reviewing agencies disagree.
The only time I ever heard retroactive classification in my 18.5 years in the intelligence community is when it is applied to things like the government taking over private companies weapon designs and things of that nature
I will stick with the intell people and go with what they have said all along..... classified when originated.
The email below has been retroactively classified with the designation of CONFIDENTIAL. ( I put that in there worded specifically like that just for you....run with it )
originally posted by: Xcathdra
a reply to: introvert
fair enough.. my bad.
originally posted by: 200Plus
My TS has lapsed since my retirement, so I am going simply by common sense with this question:
originally posted by: Snarl
originally posted by: 200Plus
My TS has lapsed since my retirement, so I am going simply by common sense with this question:
My questions would be: Why did she feel a need to control an e-mail server to begin with? With tens of thousands of employees on State Dept servers, what did she need to shield by going private?
When (if) these questions are asked ... intent will be defined.
originally posted by: introvert
a reply to: RickinVa
POST REMOVED BY STAFF
Defendant shall serve its answers and the four interrogatories set forth in proposed discovery plan, ECF No. 58-1 within 21 days of the Court's order. interrogatories include:
1. Who was responsible for processing and/or responding to record requests, including FOIA requests, concerning emails of Mrs. Clinton and other employees of the Office of the Secretary;
2. Who was responsible for the accounting of Mrs. Clinton's records, and information; inventorying or and Ms. Abedin' s other emails,
3. Who was responsible for responding to Plaintiff's FOIA request from the date of submission to the present; and
4. Which State Department officials and employees had and/or used an account on the clintonemail.co. system to conduct official government business.
"To date, I have received two sworn declarations from one [intelligence community] element. These declarations cover several dozen emails containing classified information determined by the IC element to be at the confidential, secret, and top secret/sap levels,” said the IG letter to lawmakers with oversight of the intelligence community and State Department. “According to the declarant, these documents contain information derived from classified IC element sources.”
Special access programs (SAPs) in the federal government of the United States of America are security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular (collateral) classified information. It may be a type of black project. In addition to collateral controls, a SAP may impose more stringent investigative or adjudicative requirements, specialized nondisclosure agreements, special terminology or markings, exclusion from standard contract investigations (carve-outs), and centralized billet systems.
C10.1.2. Reporting
C10.1.2.1. Anyone finding classified material out of proper control shall take custody of and safeguard the material, if possible, and immediately notify the appropriate security authorities.
C10.1.2.2. Any person who becomes aware of the possible compromise of classified information shall immediately report it to the head of his or her local activity or to the activity security manager. If the person believes that the head of the activity or the security manager may have been involved in the incident, he or she may report it to the security authorities at the next higher level of command or supervision.