Crooked Hillary Violated US National Security Laws

HILLARY CLINTON BOOK HER DANNO ARTWORK

By Patrick Howley @BREITBART

Hillary Clinton posted and shared the names of concealed U.S. intelligence officials on her unprotected email system.

Federal records reveal that Clinton swapped these highly classified names on an email account that was vulnerable to attack and was breached repeatedly by Russia-linked hacker attempts. These new revelations — reminiscent of the Valerie Plame scandal during George W. Bush’s tenure — could give FBI investigators the evidence they need to make a case that Clinton violated the Espionage Act by mishandling national defense information through “gross negligence.”

Numerous names cited in Clinton’s emails have been redacted in State Department email releases with the classification code “B3 CIA PERS/ORG,” a highly specialized classification that means the information, if released, would violate the Central Intelligence Act of 1949.

The State Department produced a document to Judicial Watch in April 2014 that identifies different types of “(b)(3)” redactions, including “CIA PERS/ORG,” which it defines as information “Specifically exempted from disclosure by statute … Central Intelligence Act of 1949.”

“That’s what it suggests,” Judicial Watch president Tom Fitton told Breitbart News, referring to the indication that Clinton disclosed the names of CIA-protected intelligence sources, based on the B3 redactions.

The CIA justifies “(b)(3)” redactions with this description: “(b)(3) Applies to the Director’s statutory obligations to protect from disclosure intelligence sources and methods, as well as the organization, functions, names, official titles, salaries, or numbers of personnel employed by the Agency, in accord with the National Security Act of 1947 and the CIA Act of 1949, respectively.”

The State Department declined to comment. “Per the colleague who handles this issue, we are not speaking to the content of emails,” State Department spokeswoman Nicole Thompson told Breitbart News.

Here are some examples of (b)(3) redactions;

Naming the defense attaché in Malta

On October 16, 2011, recent U.S. Ambassador to Malta Douglas Kmiec sent an email to Cheryl Mills with the subject line “TIME SENSITIVE AND CONFIDENTIAL – Malta Trip Backgrounder for the Secretary – Confidential.”

Kmiec wrote to Mills, “I know from current events that your life must be a whirlwind. I know that if there ever was someone who could tame the whirlwind, it would be you. Just read the news report of the Secretary’s stop in Malta next week. Thank you for arranging this. This letter and the accompanying clips I believe will help make the Secretary’s visit a highly successful and well received one.”

In the memo, Kmiec revealed the name of a top defense attaché in the country. That name was later classified by the State Department with three different classifications: 1.4 (D) to connote “Foreign relations or foreign activities of the US, including confidential sources,” B1 to connote “Information specifically authorized by an executive order to be kept secret in the interest of national defense or foreign policy,” and “B3 CIA PERS/ORG.”

“The largest part of our US team in the embassy is the navy/coast guard/ ncis contingent that has established a Maritime training program with the AFM to good success. The defense attaché there now is new [REDACTED] beloved and hardworking – and to good effect, patrolling the waters and the ports for [illegible] traffickers and terror related figures,” Kmiec wrote.

Mills forwarded the memo directly to Clinton’s private email account at clintonemail.com with the note “Fyi background.”

READ REST HERE

By WEEV @DAILY STORMER

My former attorney, Tor Ekeland, is in Texas this week to fight US v. Thomas. A systems administrator, Michael Thomas, deleted the infrastructure he built on the way out the door of his job and left a letter advertising his services as an independent contractor. No data lost, but he disrupted the way it was controlled on the network and made it difficult to restore.

He’s been indicted under unauthorized access provisions of the Computer Fraud and Abuse Act, but those laws should not apply as he only used the access he was lawfully authorized to have in the course of his job to accomplish what he did. They’re making an argument that is quite a bit of a stretch.

What Hillary did is identical in criminal nature. On her way out the door of her job, she deleted data that was earmarked as someone else’s property. Those emails Hillary wiped belonged to any and all interested citizens of the United States of America. They belonged to the historical record. They belonged to regulatory and law enforcement authorities that might want to investigate her. Unlike Michael Thomas, she deliberately made the data impossible to restore.

With his alleged crime, Michael Thomas was hoping to gain a few more hours as a consultant.

Hillary, by contrast, was hoping to gain immense political power and control of the Western world.

While the crime is identical, the motive and scope of the robberies are far grander in Hillary’s case. Yet Obama’s Department of Justice tells us Hillary’s crimes are no big deal whilst in the same breath telling us Michael Thomas has to go to prison. Which he almost certainly will. The hypocrisy here is staggering.

As usual, when a White man acts in a small way against a Jew’s establishment he has to go to prison. When a whore for the Jews robs all of White society, it’s simply no big deal. This is how America works now. This is where our precious republic has arrived.

This cannot stand. It’s time to make America great again.

hillary-prison

Print Friendly

Source Article from http://incogman.net/2016/06/crooked-hillary-violated-us-national-security-laws/

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes