Displaying posts published in

September 2016

What Did Clinton’s Lawyers Say to Her Tech Guy a Few Days Before He Destroyed Her E-Mails? The very curious timeline of Clinton’s document deletions: subpoena issued → her lawyers talk to Clinton’s IT team → e-mails destroyed By Andrew C. McCarthy

Imagine a mafia don who wants to have some evidence destroyed, maybe even have a witness “disappear.” Does he have a sit-down with his trusted capos, who will then give the job to a reliable button-man? Not if he’s taken the Clinton Family course in advanced criminology — known around the campus as “(C).” If the don is a graduate, he knows the new way to get away with murder is to have all your orders communicated by your lawyers.

At the Washington Examiner Wednesday, Byron York had a very interesting report about the destruction of thousands of Clinton e-mails after Congress had issued a subpoena for them. (Obstruction of a congressional investigation is a felony under federal law.) The report is based on the FBI’s heavily redacted summary report of its Clinton e-mails investigation.

The e-mails were destroyed by a technician at Platte River Network (PRN), which had been retained by Clinton to handle her server. The tech is clearly a man (referred to as “he” several times), but his name is redacted from the FBI report. Evidence strongly suggests that this PRN technician initially lied to the FBI, then changed his story and clammed up about any instructions he might have been given.

A bit of background: In December 2014, Cheryl Mills instructed the PRN tech to implement a change in Clinton’s e-mail-retention policy: Any e-mails older than 60 days (translation: any remaining e-mails from Clinton’s time as secretary of state) were to be purged from the server. Purging in this context did not just mean deletion, it meant destruction: The Clinton team was using the BleachBit program to ensure that the purged e-mails could never be retrieved or reassembled. This was a conscious scorched-earth operation, headed up by Mills, the Clinton Family’s Tom Hayden — longtime consigliere and Clinton’s chief-of-staff at the State Department.

But there’s a Fredo in every good crime story, right? In this case, it is the PRN tech, who apparently did not follow instructions. According to his original story to the FBI, about three months went by when, out of the blue, in what he described as an “Oh sh**!” moment, he remembered that he had forgotten to purge the e-mails. So . . . he of course took it on himself to do it.

You’ll be shocked to learn, though, that that’s not quite how it happened.

RELATED: Even if You Believe the Left’s Excuses, Hillary Clinton Still Violated Criminal Law

On March 3, 2015, the New York Times broke the story that, while secretary of state, Mrs. Clinton had systematically used an unauthorized homebrew server system for all her e-mail communications, including the tens of thousands related to government business. This finally roused the House Benghazi Committee from its slumbers. (As I noted at the time, the Benghazi Committee had curiously failed to issue a subpoena for Clinton’s private e-mails, despite knowing of her use of private e-mail addresses for government business even before the Times report revealed them publicly.) The same day the Times report was published, the committee zipped a letter to David Kendall, Clinton’s lawyer at the prestigious Williams & Connolly in Washington, D.C. (Clinton has a legion of lawyers, but W&C’s Kendall is her main outside-the-government attorney.) The committee’s letter demanded that the e-mails be preserved and produced. The next day, March 4, the committee issued a subpoena directing Clinton to produce e-mails from her private e-mail addresses.

Obstruction of Justice Haunts Hillary’s Future Camp Clinton deleted e-mails and erased servers they knew were under congressional subpoena. By Deroy Murdock —

Like a trio of famished buzzards, three ugly words have started to circle over Hillary Clinton: obstruction of justice.

After reviewing the FBI’s recently released E-mailgate files, House Government Oversight Committee chairman Jason Chaffetz (R., Utah) on Tuesday wrote U.S. Attorney for the District of Columbia Channing Phillips.

“The Committee identified a sequence of events that may amount to obstruction of justice and destruction of evidence by Secretary Clinton and her employees and contractors, including her attorneys, employees of Platte River Networks,” and others, Chaffetz explained. He then asked Phillips to investigate Clinton and company for possibly violating 18 U.S. Code § 1001, 1505, or 1519. Making false statements in or obstructing federal proceedings can trigger prison sentences of up to five years. Destroying records in federal probes can cost up to 20 years behind bars.

Hillary now will campaign for president as the chant, “Lock her up!” rings in her ears — and correctly so. As the Washington Examiner’s Byron York detailed, this case’s timeline demands prosecution.

On September 20, 2012, just nine days after the deadly Islamic-terrorist attack on the U.S. facility in Benghazi, the House Oversight Subcommittee on National Security sent then–secretary of state Clinton a request for any records relevant to the assault, its precursors, and its aftermath.

Clinton received additional document requests in August 2013 and May 2014.

On March 2, 2015, news erupted about the existence of Clinton’s secret, unsecured, do-it-yourself private server. The next day, the House Select Committee on Benghazi sent now–former secretary Clinton’s attorney, David Kendall, a letter requesting that he and Clinton “Preserve all e-mail, electronic documents, and data (‘electronic records’) created since January 1, 2009” and in Clinton’s control.

As if foreshadowing Team Clinton’s actions, the letter asked Kendall to “prevent the partial or full destruction, alteration, testing, deletion, shredding, incineration, wiping, relocation, migration, theft, or mutation of electronic records.”

On March 4, 2015, the Benghazi Committee sent Clinton a subpoena for “all records in unredacted form” related to Benghazi for all of 2011 and 2012.

Cyberdisaster: How the Government Compromised Our Security A new report details how serious the OPM hack really was. By Ian Tuttle

Last year, John McCain told National Review that “the most disturbing briefing that I have ever received” had to do with cyberwar, adding: “We better start doing a helluva lot better job” addressing cybersecurity threats.

Given the current presidential prospects, the chances of that are slim. Donald Trump has made noises about “cyber” (it’s “becoming so big”), but has not outlined any plan. Meanwhile, it’s become undeniably clear that Hillary Clinton’s effort to avoid transparency requirements as secretary of state by setting up a private e-mail server endangered national security, including human-intelligence assets abroad, and that, unable to find more-plausible-sounding excuses, Clinton has opted to plead incompetence: She recently explained that she never realized the “(C)” in certain e-mails she forwarded indicated classified material.

This situation is particularly alarming in the wake of a new report. On Wednesday, the House Committee on Oversight and Government Reform released the results of its year-long investigation into the unprecedented hack of the Office of Personnel Management. The 241-page document is unsubtly titled “The OPM Data Breach: How the Government Jeopardized Our National Security for More than a Generation.”

In March 2014, the Department of Homeland Security alerted OPM that its security had been breached and data stolen. Over the next two months, OPM monitored the hacker’s activity inside its system, developing with DHS a plan to expel him. So narrowly focused was OPM on its target that it did not notice that a separate hacker had gained access to the system in early May, posing as an employee of an OPM contractor. For almost a year, this second hacker operated at leisure in OPM’s system, stealing security-clearance background-investigation files, personnel records, and fingerprint data.

The two attacks, which the Oversight committee says were almost certainly coordinated, constitute the worst cybersecurity breach in American history: “Attackers exfiltrated personnel files of 4.2 million former and current government employees and security-clearance background-investigation information on 21.5 million individuals,” dating back to the Reagan administration. That background-investigation information, the Standard Form 86 or SF-86, which is required of anyone applying for a security clearance, demands an extraordinary range of personal information, as James Comey explained to the Washington Times last year: “My SF-86 lists every place I’ve ever lived since I was 18, every foreign travel I’ve ever taken, all of my family, their addresses. So it’s not just my identity that’s affected. I’ve got siblings. I’ve got five kids. All of that is in there.” (Comey’s was among the data taken.) The hack has been described as “Cyber Pearl Harbor.” Joel Brenner, senior counsel at the National Security Agency, called the stolen information “crown jewels material . . . a gold mine for a foreign intelligence service.” John Schindler, a former analyst at the National Security Agency, has written: “Whoever now holds OPM’s records possesses something like the Holy Grail from a [counterintelligence] perspective.”

The Fragile State of the Palestinian Authority Under Mahmoud Abbas, the West Bank could now be one protest away from a full-blown crisis. By Jonathan Schanzer and Grant Rumley see note please

Oh Puleez! Abbas, like his predecessor vermin is a thug put in place and maintained by successive American administrations in their never ending quest to process peace by demanding impossible security risks from Israel….. The only thing that can stop a full blown crisis and protect Jordan is heightened Israeli control over Judea and Samaria….rsk
A Palestinian court on Thursday postponed municipal elections scheduled for Oct. 8 because Palestine’s two largest political factions, Fatah and Hamas, couldn’t agree on terms. The stalemate has been in place since 2006, the last time Palestinians voted, and even led to an internecine war the following year. The Palestinians, split between two separate governments ruling the West Bank and the Gaza Strip, have never recovered.

For Fatah, which rules the West Bank, things are going from bad to worse. The canceled elections come on the heels of a large protest held last weekend in Nablus. An estimated 12,000 Palestinians took to the streets after the West Bank government’s security forces reportedly beat to death Ahmad Halawa, a commander from the al-Aqsa Martyr’s Brigade, a splinter of Fatah. Halawa’s funeral quickly gave way to angry protests against the provisional government of President Mahmoud Abbas.

All of this should serve as a warning to the 81-year-old Mr. Abbas. The Nablus protest, in particular, conjures images of the First Intifada, which broke out after a funeral in 1987, gave way to massive protests against Israel, and in the end lasted for a half decade.

There was a time when Mr. Abbas would have tried to leverage public discontent. Today, a protest of nearly any size is too dangerous to harness for the aging Mr. Abbas, who has every reason to fear that any angry public gathering could quickly turn against him.

The Palestinian Authority, like any other autocratic Arab regime, has never welcomed spontaneous protests. But now Palestinian opinion polls show a majority of voters want Mr. Abbas to resign. What’s more, since 2006, the only forms of democratic expression under the Abbas government has been a local election or student-council vote; and in each of those, Mr. Abbas’s Fatah party has lost. As Mr. Abbas enters the 12th year of his four-year presidency, even minor elections are increasingly seen as referendums on his rule.

Exacerbating this instability is the uncertainty of who will succeed Mr. Abbas. The leader himself refuses to name a successor, which has inspired a heated debate among the Palestinian elite but also sporadic factional violence across the West Bank. Armed gangs regularly skirmish with Palestinian Authority forces, while Mr. Abbas’s rivals, such as the exiled Palestinian leader Mohammad Dahlan, continue to foment opposition. CONTINUE AT SITE

An Inherited Culture of Hate by Tharwa Boulifi

“I hate Christians and Jews. I don’t know why. I don’t have any apparent reason to hate them but I always hear my mom talking badly about them. She hates them too, and this is why I hate them, I guess. Mom has always told me that Muslims are Allah’s favorite people,” — F., a 15-year-old Tunisian girl.

“They said that non-Muslims deserve to die; we should have no pity for them. They will burn in hell, anyway.” — M., a 16-year-old Tunisian boy.

People who do not read tend to fear things they do not know, and this fear can turn into suspicion, aggression and hate. These people need to fill the void, to remove the discomfort, so they turn to terrorism to create a goal in their lives: defending Islam.

As most Tunisians do not read, they watch TV a lot. “After watching ‘The Sultan’s Harem,’ I wanted to be one of the Sultan’s concubines, to live in the Ottoman Empire era; I wanted to be like them,” said S., a 14-year-old Tunisian girl.

A Pew Research Center report, published in 2013, entitled, “The World’s Muslims, Religion, Politics and Society,” explored attitudes and opinions of Muslims around the world regarding religion and its impact on politics, ethics and science.

A sample of 1450 Tunisian Muslims from all the 24 governorates of Tunisia were interviewed between November and December 2011. According to the study, 50% of Tunisians consider themselves living a conflict between their religion and the modern world. According to the report, 32% of Tunisians consider divorce unethical — the highest rate in the Arab and Muslim world — compared to 8% in Egypt, 6% in Lebanon and 3% in Jordan. Although 46% respondents said that religion is compatible with the modern world, the study indicated that the Tunisian population is more prone to advocate individual choice — with 89% favoring — in wearing the niqab (face-veil).

Similarly, based on the United Nations report and research from the Quilliam Foundation in 2014, Tunisian terrorists represent the highest number (3,800) of foreign terrorists in Syria and Iraq. Syrian authorities also confirmed that the number of Tunisian terrorists is more than 10,000, out of a total of 48,000 terrorists in Syrian territory.

What are the main reasons for Tunisia’s high rate of terrorism?

The Middle East: The Other Main Sources of Law by Burak Bekdil

Apparently what Saudi Prince Al-Waleed Bin Talal understands of democracy is totally different than what the term means in more civilized parts of the world.

If Prince Al-Waleed so passionately defends democracy, he should spend less of his office time in showing solidarity with undemocratic leaders, and more in giving at least a bit of democratic breathing space to his own people.

In the Saudi Kingdom, the primary source of law is the Islamic sharia, based on the principles of a school of jurisprudence (Hanbali) found in pre-modern texts. Ultra-puritanical judges and lawyers form part of the country’s Islamic scholars.

But there is another main source of law: royal decrees. Simple death penalty along with beheading, stoning to death, amputation, crucifixion and lashing are common legal punishments. In the three years to 2010, there were 345 beheadings. But the legal system is usually too lenient for cases of rape and domestic violence.

The common punishment for offenses against religion and public morality such as drinking alcohol and neglect of prayer is usually lashings. Retaliatory punishments are also part of the legal system, such as, literally, an eye for an eye. Saudis can also grant clemency, in return for money, to someone who has unlawfully killed their relatives.

It is not surprising to anyone that Saudi Arabia is widely accused of having one of the worst human rights records in the world — the Kingdom is one of the few countries in the world not to accept the UN’s Universal Declaration of Human Rights. There is capital punishment for homosexuality. Women are not allowed in public places to be in the presence of someone outside the kinship. They are not allowed to drive.

Rep. Gowdy Tears into Rep. Cummings for Dragging Colin Powell into Clinton’s Email Mess By Debra Heine

During today’s House Oversight and Government Reform Committee hearing examining FOIA compliance at the State Department, Congressman Trey Gowdy (R-SC) strayed from his prepared remarks to address Democrat ranking member Elijah Cummings’ opening statement, which Gowdy said he found “instructive if not predictable.”

Cummings yesterday released an email exchange in which former secretary of state Colin Powell advised Hillary Clinton on the use of personal email and devices shortly after she was sworn in as secretary of state.

“I hope to catch up soon [with] you, but I have one pressing question which only you can answer! What were the restrictions on your use of your blackberry?” Clinton asked Powell, who served as secretary of state under President George W. Bush.

Clinton wanted to continue using her Blackberry in her new position and Powell responded saying he didn’t have one and developed another system instead that allowed him to communicate with people without it going through servers at the State Department.

“What I did do was have a personal computer that was hooked up to a private phone line (sounds ancient.) So I could communicate with a wide range of friends directly without it going through the State Department servers,” Powell wrote. “I even used it to do business with some foreign leaders and some of the senior folks in the Department on their personal email accounts. I did the same thing on the road in hotels.”

Democrats are citing this email exchange to argue that Powell had influenced Clinton’s decision to circumvent the rules.

Gowdy was having none of it.

“Secretary Clinton said that she followed all State Department rules and regulations, but the truth is, she did not,” the fiery former prosecutor began. “Secretary Clinton said her unique email arrangement was approved by the State Department but it was not. Secretary Clinton said she used one device for convenience but she did not. Secretary Clinton said she did not send or receive classified material. But she did. She said that she turned over all of her work-related emails. But she did not. She said her attorneys personally reviewed each email. But they did not. So when faced with a series of demonstrably false statements, utterly impeached by both fact and logic, the ranking member did what lots of criminal defense attorneys do — which is blame the investigator. And when that didn’t work, they throw the Hail-Mary pass of all criminal defense attorneys: ‘Other people did it too!’ Which brings me to General Colin Powell, one of the most respected people in our country’s history.”

He continued, “Hillary Clinton said to the FBI — and I’ll concede that she says different things to the public than she says to the FBI, but she told the FBI that Colin Powell’s advice had nothing to do with her decision to set up her unique email arrangement with herself.”

Gowdy repeated himself to drive the point home: “Secretary Clinton told the FBI — under penalty of not telling the truth! — that Colin Powell’s advice had nothing to do with her decision to set up that unique email arrangement with herself!”

Suspected Fifth North Korea Nuclear Test Also the Biggest, Says Seoul By Bridget Johnson

North Korea reportedly conducted its fifth — and largest to date — nuclear test just hours after President Obama wrapped up a meeting with Asian allies in Laos.

Obama was due to arrive back at the White House from the ASEAN summit shortly after midnight Friday — which is North Korea’s National Day.

The U.S. Geological Survey detected a blast as powerful as a moderate earthquake at 9 a.m. Pyongyang time.

“Possible explosion, located near the location where North Korea has detonated nuclear explosions in the past,” the USGS said of the magnitude 5.3 event. “If this is indeed an explosion, the USGS National Earthquake Information Center cannot determine what type of explosion it may be, whether nuclear or any other possible type.”

North Korea said it conducted a “nuclear warhead explosion” in response to perceived U.S. hostility. “We sent out a message that if the enemies attack us, we can counterattack.”

South Korea’s Joint Chiefs of Staff called it “an artificial quake” that was detected near North Korea’s Punggye-ri nuclear test site.

Pyongyang previously held nuclear tests in 2006, 2009, 2011 and this past January, which was followed by a UN Security Council resolution in March. “We estimate the North has carried out the biggest-ever test,” the South Korea statement said.

“We are aware of seismic activity on the Korean Peninsula in the vicinity of a known North Korean nuclear test site,” National Security Council spokesman Ned Price said. “We are monitoring and continuing to assess the situation in close coordination with our regional partners.”

Yonhap news agency reported that South Korean lawmakers will convene for an emergency session today. “It would be a crucial violation of the U.N. Security Council resolution if it turns out to be an actual nuclear test,” Rep. Yeom Dong-yeol of South Korea’s ruling Saenuri Party said.

South Korean President Park Geun-hye condemned the test and called for “much stronger sanctions” along with utilizing “all possible means” to stop Kim Jong-un’s nuclear program. Without elaborating, Park’s office said she spoke with Obama about the test.

Last month, Japan’s Kyodo News reported that North Korea has openly restarted plutonium production and is on pace to produce highly enriched uranium for nuclear weapons “as scheduled.”

“We have reprocessed spent nuclear fuel rods removed from a graphite-moderated reactor,” North Korea’s Atomic Energy Institute said, a move in response to what Kim views as threats from Washington. Pyongyang hinted at the time of an upcoming nuclear test.

Yes, Hillary Knows Classified Information Does Not Always Come with a ‘Header’ BY Andrew C. McCarthy

Well, it looks like Hillary Clinton’s oft-repeated canard — “I never sent or received any e-mails marked classified” — has been so thoroughly discredited that it now poll-tests poorly. Hence, she broke out a new wineskin for the same old rotgut at last night’s candidate forum: the “header.”

The issue arose when she was bluntly questioned by a military vet who pointed outthat, had he recklessly mishandled classified information the way she did, he’d have been prosecuted. She countered:

Classified material has a header that says “top secret,” “secret,” “confidential.” None of the emails sent or received by me had such a header. What we have here is the use of an unclassified system by hundreds of people in our government to send information that was not marked. There were no headers, there was no statement … “top secret,” “secret” or “confidential.”

Obviously, Mrs. Clinton is tactically morphing “marked” into “header” because some of her emails were marked classified.

Were she to repeat the “nothing marked classified” lie and leave it at that, the public would be reminded not only that she is known to have lied about this (FBI director Comey acknowledged as much in his House testimony); but also that she fibbed in ludicrous fashion when called on the markings in her FBI interview — claiming to have believed the “(C)” designation had to do with putting paragraphs in alphabetical order. (Of course, it refers to classified information at theconfidential level, something well known to Clinton because, among other reasons, she was for a decade a heavy-duty consumer of classified documents, in which the “(C)” designation is ubiquitous.)

We’re in trouble when the FBI director is this controversial By Silvio Canto, Jr.

As someone who grew up watching that wonderful FBI series on TV, it is shocking to see what people are saying about Mr. Comey, the FBI Director. I guess that’s what happens when you say that there is no evidence of intent on July 5th and then we spend the next two months learning that everything that Mrs. Clinton did was intended to evade the rules.

Roger Simon is calling for Mr. Comey to resign. He won’t be the last one. This is Mr. Simon’s argument:

If were I an FBI agent, I would despise James Comey. He has humiliated the FBI and all its employees. The institution will never be the same, at least not for decades to come. The FBI is no longer an instrument of justice. It is the reverse. It is an obfuscater of justice and an enabler of the rich and powerful. How depressing and disgusting.God help our republic.

Exaggerated? Not in the slightest.

Consider this:

Hillary Clinton, who had told us she had one cellphone, turned out to have had thirteen such phones and five iPads, all of which have mysteriously disappeared, two having been smashed by hammers — this, although the information on all of them was legally government property. Was she arrested for this or even cited? Did the FBI even ask why she did this or why she had so many phones? Some wag on television said she must have been a crack dealer.

More importantly, did the FBI even ask her the most obvious of questions: why in the world did she put ALL her government emails on a private home-brew server (and then have them deleted with the most advanced data eradication software available — five stars on CNET — two days after these emails came under subpoena)? Was that because the equally obvious answer — to avoid any possible public scrutiny of her actions (for a variety of suspicious reasons) — is itself felonious?