Leave a comment

Email Proof: “Intentional” ‘Intent’ of Hillary Clinton

hillary text

hillary-email-3

Hillary Clinton email instructs staff to remove classification and send ‘nonsecure’.

hillary email delete

Hillary Clinton’s email and staffer Cheryl Mills’s response in Clinton’s request for the book “SEND” by writer David Shipley concerning email habits/practices … and deletions.

INTENT!!!!!!!!!!!!!

Fox News also noticed the e-mail this morning, although they don’t yet have a copy of it linked:

However, one email thread from June 2011 appears to include Clinton telling her top adviser Jake Sullivan to send secure information through insecure means.

In response to Clinton’s request for a set of since-redacted talking points, Sullivan writes, “They say they’ve had issues sending secure fax. They’re working on it.” Clinton responds “If they can’t, turn into nonpaper [with] no identifying heading and send nonsecure.”

Ironically, an email thread from four months earlier shows Clinton saying she was “surprised” that a diplomatic oficer named John Godfrey used a personal email account to send a memo on Libya policy after the fall of Muammar Qaddafi.

It’s probably time to review the relevant criminal statutes again in this case, such as 18 USC 793:

d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e) Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer

Shall be fined under this title or imprisoned not more than ten years, or both.

Did those talking points get illegally transmitted on Hillary’s order? If so, then Sullivan may find himself in legal trouble, too. Paragraph (g) makes it clear that “each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.”

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: