Comparing former Secretary Clinton’s criminal mishandling of classified information to Donald Trump’s lawful exercise of executive power, is bogus.
The left has once again managed to pervert our criminal justice system by indicting a former President over what the law says is a civil dispute. As any person with an IQ above plant life knows, this is yet another example of the leftists’ immoral and patently illegal use of lawfare to obtain a political result. Fortunately for Donald Trump, he has the financial wherewithal to fend off this assault.
Of course, that isn’t stopping the left from almost giddily reporting on this recent indictment and predicting (once again) that “THIS is indeed the beginning of the end for Donald Trump.” Chief among those cackling gleefully, is the former Secretary of State and failed Presidential candidate, Hillary Clinton. She’s also using the indictment to fundraise as shown by this tweet.
Bringing this back in light of recent news:
Get a limited-edition But Her Emails hat and support @onwardtogether groups working to strengthen our democracy.https://t.co/4TiUxjmRNY pic.twitter.com/uSofeNjBxy
— Hillary Clinton (@HillaryClinton) June 9, 2023
Secretary Clinton continues to stand on her position that none of the e-mail she sent or received had classified markings, nor was there any issue with information stored on an unclassified private server in her home bathroom. She contiunues to make President Trump out to be the villain while she is of course, squeaky clean. Actually, the situation is quite the opposite.
We need to cut to the chase. Somebody committed a felony, likely several. If, as some reports have indicated, there was certain overhead imagery, marked or unmarked on Secretary Clinton’s e-mail server, someone committed a serious crime. The way government information/automation systems are set up, someone had to take a deliberate series of felonious actions in order for that imagery to get there. Period. Such deliberate actions would be the linchpin of proving “intent” in a criminal case.
One such action appeared to be confirmed back in January 8, 2016, in an article in National Review by Brendan Bordelon entitled: Clinton Pushed Aide to Strip Markings from Sensitive Documents, Send through ‘Nonsecure’ Channel:
During a 2011 e-mail exchange, Hillary Clinton urged top aide Jake Sullivan to strip classified talking points of all markings and send them through “nonsecure” means after a secure fax line failed to function. On the night of June 16, 2011, Sullivan told Clinton that important talking points on an undetermined issue would be faxed to her the following morning. When Clinton informed Sullivan that the talking points had not yet materialized, he began a frantic search for the problem. “They say they’ve had issues sending secure fax,” he wrote to Clinton 15 minutes later. “They’re working on it.” “If they can’t, turn into nonpaper with no identifying heading and send nonsecure,” Clinton replied. (Emphasis mine)
Instead of getting into a detailed primer on Department of Defense and Department of State electronic communications, I’ll give you the short version. Although the State Department and the Department of Defense use different systems for their unclassified communications, they do share some of the same systems for their classified traffic.
The unclassified systems used by Defense and State have e-mail, file sharing and teleconferencing capabilities. Those systems also have access to the Internet. Some agencies allow their employees to use their unclassified computers to conduct limited personal business, such as sending e-mails and looking at American Free News Network, during their breaks. These employees can also send e-mail to private addressees from this system.
The classified systems the agencies use jointly are:
SIPRnet (Secret Internet Protocol Router Network): used to transmit material that is classified CONFIDENTIAL or SECRET. It may not be used to transmit TOP SECRET material.
JWICS (Joint Worldwide Intelligence Communications System): used to transmit TOP SECRET information, to include highly classified satellite imagery. The JWICS system is likely where Private Bradley Manning obtained the information he later gave to Wikileaks. This is also the system the State Department uses to routinely receive and access satellite imagery and imagery analysis, along with other TOP SECRET information.
What is important to understand is that, except for extremely rare and tightly controlled circumstances, JWICS, SIPRNet and the in-house unclassified systems do not connect to each other. This keeps higher classification info from being mixed in with lower classification. Except for that very rare exception, the only way to get information from one system to another is to use a system I have yet to introduce, the “SneakerNet.”
“SneakerNet” is IT slang, referring to someone taking information on one system, saving it to portable media, disk or thumb drive and walking (“sneakering”) it over to the other system and uploading it, thereby bypassing the procedural safeguards inherent in separate, unconnected systems. An alternative, using the same concept, would be to print the data from a JWICS terminal (possibly inside the State Department) and then scan the hard copy into an unclassified system. This method would also work were someone get access to a hard copy document or photo handed out at a meeting.
One of the advantages of this unconnected system of systems is that it virtually eliminates “spillage,” the accidental release of one level of classified information into an arena not cleared for it. That however, does not stop a determined attempt to flout the rules. If there was reconnaissance satellite imagery or analysis of that imagery on Secretary Clinton’s server or any other unclassified system, then someone had to take a series of deliberate and felonious steps to put it there.
A photo would have had to have its markings deliberately removed. Then it would have had to have been copied from JWICS onto removable media (or printed out) and uploaded (or scanned) to either an unclassified computer & e-mailed to Secretary Clinton, or directly uploaded to her server. In the case that what was on her server was merely a written assessment of what the imagery shows, the above still obtains. Someone had to make a series of deliberate decisions and steps to either copy or transcribe the assessment from JWICS and send it via a nonsecure e-mail to Secretary Clinton.
What this means is that any conversation about this being a mistake, accident, or minor error in judgment, especially when compared to the situation President Trump is currently embroiled in, is a flat out lie. In my humble opinion, people currently serving in the intelligence community, or serving when Clinton was SECSTATE, who are still promoting this lie should be charged with obstruction of justice– yet another felony.
Disclosure: The last time I personally used any of these systems was in 2012. Systems and procedures have likely changed since then.
If you enjoyed this article, then please REPOST or SHARE with others; encourage them to follow AFNN. If you’d like to become a citizen contributor for AFNN, contact us at managingeditor@afnn.us Help keep us ad-free by donating here.
Truth Social: @AFNN_USA
Facebook: https://m.facebook.com/afnnusa
Telegram: https://t.me/joinchat/2_-GAzcXmIRjODNh
Twitter: https://twitter.com/AfnnUsa
GETTR: https://gettr.com/user/AFNN_USA
CloutHub: @AFNN_USA
The Deep State is not only very deep, it is very corrupt.
It protects itself and its own.
No matter how much of the rest of the world it has to burn to ash to do it. They would rather rule in Hell than serve in Heaven.