It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Democrats may be up in arms over the idea that Gianforte can serve in the nation’s lower chamber amid criminal charges. But it would actually be a break from precedent if the criminal charge blocked his path to the House.
For instance, Sen. Bob Menendez (D-NJ) was indicted more than two years ago on multiple felony corruption charges. Prosecutors said he took more than $1 million in donations in order to help a Florida ophthalmologist get visas for three of the ophthalmologist’s girlfriends.
...
Rep. Chaka Fattah (D-PA) was indicted on federal racketeering charges in July 2015 and continued to serve for more than a year. Sen. Ted Stevens (R-AK) was indicted in July 2008 on seven counts of failing to properly report gifts, and served for more than five additional months.
...
“There’s no formal process to remove a member. You can be charged and convicted of a crime, and even if you’re in prison you can still serve,” said Josh Huder, a congressional scholar at Georgetown’s Government Affairs Institute, adding that dozens of members have clung to their seats while facing criminal charges.
...
“You can prevent him from being part of the caucus; they can ostracize him. But there’s no formal mechanism to remove him from office outside of impeachment,” Huder said.
Prosecutions for treason are rare in the United States, with fewer than four dozen such cases brought since our nation’s founding. As noted in “The Heritage Guide to the Constitution,” one reason is that constitutional standards associated with the definition and proof of treason are specific and quite high.
...
Indeed, this war has already brought the first indictment of a US citizen for treason since 1952, on Oct. 11, 2006 — of Adam Gadahn, a k a Adam Pearlman.
Gadahn grew up in California, converted to Islam and moved to Pakistan, where he eventually became a senior commander to Osama bin Laden. As an al Qaeda media adviser, he has appeared in numerous terrorist propaganda videos spewing hatred of and violence toward the nation of his birth. He remains at large.
originally posted by: TomLawless
a reply to: pavil
They're a part of five eyes. Lots of deep staters frequent/built homes in New Zealand. They can get away from it all, yet still have access to the operation.
originally posted by: crankyoldman
originally posted by: pavil
originally posted by: dashen
a reply to: pavil
It's not that simple. The server has to have a chain of custody. It has to have been seized legally in order to be admissible as evidence in court.
I wonder if this has anything to do with the raids on the awans
That's what I'm talking about. Having a chain of custody. I have to think, if they have "The Server", what was it for and who would have been in possession of it?
Supposedly some major Obama officials , including the former President were communicating via unofficial Means
.
Remember what back when they were moving Obama's records and such to Chicago for his library? Q seemed to imply they they were in possession of some of it.
Pav,
Awan goes to court today. Important. Awan CAN authenticate the server, in which case it becomes evidence. The needs the server here, not the information, so an NSA copy is of no use. Awan goes to court for Fraud today, my sense is, per Trump tweets, his deal opens the door for server: why I posted the Awan story yesterday and today, Q posts server....
I posted this before Q's drops on the topic, sorry for not waiting: 1672 and 1671
Just reading the clues.
originally posted by: liveandlearn
originally posted by: TomLawless
a reply to: pavil
They're a part of five eyes. Lots of deep staters frequent/built homes in New Zealand. They can get away from it all, yet still have access to the operation.
I am many pages behind so this may have been mentioned. Kim Dot.com is in NZ. I would guess his mega upload server is there as well. Maybe a leak?
originally posted by: Enderdog
originally posted by: crankyoldman
originally posted by: pavil
originally posted by: dashen
a reply to: pavil
It's not that simple. The server has to have a chain of custody. It has to have been seized legally in order to be admissible as evidence in court.
I wonder if this has anything to do with the raids on the awans
That's what I'm talking about. Having a chain of custody. I have to think, if they have "The Server", what was it for and who would have been in possession of it?
Supposedly some major Obama officials , including the former President were communicating via unofficial Means
.
Remember what back when they were moving Obama's records and such to Chicago for his library? Q seemed to imply they they were in possession of some of it.
Pav,
Awan goes to court today. Important. Awan CAN authenticate the server, in which case it becomes evidence. The needs the server here, not the information, so an NSA copy is of no use. Awan goes to court for Fraud today, my sense is, per Trump tweets, his deal opens the door for server: why I posted the Awan story yesterday and today, Q posts server....
I posted this before Q's drops on the topic, sorry for not waiting: 1672 and 1671
Just reading the clues.
OMG! YOU ARE Q, Cranky!!! ;o)
Immunity from prosecution is an important tool for prosecutors. They can offer immunity to witnesses for all types of crimes, even serious ones like kidnapping and murder. But prosecutors will often give immunity to a person who has committed minor crimes in order to compel that person to testify against someone who has committed more significant offenses. A common example is a prosecutor offering a small-time drug dealer immunity in exchange for against a big-time drug lord.
#BREAKING Peter Strzok has been subpoenaed to testify publicly before a joint @HouseJudiciary & @GOPoversight hearing on Tuesday, July 10, at 10AM
Early drafts of the FVEY agreement were released in 2010 and indicate that partners will share by default, with exclusions at an absolute minimum, in the 1) collection of traffic; 2) acquisition of communications documents and equipment; 3) traffic analysis; 4) cryptanalysis; 5) decryption and translation; and 6) acquisition of information regarding communications organizations, procedures, practices and equipment. A FVEY PowerPoint slide released by Snowden puts the collection posture in less formal language: Sniff it All, Know it All, Collect it All, Process it All, Exploit it All, Partner it All.
originally posted by: BringMeThanos
originally posted by: FlyingFox
originally posted by: BringMeThanos
a reply to: pavil
Well surely if NK has immediately continued its accelerated program both Q and Trump are big losers?
Not if Trump makes an example out of him.
So you'd go from praising Trump for making friends to praising him for making an example.
Nice to see how easily you'll jump ship.