BREAKING: Obama Lied Under Oath

We've KNOWN for about a year now that Obama did send emails to Hillary because when the State dept was getting ready to release her emails, the Public was told we would NOT be getting any of the Obama/Hillary emails due to him using his executive privilege.... I think this conniption about him knowing, was done already, a YEAR ago, on this site, if memory serves.
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?
Here is one professor Lakhota:


18 U.S. Code § 793 - Gathering, transmitting or losing defense informati



(a)
Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or

(b)
Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or

(c)
Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or

(d)
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e)
Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f)
Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.


(g)
If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

(h)
(1)
Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.

(2)
The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.

(3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A)
property subject to forfeiture under this subsection;

(B)
any seizure or disposition of such property; and

(C)
any administrative or judicial proceeding in relation to such property,

if not inconsistent with this subsection.

(4)
Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law.

(June 25, 1948, ch. 645, 62 Stat. 736; Sept. 23, 1950, ch. 1024, title I, § 18, 64 Stat. 1003; Pub. L. 99–399, title XIII, § 1306(a), Aug. 27, 1986, 100 Stat. 898; Pub. L. 103–322, title XXXIII, § 330016(1)(L), Sept. 13, 1994, 108 Stat. 2147; Pub. L. 103–359, title VIII, § 804(b)(1), Oct. 14, 1994, 108 Stat. 3440; Pub. L. 104–294, title VI, § 607(b), Oct. 11, 1996, 110 Stat. 3511.)


When you are through digesting this we can go on to the next and after that a third.
Did you actually READ those sections of the ESPIONAGE ACT? :lol:

NOT a single one of those provisions apply to Clinton's situation.... there was no INTENT to transmit anything to the ENEMY, nor was anything Taken from it's proper place and given to the enemy...

as in:


Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States


prove there was no intent.the terrorist nations certainly contributed a good deal of money to her for something. Damn sure wasn't for her looks, their goats are sexier than she is
that is not how it works, for obvious reasons. proving that there was intent is the hurdle. not the other way around.
 
When was Obama put under OATH?
When he took office or did that expire?
when was obama put under oath, to allegedly lie under oath about his knowledge of Clinton's private server....

Try keeping up! :lol:
No, just like you have a license to drive and do not need to renew it every time you drive he took an oath when he took office and that does not expire..

Now you try to keep up, you brain washed fools never cease to keep me entertained.
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?
Here is one professor Lakhota:


18 U.S. Code § 793 - Gathering, transmitting or losing defense informati



(a)
Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or

(b)
Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or

(c)
Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or

(d)
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e)
Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f)
Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.


(g)
If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

(h)
(1)
Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.

(2)
The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.

(3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A)
property subject to forfeiture under this subsection;

(B)
any seizure or disposition of such property; and

(C)
any administrative or judicial proceeding in relation to such property,

if not inconsistent with this subsection.

(4)
Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law.

(June 25, 1948, ch. 645, 62 Stat. 736; Sept. 23, 1950, ch. 1024, title I, § 18, 64 Stat. 1003; Pub. L. 99–399, title XIII, § 1306(a), Aug. 27, 1986, 100 Stat. 898; Pub. L. 103–322, title XXXIII, § 330016(1)(L), Sept. 13, 1994, 108 Stat. 2147; Pub. L. 103–359, title VIII, § 804(b)(1), Oct. 14, 1994, 108 Stat. 3440; Pub. L. 104–294, title VI, § 607(b), Oct. 11, 1996, 110 Stat. 3511.)


When you are through digesting this we can go on to the next and after that a third.
Did you actually READ those sections of the ESPIONAGE ACT? :lol:

NOT a single one of those provisions apply to Clinton's situation.... there was no INTENT to transmit anything to the ENEMY, nor was anything Taken from it's proper place and given to the enemy...

as in:


Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States


prove there was no intent.the terrorist nations certainly contributed a good deal of money to her for something. Damn sure wasn't for her looks, their goats are sexier than she is
Are you just going bonkers?

She had to steal classified documents from its proper place and transmit them to an enemy....THAT is espionage,

And in no way, shape or form, did Hillary or her team steal T/S information to give to the enemy.

you have to prove she DID intentionally give this information to the enemy.

YOU and others have NO PROOF, what so ever, that this is what she and her top aides, did.

END OF STORY.
 
When was Obama put under OATH?
When he took office or did that expire?
when was obama put under oath, to allegedly lie under oath about his knowledge of Clinton's private server....

Try keeping up! :lol:
No, just like you have a license to drive and do not need to renew it every time you drive he took an oath when he took office and that does not expire..

Now you try to keep up, you brain washed fools never cease to keep me entertained.
sad you need to point that out huh? SMH
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?
Here is one professor Lakhota:


18 U.S. Code § 793 - Gathering, transmitting or losing defense informati



(a)
Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or

(b)
Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or

(c)
Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or

(d)
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e)
Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f)
Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.


(g)
If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

(h)
(1)
Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.

(2)
The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.

(3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A)
property subject to forfeiture under this subsection;

(B)
any seizure or disposition of such property; and

(C)
any administrative or judicial proceeding in relation to such property,

if not inconsistent with this subsection.

(4)
Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law.

(June 25, 1948, ch. 645, 62 Stat. 736; Sept. 23, 1950, ch. 1024, title I, § 18, 64 Stat. 1003; Pub. L. 99–399, title XIII, § 1306(a), Aug. 27, 1986, 100 Stat. 898; Pub. L. 103–322, title XXXIII, § 330016(1)(L), Sept. 13, 1994, 108 Stat. 2147; Pub. L. 103–359, title VIII, § 804(b)(1), Oct. 14, 1994, 108 Stat. 3440; Pub. L. 104–294, title VI, § 607(b), Oct. 11, 1996, 110 Stat. 3511.)


When you are through digesting this we can go on to the next and after that a third.
Did you actually READ those sections of the ESPIONAGE ACT? :lol:

NOT a single one of those provisions apply to Clinton's situation.... there was no INTENT to transmit anything to the ENEMY, nor was anything Taken from it's proper place and given to the enemy...

as in:


Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States


prove there was no intent.the terrorist nations certainly contributed a good deal of money to her for something. Damn sure wasn't for her looks, their goats are sexier than she is
Are you just going bonkers?

She had to steal classified documents from its proper place and transmit them to an enemy....THAT is espionage,

And in no way, shape or form, did Hillary or her team steal T/S information to give to the enemy.

you have to prove she DID intentionally give this information to the enemy.

YOU and others have NO PROOF, what so ever, that this is what she and her top aides, did.

END OF STORY.
Are you blind?
she took those documents and put them on a private server, What other reason could she have to do this if not to put a layer of deception between her office and the terrorists.
They way you claimed that she didn't do this, I figured you had some sort of proof that she didn't.
I can see you don't, therefore, since you suggested such, where is your proof that this did not happen.
 
When was Obama put under OATH?
When he took office or did that expire?
when was obama put under oath, to allegedly lie under oath about his knowledge of Clinton's private server....

Try keeping up! :lol:
No, just like you have a license to drive and do not need to renew it every time you drive he took an oath when he took office and that does not expire..

Now you try to keep up, you brain washed fools never cease to keep me entertained.
:rofl: good one, though completely :cuckoo:
 
Criminally obtained emails are not admissible as evidence.
But stolen Trump tax returns are fine with you, fucking hypocrite
What he is saying is what all democrats are saying.
Yes we know she did this, and we know she lie's about everything but, since she is protected by the current administration, we don't care because she promised us free shit.
 
When was Obama put under OATH?
When he took office or did that expire?
when was obama put under oath, to allegedly lie under oath about his knowledge of Clinton's private server....

Try keeping up! :lol:
No, just like you have a license to drive and do not need to renew it every time you drive he took an oath when he took office and that does not expire..

Now you try to keep up, you brain washed fools never cease to keep me entertained.
sad you need to point that out huh? SMH
that is cute, you managed to find an oath.
 
To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?
Here is one professor Lakhota:


18 U.S. Code § 793 - Gathering, transmitting or losing defense informati



(a)
Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or

(b)
Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or

(c)
Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or

(d)
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e)
Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f)
Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.


(g)
If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

(h)
(1)
Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.

(2)
The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.

(3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A)
property subject to forfeiture under this subsection;

(B)
any seizure or disposition of such property; and

(C)
any administrative or judicial proceeding in relation to such property,

if not inconsistent with this subsection.

(4)
Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law.

(June 25, 1948, ch. 645, 62 Stat. 736; Sept. 23, 1950, ch. 1024, title I, § 18, 64 Stat. 1003; Pub. L. 99–399, title XIII, § 1306(a), Aug. 27, 1986, 100 Stat. 898; Pub. L. 103–322, title XXXIII, § 330016(1)(L), Sept. 13, 1994, 108 Stat. 2147; Pub. L. 103–359, title VIII, § 804(b)(1), Oct. 14, 1994, 108 Stat. 3440; Pub. L. 104–294, title VI, § 607(b), Oct. 11, 1996, 110 Stat. 3511.)


When you are through digesting this we can go on to the next and after that a third.
Did you actually READ those sections of the ESPIONAGE ACT? :lol:

NOT a single one of those provisions apply to Clinton's situation.... there was no INTENT to transmit anything to the ENEMY, nor was anything Taken from it's proper place and given to the enemy...

as in:


Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States


prove there was no intent.the terrorist nations certainly contributed a good deal of money to her for something. Damn sure wasn't for her looks, their goats are sexier than she is
Are you just going bonkers?

She had to steal classified documents from its proper place and transmit them to an enemy....THAT is espionage,

And in no way, shape or form, did Hillary or her team steal T/S information to give to the enemy.

you have to prove she DID intentionally give this information to the enemy.

YOU and others have NO PROOF, what so ever, that this is what she and her top aides, did.

END OF STORY.
Are you blind?
she took those documents and put them on a private server, What other reason could she have to do this if not to put a layer of deception between her office and the terrorists.
They way you claimed that she didn't do this, I figured you had some sort of proof that she didn't.
I can see you don't, therefore, since you suggested such, where is your proof that this did not happen.
NOPE! She took NO T/S documents from its proper place, nor did her aides. The information they were discussing among each other on the 7 email chains that were classified, was information they received from an OUT SIDE government source, Blumenthal....the FBI or CIA or NSA had gotten their own source for the information that they classified as T/S when they got it.... nor had the IC seen the information the State dept had gathered from Syd Blumenthal....it was duel sourced....

nor had the State department top aides or Hillary, had seen the Intelligence communities T/S documents on it.

they took NOTHING from the government's top secret system.... they transmitted nothing to the enemy.

The laws posted DO NOT apply to her situation.

there may be other laws that apply....but these espionage act laws, are not them...
 
Last edited:
To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?

Going for a total make-over this time? The legality of the server isn't and never was the issue....it's what traveled to and from that server that proves she was trafficking in state secrets and selling access for speech money....oh and then obstructing justice and committing perjury multiple times under oath.

Funny. Where is your "credible" proof. Please provide it to the FBI.
Lakhota are you even the slightest bit aware of how ridiculous you look defending her after all the info that has come out (via WikiLeaks and the corrupt FBI)? If you were smart you'd just ignore this topic all together and let it go. You cannot be this fucking dingy.

That's hilarious considering who you're trying to defend. Hillary is a saint compared to Trump. I'm proudly voting for Hillary. Who are you voting for? Adolf Trump? Aleppo Johnson? Write-in? Not voting? None of my business? Colin Powell is voting for Hillary - and that's good enough for me!

NaziCons have cried "wolf" so many times against the Clintons that when a real "wolf" shows up - most sane people don't give a shit. I don't give a shit. NaziCons owe the Clintons many "get out of jail free" cards.
 
Last edited:
To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?

Going for a total make-over this time? The legality of the server isn't and never was the issue....it's what traveled to and from that server that proves she was trafficking in state secrets and selling access for speech money....oh and then obstructing justice and committing perjury multiple times under oath.

Funny. Where is your "credible" proof. Please provide it to the FBI.
Lakhota are you even the slightest bit aware of how ridiculous you look defending her after all the info that has come out (via WikiLeaks and the corrupt FBI)? If you were smart you'd just ignore this topic all together and let it go. You cannot be this fucking dingy.

That's hilarious considering who you're trying to defend. Hillary is a saint compared to Trump. I'm proudly voting for Hillary. Who are you voting for? Adolf Trump? Aleppo Johnson? Write-in? Not voting? None of my business

NaziCons have cried "wolf" so many times against the Clintons that when a real "wolf" shows up - most sane people don't give a shit. I don't give a shit. NaziCons owe the Clintons many "get out of jail free" cards.
I'm voting for the one that has the United States citizens best interest in mind.
Not the soon to be dying whore.
 
When was Obama put under OATH?
When he took office or did that expire?
when was obama put under oath, to allegedly lie under oath about his knowledge of Clinton's private server....

Try keeping up! :lol:
No, just like you have a license to drive and do not need to renew it every time you drive he took an oath when he took office and that does not expire..

Now you try to keep up, you brain washed fools never cease to keep me entertained.
:rofl: good one, though completely :cuckoo:
Obviously the law only applies to those you do not support. For example, a lawyer gets sued in malpractice and/or ethics violations for braking his/her oath, same applies to a doctor, police officer and office holding politician.
 
To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?

Going for a total make-over this time? The legality of the server isn't and never was the issue....it's what traveled to and from that server that proves she was trafficking in state secrets and selling access for speech money....oh and then obstructing justice and committing perjury multiple times under oath.

Funny. Where is your "credible" proof. Please provide it to the FBI.
Lakhota are you even the slightest bit aware of how ridiculous you look defending her after all the info that has come out (via WikiLeaks and the corrupt FBI)? If you were smart you'd just ignore this topic all together and let it go. You cannot be this fucking dingy.

That's hilarious considering who you're trying to defend. Hillary is a saint compared to Trump. I'm proudly voting for Hillary. Who are you voting for? Adolf Trump? Aleppo Johnson? Write-in? Not voting? None of my business?

NaziCons have cried "wolf" so many times against the Clintons that when a real "wolf" shows up - most sane people don't give a shit. I don't give a shit. NaziCons owe the Clintons many "get out of jail free" cards.
With a statement like that you're either wildly uninformed or severely brainwashed Lakhota. Have you no perception of the outlandish things you are saying?
 
To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?

Going for a total make-over this time? The legality of the server isn't and never was the issue....it's what traveled to and from that server that proves she was trafficking in state secrets and selling access for speech money....oh and then obstructing justice and committing perjury multiple times under oath.

Funny. Where is your "credible" proof. Please provide it to the FBI.
Lakhota are you even the slightest bit aware of how ridiculous you look defending her after all the info that has come out (via WikiLeaks and the corrupt FBI)? If you were smart you'd just ignore this topic all together and let it go. You cannot be this fucking dingy.

That's hilarious considering who you're trying to defend. Hillary is a saint compared to Trump. I'm proudly voting for Hillary. Who are you voting for? Adolf Trump? Aleppo Johnson? Write-in? Not voting? None of my business?

NaziCons have cried "wolf" so many times against the Clintons that when a real "wolf" shows up - most sane people don't give a shit. I don't give a shit. NaziCons owe the Clintons many "get out of jail free" cards.
With a statement like that you're either wildly uninformed or severely brainwashed Lakhota. Have you no perception of the outlandish things you are saying?

Well, we'll see. Ask me that question on November 9...
 
To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?

Going for a total make-over this time? The legality of the server isn't and never was the issue....it's what traveled to and from that server that proves she was trafficking in state secrets and selling access for speech money....oh and then obstructing justice and committing perjury multiple times under oath.

Funny. Where is your "credible" proof. Please provide it to the FBI.
Lakhota are you even the slightest bit aware of how ridiculous you look defending her after all the info that has come out (via WikiLeaks and the corrupt FBI)? If you were smart you'd just ignore this topic all together and let it go. You cannot be this fucking dingy.

That's hilarious considering who you're trying to defend. Hillary is a saint compared to Trump. I'm proudly voting for Hillary. Who are you voting for? Adolf Trump? Aleppo Johnson? Write-in? Not voting? None of my business?

NaziCons have cried "wolf" so many times against the Clintons that when a real "wolf" shows up - most sane people don't give a shit. I don't give a shit. NaziCons owe the Clintons many "get out of jail free" cards.
With a statement like that you're either wildly uninformed or severely brainwashed Lakhota. Have you no perception of the outlandish things you are saying?
I agree, he is the only poster I have ever read that makes me cringe with every word.
 

Forum List

Back
Top