So Hillary-Deranged Wingers, How'd You Do For Your Twenty Million Dollars?

Yeah, all of this as I predicted is what we get. The sheep just cannot stop being the brainwashed sheep that they all are.

Fucking hypocritical morons led around by their snotty noses. They are all so pathetic.

Face it, our country is done. Everything is playing out precisely the way I said it would. It was not all that hard to predict, was it? Look at how many lies this pathetic administration has gotten away with along with the long list of shit the clintons have gotten away with dating back to white water.

This thread, started by this dumb ass is just another example of how lost we are. They are all such wastes of time. The truth is they have no ability to think for themselves. They are that fucking stupid, and there is no exception.
 
Removal is obvious from the fact that she ran her private server out of her own house. There have been several recent convictions under these provisions of lower-ranking officials, as well as the forced retirement and referral to the Justice Department of CIA Director John Deutch for taking home classified materials on his personal laptop and connecting to the internet.
 
We know that she sent and exchanged presumed classified materials with Syd Blumenthal. Read the Reuter article linked. Bluementhal's email with Hillary on her server was intercepted and published by a Romanian hacker. That's how this whole thing came to light.
Sorry, she's done herself in, and has no one else to blame except some overzealous aides and risk-seeking lawyers.
 
do you or any of your nutjob friends have ANYTHING to rebut anything i've posted so far?

i dont think so
 
Potential Prosecution:
At this point, the FBI is investigating the server and network history before a decision is made whether to proceed with prosecution and what charges to seek from a federal Grand Jury.
The facts are clear that she was operating her own private server and that "presumed" classified materials were shared on that unsecured device. The FBI won't come out and say she's the target until a series of decisions have been made. That Biden is signalling he's readying his candidacy tells me that probable cause exists and the system has already been found to have been breached. In fact, we know that a Romanian hacker obtained email containing presumed classified information between Blumenthal and Hillary, and that she responded to him. We also know that she was trained not to do anything like this, she acknowledges that, but she went ahead and continued to did it anyway.
This is serious, not a pseudo-scandal.
_______________
 
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
now show us without biased where she has violated these laws that you want us to buy... heres a clue... the FBi hasn't been able to show us any where, where she has violated this law ... what you have is some right wing source, that we are still waiting for you to show us, saying she allegedly did violated this law ... that's all ya got...I believe the FBI has a better source on law violations then you do, but please show us your source...
 
Complete copy of relevant sections of law and Executive Order
18 U.S. Code § 793 - Gathering, transmitting or losing defense information
Current through Pub. L. 114-38. (See Public Laws for the current Congress.)
https://www.law.cornell.edu/...
(a) Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or
(b) Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or
(c) Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or
(d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or
(e) Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or
(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.
(g) If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.
 
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
now show us without biased where she has violated these laws that you want us to buy... heres a clue... the FBi hasn't been able to show us any where, where she has violated this law ... what you have is some right wing source, that we are still waiting for you to show us, saying she allegedly did violated this law ... that's all ya got...I believe the FBI has a better source on law violations then you do, but please show us your source...


if you actually read all of it you would see they DID show where she violated that part you coward
 
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
now show us without biased where she has violated these laws that you want us to buy... heres a clue... the FBi hasn't been able to show us any where, where she has violated this law ... what you have is some right wing source, that we are still waiting for you to show us, saying she allegedly did violated this law ... that's all ya got...I believe the FBI has a better source on law violations then you do, but please show us your source...






here's one item you overlooked from the same article you idiot:

Removal is obvious from the fact that she ran her private server out of her own house. There have been several recent convictions under these provisions of lower-ranking officials, as well as the forced retirement and referral to the Justice Department of CIA Director John Deutch for taking home classified materials on his personal laptop and connecting to the internet
 
Hillary is firmly established as a knight in shining armor to those who refuse to see her flaws and as untrustworthy (61%) by the rest of us, an issue that will dog her throughout the campaign.

"The Quinnipiac poll found that 51% of voters have an unfavorable impression of her, her worst score ever on that measure. The poll also found that 61% of voters say she is not honest and trustworthy, another record low. On the honest and trustworthy question, that is up from 57% in a July Quinnipiac poll."
Hillary Clinton Hits Lows on Favorability, Trustworthiness in Poll

upload_2015-10-28_8-42-14.jpeg
 
2) Executive Order 13526 - Classified National Security Information
https://www.whitehouse.gov/...
The White House
Office of the Press Secretary
For Immediate Release
December 29, 2009
Executive Order 13526- Classified National Security Information
This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism.
 
Office of the Press Secretary
For Immediate Release
December 29, 2009
Executive Order 13526- Classified National Security Information
This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism.
. . .
(4) the original classification authority determines that the unauthorized disclosure of the information reasonably could be expected to result in damage to the national security, which includes defense against transnational terrorism, and the original classification authority is able to identify or describe the damage.
(b) If there is significant doubt about the need to classify information, it shall not be classified. This provision does not:
(1) amplify or modify the substantive criteria or procedures for classification; or
(2) create any substantive or procedural rights subject to judicial review.
(c) Classified information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.
(d) The unauthorized disclosure of foreign government information is presumed to cause damage to the national security.
C) 1950 Federal Records Act
44 U.S. Code § 3106 - Unlawful removal, destruction of records
https://www.law.cornell.edu/...
 
Potential Prosecution:
At this point, the FBI is investigating the server and network history before a decision is made whether to proceed with prosecution and what charges to seek from a federal Grand Jury.
The facts are clear that she was operating her own private server and that "presumed" classified materials were shared on that unsecured device. The FBI won't come out and say she's the target until a series of decisions have been made. That Biden is signalling he's readying his candidacy tells me that probable cause exists and the system has already been found to have been breached. In fact, we know that a Romanian hacker obtained email containing presumed classified information between Blumenthal and Hillary, and that she responded to him. We also know that she was trained not to do anything like this, she acknowledges that, but she went ahead and continued to did it anyway.
This is serious, not a pseudo-scandal.
_______________
investigating and convicted are two different things .... so far they haven't been able to come up with any violation... but you with your hatred towards dems/liberals and hillary you come here with allegations as if they are fact... then convict us and our leaders on pure opinion
 
Current through Pub. L. 114-38. (See Public Laws for the current Congress.)
US Code
Notes
Authorities (CFR)
prev | next
The head of each Federal agency shall notify the Archivist of any actual, impending, or threatened unlawful removal, defacing, alteration, or destruction of records in the custody of the agency of which he is the head that shall come to his attention, and with the assistance of the Archivist shall initiate action through the Attorney General for the recovery of records he knows or has reason to believe have been unlawfully removed from his agency, or from another Federal agency whose records have been transferred to his legal custody. In any case in which the head of the agency does not initiate an action for such recovery or other redress within a reasonable period of time after being notified of any such unlawful action, the Archivist shall request the Attorney General to initiate such an action, and shall notify the Congress when such a request has been made.
 
Potential Prosecution:
At this point, the FBI is investigating the server and network history before a decision is made whether to proceed with prosecution and what charges to seek from a federal Grand Jury.
The facts are clear that she was operating her own private server and that "presumed" classified materials were shared on that unsecured device. The FBI won't come out and say she's the target until a series of decisions have been made. That Biden is signalling he's readying his candidacy tells me that probable cause exists and the system has already been found to have been breached. In fact, we know that a Romanian hacker obtained email containing presumed classified information between Blumenthal and Hillary, and that she responded to him. We also know that she was trained not to do anything like this, she acknowledges that, but she went ahead and continued to did it anyway.
This is serious, not a pseudo-scandal.
_______________
investigating and convicted are two different things .... so far they haven't been able to come up with any violation... but you with your hatred towards dems/liberals and hillary you come here with allegations as if they are fact... then convict us and our leaders on pure opinion


yes they are two different things dullard, when did i say anybody was convicted??

try another straw man, because YES you just arent man enough to admit you're wrong
 
i gave you evidence showing it is a fact she violated the law
you cant rebut ANY of it with your own "facts"

that much is clear

keep trying loser......................
 
your crying she hasnt been convicted of anything, Gotti-like; isnt a rebuttal of anything i've posted loon

keep trying............................
 
Office of the Press Secretary
For Immediate Release
December 29, 2009
Executive Order 13526- Classified National Security Information
This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism.
. . .
(4) the original classification authority determines that the unauthorized disclosure of the information reasonably could be expected to result in damage to the national security, which includes defense against transnational terrorism, and the original classification authority is able to identify or describe the damage.
(b) If there is significant doubt about the need to classify information, it shall not be classified. This provision does not:
(1) amplify or modify the substantive criteria or procedures for classification; or
(2) create any substantive or procedural rights subject to judicial review.
(c) Classified information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.
(d) The unauthorized disclosure of foreign government information is presumed to cause damage to the national security.
C) 1950 Federal Records Act
44 U.S. Code § 3106 - Unlawful removal, destruction of records
https://www.law.cornell.edu/...
all you have done here is show us laws ... you haven't show any corralarion in any of these laws you think she violated ... so whats you're pointing out here is you can post a law here??? wonderful !!!! now show us where she violated it ... whaaaaaaaaaaaaat??? you can't
 
Hey, fucking liberal scum..... How much did the Republican's SUPPOSEDLY WASTE again...you brain dead morons!

7Z8hFVk.png
 

Forum List

Back
Top