[VIDEO] State Department Still Can’t Say When or If Clinton Received Training for Classified Information 

hillary-computer


How Hillary Got Classified Information Onto Her Private Email

HillaryClinton-998x607

If the latest allegations are true, Hillary Clinton and her minions committed several felonies. And they knew this when they did it.

Kurt Schlichter writes: Hillary Clinton’s acolytes are racing to dismiss the latest allegations that classified material was cut and pasted into her emails, but this isn’t some mere oversight that can be hand-waved away PANTSUIT-REPORTwith a shrug and a sad trombone honk. One doesn’t spill classified material into an unclassified system accidentally or through mere negligence. What these new revelations show—if they are true—is conduct that was conscious, intentional, and felonious as all get-out.

In basic and open-source terms, there is no one big computer system where innocuous, unclassified material shares space with classified material. They are kept on physically separate computer systems: there is the unclassified system, and there are several classified systems. They don’t connect, unless someone chooses to intentionally connect them.

When there is spillage of classified material into unclassified systems, all hell breaks loose. Well, at least it does when it’s not a friend of the administration doing the spilling.

HILLARY-GAMEBOY

Filching Information from a Secure Facility

Let’s take a look at what it would take to make this happen. Hillary Clinton refused to use a secure system. She wanted to use her own system because she could control it and unlawfully shield it from the prying eyes of the American people and their representatives. Her minions therefore had to deliberately act to circumvent the rules and procedures put in place to prevent people from doing exactly what Clinton wanted done.

[Read the full story here, at thefederalist.com]

First, someone would have to enter a secure facility—usually called a SCIF—to access a classified document on one of the secure systems. These terminals are behind locked doors with access controls and multiple security measures. You have to have the clearance to enter, and you leave your Android, iPad, laptop, and everything else with a chip outside.

Read the rest of this entry »