2016 Postmortem
Related: About this forumHow to credibly attack Hillary on the emails.
Post a link to something that you wrote saying that Colin Powell should be indicted for using private non-government email, and also having retroactively classified info in his aol account. That way people will believe that you actually think people should be indicted over private emails, you're not just trying to find something to pin on Hillary.
If you can do that, then you're credible when going after Hillary. If not, you're just trolling. That goes not just for people on DU, but also for the any pundit writing on WSJ or TownHall or any of the other right-wing websites that the Berners like to post email articles from.
tonyt53
(5,737 posts)scscholar
(2,902 posts)if she used email. That's pretty damning.
Trust Buster
(7,299 posts)-none
(1,884 posts)Plus only Hillary had her own private E-mail server, in her home yet.
So your OP does not compute.
YouDig
(2,280 posts)Having an AOL account is worse than a private server, because that means that people at AOL automatically have access to your emails.
-none
(1,884 posts)So it is not just procedures.
YouDig
(2,280 posts)You're talking about federal records rules. If Clinton is guilty of a crime due to the retro-actively classified information, then so is Powell. And Rice.
NWCorona
(8,541 posts)Press Virginia
(2,329 posts)he's shown that contradicts the claim.
We know she authored confidential e-mails
We know she had e-mails from the president, that were policy related
We know there were 22 e-mails redacted in their entirety
We know the IC IG has reported 4 e-mails from the original sample were classified from Secret to SAP, classified when produced
And still we get people plugging the "retroactive" story
NWCorona
(8,541 posts)There's also the fact that Hillary had the legal requirement to submit a spillage report for every classified email that was sent to her.
Iliyah
(25,111 posts)HRC is a Dems. HRC is running for president. All the "concern" (not) that the GOPers had over Benghazi (fake) and subsequently the e-mail issue is all hot air.
Prayers to all that died that night.
morningfog
(18,115 posts)And there are many issues here, beyond the private server's security. The foremost, I think, is the violation of public records law.
We know she violated the federal records law, an administrative law with no punishment. There is evidence she or her staff may have violated the felony criminal statute forbidding destruction of federal records. That is a lingering problem.
YouDig
(2,280 posts)she kept electronic copies and released them all?
Colin Powell actually deleted emails. No charges. Not even a hint of charges.
This is nothing but bad optics.
Press Virginia
(2,329 posts)then he'll be relevant to what Hillary did
YouDig
(2,280 posts)If someone commits a crime worthy of being indicted, which apparently a lot of clueless people think Hillary and Powell did, then they get indicted, presidential run or no. And there was never any talk of Powell being indicted for the exact same thing. Not from any of the right-wing columnists that have become Berners's go-to sources on this.
Press Virginia
(2,329 posts)Powell isn't being investigated by the agency that investigates crimes.
The IG report spells out that the rules were different when Powell was in office.
YouDig
(2,280 posts)They all think that Hillary committed a crime with the classified info, but not one of them peeped up about Colin Powell, nor did any of the right-wing columnists they keep linking to, even though he did the same thing.
As far as keeping records, both of them broke the rules, and Powell actually deleted emails, whereas Hillary kept and released them all. But nobody is going to be indicted for that either. People don't get indicted for small red tape violations with no criminal intent.
JonLeibowitz
(6,282 posts)Some of us have trust issues with the Clintons.
Press Virginia
(2,329 posts)his e-mail activities.
And the IG report makes a big distinction between powell and Clinton based on the time period and the rules in place at the time.
you want to compare what they did, fine. But the rules were different
morningfog
(18,115 posts)It is a felony to destroy federal records to impede an investigation by any government agency. There is evidence that federal records were destroyed during an on going investigation. Who did it, ordered and why are questions the FBI will answer.
cherokeeprogressive
(24,853 posts)libtodeath
(2,888 posts)So transparent.
beachbumbob
(9,263 posts)frylock
(34,825 posts)June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th June 16th
leveymg
(36,418 posts)Sorry, but if it happened before June 1, 2006, you can't prosecute them today. That is one major difference.
YouDig
(2,280 posts)Did any of them complain about Powell? Was there even one person in the media, or on blogs, or anywhere, that suggested that Powell should be indicted for that?
Of course not. It's just as stupid as the idea that Hillary will be indicted. People only talk about this because it's Hillary.
leveymg
(36,418 posts)Bush Administration email purge and Karl Rove and Colin Powell's roles in it. You are completely off-base in your zeal to smear DU. Please feel free to leave as quickly as you popped up here. Exit Stage >
YouDig
(2,280 posts)leveymg
(36,418 posts)Obviously, it's not going to hurt anyone's career at The National Review to dig into unexplored corners of the Clinton classified information scandal. On the other hand, who wants to get too far out ahead of the rest if they work for Newsweek? There's no safe middle ground, so few paid columnists rock the boat. Simple as that.
YouDig
(2,280 posts)libtodeath
(2,888 posts)GreatGazoo
(3,937 posts)The problem is the first part of that, the guilty part.
Avalux
(35,015 posts)Do you understand the difference between that, and what Hillary did?
Might be a good idea to get that straight in your head before writing such a silly post.
YouDig
(2,280 posts)At least Hillary was in control of her server, guarded by Secret Service.
Bob41213
(491 posts)Besides those Secret Service agents at the door.
YouDig
(2,280 posts)Bob41213
(491 posts)And when they do, they have a team to look into it. They have monitoring software. They have systems in place. Brian Pagliano isn't much of a system or team.
BlueStateLib
(937 posts)Bob41213
(491 posts)That wouldn't have helped her much since she gave her password to the Chinese (used her blackberry while in China without encryption installed). They didn't even run intrusion detection for the first couple years (likely till she switched to a professional outfit rather than use Brian Pagliano). They left VPN/RDC open to the world, so I don't know what that enterprise level firewall you speak of was doing. It certainly wasn't blocking connections.
Avalux
(35,015 posts)The two situations are not equivocal.
YouDig
(2,280 posts)Which is dumb. Legally it makes no difference, neither is OK for classified material (neither is state.gov email), and from a security point of view, AOL is worse.
Avalux
(35,015 posts)libtodeath
(2,888 posts)Response to YouDig (Reply #18)
Name removed Message auto-removed
Tierra_y_Libertad
(50,414 posts)jmg257
(11,996 posts)Secretary Powell:
Secretary Powell has acknowledged using a personal email account from a
commercial Internet provider, which he accessed on a private line in his Department office. He
further stated that he had two computers at his desk: a secure State Department machine
used for secure material, and
a laptop [used] for email.143 Neither the Secretary nor his
representative could recall whether Secretary Powell owned the laptop or whether the
Department provided it to him. However, the Secretary characterized the use of the laptop as his
unclassified system, which was not connected to OpenNet. In his interview with OIG, Secretary
Powell explained that, when he arrived at the Department, the email system in place only
permitted communication among Department staff. He therefore requested that information
technology staff install the private line so that he could use his personal account to communicate
with people outside the Department.144 He described his email usage as daily, though OIG was
unable to determine how many emails he actually sent and received during his tenure.
Various DS and IRM staff told OIG that, before Secretary Powell arrived at the Department,
employees did not have Internet connectivity on their desktop computers. The Departments
Chief Information Officer (CIO) and Under Secretary for Management during Secretary Powells
tenure reported to OIG that they were aware of Secretary Powells use of a personal email
account and also noted the Secretarys goal was to provide every Department employee with
similar Internet and email capabilities at their desktops. The current CIO and Assistant Secretary
for Diplomatic Security, who were Department employees during Secretary Powells tenure, also
were both aware of the Secretarys use of a personal email account and recall numerous
discussions with senior staff throughout the Department about how to implement the
Secretarys intent to provide all employees with Internet connectivity.
However, it is not clear whether staff explicitly addressed restrictions on the use of nonDepartmental
systems with Secretary Powell. For example, at the beginning of Secretary Powells
tenure, the Department had an outright prohibition on both the installation of privately owned
computers in Department facilities and the transmission of SBU information on the Internet.
145
By 2002, the Department had established the requirement to connect to the Internet only on
OpenNet.146 The CIO and Under Secretary for Management during Secretarys Powells tenure
reported to OIG that they believe that these issues were addressed, either by installing a firewall
to protect the Secretarys Internet connection or providing the Secretary with a Department
laptop. They also reported having multiple discussions with Secretary Powell about the
Departments implementation of FISMA requirements. In contrast, current DS and IRM officials
who worked at the Department during Secretary Powells tenure are unsure about the exact
configuration of Secretary Powells systems and whether staff addressed applicable restrictions
with the Secretary. However, they reported to OIG that the Departments technology and
information security policies were very fluid during Secretary Powells tenure and that the
Department was not aware at the time of the magnitude of the security risks associated with
information technology.
Secretary Clinton:
By Secretary Clintons tenure, the Departments guidance was considerably
more detailed and more sophisticated. Beginning in late 2005 and continuing through 2011, the
Department revised the FAM and issued various memoranda specifically discussing the
obligation to use Department systems in most circumstances and identifying the risks of not
doing so. Secretary Clintons cybersecurity practices accordingly must be evaluated in light of
these more comprehensive directives.
Secretary Clinton used mobile devices to conduct official business using the personal email
account on her private server extensively, as illustrated by the 55,000 pages of material making
up the approximately 30,000 emails she provided to the Department in December 2014.
Throughout Secretary Clintons tenure, the FAM stated that normal day-to-day operations
should be conducted on an authorized AIS,147 yet OIG found no evidence that the Secretary
requested or obtained guidance or approval to conduct official business via a personal email
account on her private server. According to the current CIO and Assistant Secretary for
Diplomatic Security, Secretary Clinton had an obligation to discuss using her personal email
account to conduct official business with their offices, who in turn would have attempted to
provide her with approved and secured means that met her business needs. However, according
to these officials, DS and IRM did notand would notapprove her exclusive reliance on a
personal email account to conduct Department business, because of the restrictions in the FAM
and the security risks in doing so.
During Secretary Clintons tenure, the FAM also instructed employees that they were expected
to use approved, secure methods to transmit SBU information and that, if they needed to
transmit SBU information outside the Departments OpenNet network on a regular basis to nonDepartmental
addresses, they should request a solution from IRM.148 However, OIG found no
evidence that Secretary Clinton ever contacted IRM to request such a solution, despite the fact
that emails exchanged on her personal account regularly contained information marked as SBU.
Similarly, the FAM contained provisions requiring employees who process SBU information on
their own devices to ensure that appropriate administrative, technical, and physical safeguards
are maintained to protect the confidentiality and integrity of records and to ensure encryption
of SBU information with products certified by NIST.149 With regard to encryption, Secretary
Clintons website states that robust protections were put in place and additional upgrades and
techniques employed over time as they became available, including consulting and employing
third party experts.150 Although this report does not address the safety or security of her
system, DS and IRM reported to OIG that Secretary Clinton never demonstrated to them that her
private server or mobile device met minimum information security requirements specified by
FISMA and the FAM.
In addition to interviewing current and former officials in DS and IRM, OIG interviewed other
senior Department officials with relevant knowledge who served under Secretary Clinton,
including the Under Secretary for Management, who supervises both DS and IRM; current and
former Executive Secretaries; and attorneys within the Office of the Legal Adviser. These officials
all stated that they were not asked to approve or otherwise review the use of Secretary Clintons
server and that they had no knowledge of approval or review by other Department staff. These
officials also stated that they were unaware of the scope or extent of Secretary Clintons use of a
personal email account, though many of them sent emails to the Secretary on this account.
Secretary Clintons Chief of Staff also testified before the House Select Committee on Benghazi
that she was unaware of anyone being consulted about the Secretarys exclusive use of a
personal email address.151 OIG did find evidence that various staff and senior officials
throughout the Department had discussions related to the Secretarys use of non-Departmental
systems, suggesting there was some awareness of Secretary Clintons practices. For example:
In late-January 2009, in response to Secretary Clintons desire to take her BlackBerry
device into secure areas, her Chief of Staff discussed with senior officials in S/ES and with
the Under Secretary for Management alternative solutions, such as setting up a separate
stand-alone computer connected to the Internet for Secretary Clinton to enable her to
check her emails from her desk. The Under Secretarys response was the stand-alone
separate network PC is [a] great idea and that it is the best solution. According to the
Department, no such computer was ever set up.
In November 2010, Secretary Clinton and her Deputy Chief of Staff for Operations
discussed the fact that Secretary Clintons emails to Department employees were not
being received. The Deputy Chief of Staff emailed the Secretary that we should talk
about putting you on state email or releasing your email address to the department so
you are not going to spam. In response, the Secretary wrote, Lets get separate address
or device but I dont want any risk of the personal being accessible.152
In August 2011, the Executive Secretary, the Under Secretary for Management, and
Secretary Clintons Chief of Staff and Deputy Chief of Staff, in response to the Secretarys
request, discussed via email providing her with a Department BlackBerry to replace her
personal BlackBerry, which was malfunctioning, possibly because her personal email
server is down. The then-Executive Secretary informed staff of his intent to provide two
devices for the Secretary to use: one with an operating State Department email account
(which would mask her identity, but which would also be subject to FOIA requests), and
another which would just have phone and internet capability. In another email
exchange, the Director of S/ES-IRM noted that an email account and address had alreadybeen set up for the Secretary153 and also stated that you should be aware that any email
would go through the Departments infrastructure and subject to FOIA searches.154
However, the Secretarys Deputy Chief of Staff rejected the proposal to use two devices,
stating that it doesnt make a whole lot of sense. OIG found no evidence that the
Secretary obtained a Department address or device after this discussion.
OIG identified two individuals who provided technical support to Secretary Clinton. The
first, who was at one time an advisor to former President Clinton but was never a
Department employee, registered the clintonemail.com domain name on January 13,
2009.155 The second, a Schedule C political appointee who worked in IRM as a Senior
Advisor from May 2009 through February 2013,156 provided technical support for
BlackBerry communications during the Secretarys 2008 campaign for President.157 OIG
reviewed emails showing communications between Department staff and both
individuals concerning operational issues affecting the Secretarys email and server from
2010 through at least October 2012. For example, in December 2010, the Senior Advisor
worked with S/ES-IRM and IRM staff to resolve issues affecting the ability of emails
transmitted through the clintonemail.com domain used by Secretary Clinton to reach
Department email addresses using the state.gov domain.
Two staff in S/ES-IRM reported to OIG that, in late 2010, they each discussed their
concerns about Secretary Clintons use of a personal email account in separate meetings
with the then-Director of S/ES-IRM. In one meeting, one staff member raised concerns
that information sent and received on Secretary Clintons account could contain Federal
records that needed to be preserved in order to satisfy Federal recordkeeping
requirements. According to the staff member, the Director stated that the Secretarys
personal system had been reviewed and approved by Department legal staff and that
the matter was not to be discussed any further. As previously noted, OIG found no
evidence that staff in the Office of the Legal Adviser reviewed or approved Secretary
Clintons personal system. According to the other S/ES-IRM staff member who raised
concerns about the server, the Director stated that the mission of S/ES-IRM is to support
the Secretary and instructed the staff never to speak of the Secretarys personal email
system again.
On January 9, 2011, the non-Departmental advisor to President Clinton who provided
technical support to the Clinton email system notified the Secretarys Deputy Chief of
Staff for Operations that he had to shut down the server because he believed someone
was trying to hack us and while they did not get in i didnt [sic] want to let them have the
chance to. Later that day, the advisor again wrote to the Deputy Chief of Staff for
Operations, We were attacked again so I shut [the server] down for a few min. On
January 10, the Deputy Chief of Staff for Operations emailed the Chief of Staff and the
Deputy Chief of Staff for Planning and instructed them not to email the Secretary
anything sensitive and stated that she could explain more in person.159
YouDig
(2,280 posts)Email is not used for classified material, even state.gov email. It is considered insecure. Hillary didn't use it for classified material.
With both Hillary and Powell, some material later deemed classified ended up in their email accounts. Which happens all the time, sometimes someone will even classify something at the very same time that is printed in the press. In that case, anyone holding a copy of the NYT would technically be in breach of classified handling rules.
But nobody gets indicted for things like that because that would be stupid.
libtodeath
(2,888 posts)The "it was classified later" dodge has been debunked so completely that it is laughable to still fall back on it.
YouDig
(2,280 posts)libtodeath
(2,888 posts)YouDig
(2,280 posts)libtodeath
(2,888 posts)YouDig
(2,280 posts)840high
(17,196 posts)BlueStateLib
(937 posts)were writen by career diplomats
jmg257
(11,996 posts)YouDig
(2,280 posts)beachbum bob
(10,437 posts)thankfully