Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
2016 Postmortem
Showing Original Post only (View all)Hillary Clinton's Felony. The federal laws violated by the private server [View all]
Hillary Rodham Clinton has committed a felony. That is apparent from the facts and in the plain-language of the federal statute that prohibits "Gathering, transmitting or losing defense information", 18 U.S. Code § 793(e) and (f). This offense carries a potential penalty of ten years imprisonment.
It's called a prima facie case: clear on the basis of known facts.
It's up to prosecutorial discretion by the US Attorney as to what charges may be filed and when. Nonetheless, Mrs. Clinton is clearly chargeable for violation of federal law. As of right now, the matter is under FBI investigation. This isn't just about violation of Departmental policy.
The facts:
NYT: F.B.I. Tracking Path of Classified Email From State Dept. to Hillary Clinton
http://www.nytimes.com/2015/08/15/us/fbi-tracking-path-of-email-to-hillary-clinton-at-state-department.html?_r=0
WASHINGTON F.B.I. agents investigating Hillary Rodham Clintons private email server are seeking to determine who at the State Department passed highly classified information from secure networks to Mrs. Clintons personal account, according to law enforcement and diplomatic officials and others briefed on the investigation.
To track how the information flowed, agents will try to gain access to the email accounts of many State Department officials who worked there while Mrs. Clinton was secretary of state, the officials said. State Department employees apparently circulated the emails on unclassified systems in 2009 and 2011, and some were ultimately forwarded to Mrs. Clinton.
They were not marked as classified, the State Department has said, and it is unclear whether its employees knew the origin of the information.
F.B.I. is also trying to determine whether foreign powers, especially China or Russia, gained access to Mrs. Clintons private server, although at this point, any security breaches are speculation.
http://www.nytimes.com/2015/08/15/us/fbi-tracking-path-of-email-to-hillary-clinton-at-state-department.html?_r=0
WASHINGTON F.B.I. agents investigating Hillary Rodham Clintons private email server are seeking to determine who at the State Department passed highly classified information from secure networks to Mrs. Clintons personal account, according to law enforcement and diplomatic officials and others briefed on the investigation.
To track how the information flowed, agents will try to gain access to the email accounts of many State Department officials who worked there while Mrs. Clinton was secretary of state, the officials said. State Department employees apparently circulated the emails on unclassified systems in 2009 and 2011, and some were ultimately forwarded to Mrs. Clinton.
They were not marked as classified, the State Department has said, and it is unclear whether its employees knew the origin of the information.
F.B.I. is also trying to determine whether foreign powers, especially China or Russia, gained access to Mrs. Clintons private server, although at this point, any security breaches are speculation.
Four para limit stops here. But, I will in all fairness stipulate that this article goes on to say that HRC is not at this point the target of the investigation. However, Reuters has since reported that her unsecured private server email system contained "presumed classified" materials. Hillary personally exchanged such presumed classified information with Sidney Blumenthal, and those communications were intercepted and publicly released by a Romanian hacker. http://www.aol.com/article/2015/08/21/exclusive-dozens-of-clinton-emails-were-classified-from-the-sta/21225607/
The fact that the email was not marked classified at the time does not excuse Mrs. Clinton. This is because information gathered from foreign government sources, a great deal of her email was so sourced, is presumed classified. Mrs Clinton received Departmental training on recognizing and handling classified materials. Presumed classified information is defined by Executive Order as "The unauthorized disclosure of foreign government information is presumed to cause damage to the national security." (see full text of that section of Executive Order 13526- Classified National Security Information, Sec. 1.1(4)(d), below)
Secretary Clinton was trained in handling of classified materials, and acknowledges that she understood them. By transmitting and receiving email correspondence that contained information gleaned from foreign government sources on an unauthorized, insecure system, she violated the law. This was not something she did unwittingly, and that the foreign government sourced material was not stamped classified is irrelevant.
On his last day in office, President Bill Clinton pardoned former CIA Director John Deutch who had committed similar violations. Deutch left the CIA on December 15, 1996 and soon after it was revealed that several of his laptop computers contained classified materials. In January 1997, the CIA began a formal security investigation of the matter. Senior management at CIA declined to fully pursue the security breach. Over two years after his departure, the matter was referred to the Department of Justice, where Attorney General Janet Reno declined prosecution. She did, however, recommend an investigation to determine whether Deutch should retain his security clearance.
All Deutch did was to take some classified material home with him to work his unsecured personal laptops that were connected to his home commercial internet. In other words, pretty much what Hillary did on a much larger scale.
Other, lesser, federal officials have been recently prosecuted for downloading classified materials onto private servers or media and taking them home, and they were charged and convicted even though the materials was never publicly released and they had no intention to do so or to harm the United States. Links in thread: http://www.democraticunderground.com/10141184063, see also, http://www.navytimes.com/story/military/crime/2015/07/29/navy-engineer-sentenced-for-mishandling-classified-material/30862027/ ; and, http://www.military.com/daily-news/2014/06/19/sailor-pleads-guilty-to-mishandling-documents.html
Applicable statutes and Executive Order:
1) 18 U.S. Code § 793 - Gathering, transmitting or losing defense information
Full copy of this Section of the 1917 Espionage Act is below. It has been claimed that Hillary did not violate the law because she didn't intend to injure the U.S. or aid a foreign power. However, that purpose is not required to convict under this Subsections (e) and (f) of this statute.
Subsections (a)-(d) and (g)(conspiracy) reference and require intent to injure the United States. The plain-language of Subsection (e) and particularly (f) are different:
The difference is this phrase that references purpose in the first three subsections; "with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, Note: "is to be used"
The language in (e) is close but omits reference to purpose to injure: "he possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation". The word intent is not there. Note: "could be used"
Finally, the offense specified at (f) requires not willful action, simply a negligent action:
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer
The differences between Sections (e) and (f) and the various other offenses covered in Section 793 comes down to the element of intent to injure the US or act to the advantage of a foreign power. These are not requisite elements of the offenses covered under these sections of the Espionage Act.
2) 1950 Federal Records Act
44 U.S. Code § 3106 - Unlawful removal, destruction of records
https://www.law.cornell.edu/uscode/text/44/3106
Current through Pub. L. 114-38. (See Public Laws for the current Congress.)
The head of each Federal agency shall notify the Archivist of any actual, impending, or threatened unlawful removal, defacing, alteration, or destruction of records in the custody of the agency of which he is the head that shall come to his attention, and with the assistance of the Archivist shall initiate action through the Attorney General for the recovery of records he knows or has reason to believe have been unlawfully removed from his agency, or from another Federal agency whose records have been transferred to his legal custody. In any case in which the head of the agency does not initiate an action for such recovery or other redress within a reasonable period of time after being notified of any such unlawful action, the Archivist shall request the Attorney General to initiate such an action, and shall notify the Congress when such a request has been made.
https://www.law.cornell.edu/uscode/text/44/3106
Current through Pub. L. 114-38. (See Public Laws for the current Congress.)
The head of each Federal agency shall notify the Archivist of any actual, impending, or threatened unlawful removal, defacing, alteration, or destruction of records in the custody of the agency of which he is the head that shall come to his attention, and with the assistance of the Archivist shall initiate action through the Attorney General for the recovery of records he knows or has reason to believe have been unlawfully removed from his agency, or from another Federal agency whose records have been transferred to his legal custody. In any case in which the head of the agency does not initiate an action for such recovery or other redress within a reasonable period of time after being notified of any such unlawful action, the Archivist shall request the Attorney General to initiate such an action, and shall notify the Congress when such a request has been made.
That law requires heads of agencies -- no exception for DOS -- to preserve and turn over all official correspondence and records to the National Archives. She didn't do that until confronted after a Romanian hacker leaked Hillary's email correspondence with Blumenthal. Those emails were clearly official not private. HRC admits to destroying at least 30,000 emails she deemed private and turned over approximately 30,000 her lawyers found to be public documents. However, a number of other emails have subsequently been turned over and analyses by news agencies. Reuters reported that a number of them to contain presumed classified information.
Hillary had also failed to provide these records to meet a FOIA request and Congressional Committee subpoena, which violates other federal laws.
Those emails and many like them were most recently found to contain "presumed classified" materials about US communications with foreign governments. That was a violation of Executive Orders, and possibly the 1917 Espionage Act that criminalizes private retention or mishandling of classified materials.
Intent to injure the U.S. or aid a foreign power is not required under Sec 793 (e) and (f). The mere fact of unauthorized removal or destruction of materials the official should have known were classified are all that is required for conviction under these parts of the Espionage Act. Hillary should have known.
Removal is obvious from the fact that she ran her private server out of her own house. There have been several recent convictions under these provisions of lower-ranking officials, as well as the forced retirement and referral to the Justice Department of CIA Director John Deutch for taking home classified materials on his personal laptop and connecting to the internet.
We know that she sent and exchanged presumed classified materials with Syd Blumenthal. Read the Reuter article linked. Bluementhal's email with Hillary on her server was intercepted and published by a Romanian hacker. That's how this whole thing came to light.
Sorry, she's done herself in, and has no one else to blame except some overzealous aides and risk-seeking lawyers.
Potential Prosecution:
At this point, the FBI is investigating the server and network history before a decision is made whether to proceed with prosecution and what charges to seek from a federal Grand Jury.
The facts are clear that she was operating her own private server and that "presumed" classified materials were shared on that unsecured device. The FBI won't come out and say she's the target until a series of decisions have been made. That Biden is signalling he's readying his candidacy tells me that probable cause exists and the system has already been found to have been breached. In fact, we know that a Romanian hacker obtained email containing presumed classified information between Blumenthal and Hillary, and that she responded to him. We also know that she was trained not to do anything like this, she acknowledges that, but she went ahead and continued to did it anyway.
This is serious, not a pseudo-scandal.
_____________________________________________
Complete copy of relevant sections of law and Executive Order
18 U.S. Code § 793 - Gathering, transmitting or losing defense information
Current through Pub. L. 114-38. (See Public Laws for the current Congress.)
https://www.law.cornell.edu/uscode/text/18/793
(a) Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or
(b) Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or
(c) Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or
(d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or
(e) Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or
(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer
Shall be fined under this title or imprisoned not more than ten years, or both.
(g) If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.
Current through Pub. L. 114-38. (See Public Laws for the current Congress.)
https://www.law.cornell.edu/uscode/text/18/793
(a) Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or
(b) Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or
(c) Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or
(d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or
(e) Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or
(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer
Shall be fined under this title or imprisoned not more than ten years, or both.
(g) If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.
2) Executive Order 13526 - Classified National Security Information
https://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information
The White House
Office of the Press Secretary
For Immediate Release
December 29, 2009
Executive Order 13526- Classified National Security Information
This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism.
. . .
(4) the original classification authority determines that the unauthorized disclosure of the information reasonably could be expected to result in damage to the national security, which includes defense against transnational terrorism, and the original classification authority is able to identify or describe the damage.
(b) If there is significant doubt about the need to classify information, it shall not be classified. This provision does not:
(1) amplify or modify the substantive criteria or procedures for classification; or
(2) create any substantive or procedural rights subject to judicial review.
(c) Classified information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.
(d) The unauthorized disclosure of foreign government information is presumed to cause damage to the national security.
The White House
Office of the Press Secretary
For Immediate Release
December 29, 2009
Executive Order 13526- Classified National Security Information
This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism.
. . .
(4) the original classification authority determines that the unauthorized disclosure of the information reasonably could be expected to result in damage to the national security, which includes defense against transnational terrorism, and the original classification authority is able to identify or describe the damage.
(b) If there is significant doubt about the need to classify information, it shall not be classified. This provision does not:
(1) amplify or modify the substantive criteria or procedures for classification; or
(2) create any substantive or procedural rights subject to judicial review.
(c) Classified information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.
(d) The unauthorized disclosure of foreign government information is presumed to cause damage to the national security.
C) 1950 Federal Records Act
44 U.S. Code § 3106 - Unlawful removal, destruction of records
https://www.law.cornell.edu/uscode/text/44/3106
Current through Pub. L. 114-38. (See Public Laws for the current Congress.)
US Code
Notes
Authorities (CFR)
prev | next
The head of each Federal agency shall notify the Archivist of any actual, impending, or threatened unlawful removal, defacing, alteration, or destruction of records in the custody of the agency of which he is the head that shall come to his attention, and with the assistance of the Archivist shall initiate action through the Attorney General for the recovery of records he knows or has reason to believe have been unlawfully removed from his agency, or from another Federal agency whose records have been transferred to his legal custody. In any case in which the head of the agency does not initiate an action for such recovery or other redress within a reasonable period of time after being notified of any such unlawful action, the Archivist shall request the Attorney General to initiate such an action, and shall notify the Congress when such a request has been made.
https://www.law.cornell.edu/uscode/text/44/3106
Current through Pub. L. 114-38. (See Public Laws for the current Congress.)
US Code
Notes
Authorities (CFR)
prev | next
The head of each Federal agency shall notify the Archivist of any actual, impending, or threatened unlawful removal, defacing, alteration, or destruction of records in the custody of the agency of which he is the head that shall come to his attention, and with the assistance of the Archivist shall initiate action through the Attorney General for the recovery of records he knows or has reason to believe have been unlawfully removed from his agency, or from another Federal agency whose records have been transferred to his legal custody. In any case in which the head of the agency does not initiate an action for such recovery or other redress within a reasonable period of time after being notified of any such unlawful action, the Archivist shall request the Attorney General to initiate such an action, and shall notify the Congress when such a request has been made.
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
263 replies, 50726 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (70)
ReplyReply to this post
263 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
Hillary Clinton's Felony. The federal laws violated by the private server [View all]
leveymg
Aug 2015
OP
Why are outright lying smears of DEMOCRATIC candidates allowed on DEMOCRATIC UNDERGROUND?
randys1
Aug 2015
#90
For those who can't or won't discuss the facts or the law, there is always the comfort of snide
leveymg
Aug 2015
#4
Are you an expert on this? Seeing as you're a Sanders supporter you're certainly biased and have an
Metric System
Aug 2015
#7
And Hillary Clinton certainly never transferred classified info to her server.
Huddie94
Aug 2015
#230
It's all they have when faced with something negative about their candidate. nt
revbones
Mar 2016
#239
Your OP isn't a "smear"? This issue has been discredited over and over again, and has been...
George II
Aug 2015
#157
You have called Hillary Clinton a felon! That is FALSE, unconscionable, and inexcusable.
George II
Aug 2015
#158
Why because you don't like it? CT is over used to lock or hide posts that some find contrary
rhett o rick
Aug 2015
#30
I have no problem with this post, however, yesterday when a thread was posted about Bernie applying
still_one
Aug 2015
#89
Why is this post Okay: its filled with slander: Hillary is not under investigation
lewebley3
Aug 2015
#95
Precisely. She should have thought about what she was doing, but it isn't as if she erased
JDPriestly
Aug 2015
#146
unfortunately the president decided to turn the page or look forward or some idiotic
Doctor_J
Aug 2015
#192
You have no shame. I see you're a Sanders supporter. What a shocker. I see two fellow Sanders
Metric System
Aug 2015
#5
Why do you assume this is an attack? It's an analysis of facts and law. Dispute it on that basis
leveymg
Aug 2015
#18
Aren't we also here to discuss the pros and cons of the different candidates?
Raymondo22
Aug 2015
#212
Oh for FUCKS sake, I am more liberal than you and your ten best friends and your
randys1
Aug 2015
#98
If there is indeed a felony that could stick, based on the facts and legal statutes ...
Martin Eden
Aug 2015
#133
So then, you are certain there is no legal case that could derail HC in the general election ...
Martin Eden
Aug 2015
#147
Thanks for giving voice to my feelings. Candidates that "play the game" are not what I want
erronis
Aug 2015
#134
They can play the game all they want, as long as they arent republicans or teaparty
randys1
Aug 2015
#136
Because you (and a few Bernie supporters) and the republicans say she has "legal problems"? ...
1StrongBlackMan
Aug 2015
#56
I am willing to litigate the charges with the seminal poster as long as he stipulates neither...
DemocratSinceBirth
Aug 2015
#79
Anyone who thinks this issue will disappear before the 2016 election has no clue. k&r, nt.
appal_jack
Aug 2015
#34
Was that thread made by a Hillary supporter? Judging by the poster's rec list I doubt it.
Metric System
Aug 2015
#51
Neither one of those articles even attempts a legal analysis by reference to relevant statutes
jberryhill
Aug 2015
#17
Is the OP qualified to give legal analysis? He still hasn't answered that question.
Metric System
Aug 2015
#19
It's an opinion presented as fact. Just look at the title: "Hillary's Felony."
Metric System
Aug 2015
#25
I take umbrage at folks calling other folks felons, especially if the folks being called felons...
DemocratSinceBirth
Aug 2015
#125
4 Sanders supporters and counting have recommended this thread. Interesting.
Metric System
Aug 2015
#14
What you are forgetting is that Democrats are held responsible when they break the law
virtualobserver
Aug 2015
#31
He doesn't have any. It's his opinion and, as they say, opinions are like assholes...
Metric System
Aug 2015
#36
I didn't know it was "old joke".. but i smiled 'cause it sounded like somebody the hell had to say
Cha
Aug 2015
#204
I just saw the ignorant comment on a thread in the latest threads list so I thought I'd reply.
revbones
Mar 2016
#249
When I first saw this thread on my phone I knew it would bring you 'lots of love'. Thanks for
Purveyor
Aug 2015
#41
He didn't say they found emails that were classified at the time of origination.
pnwmom
Aug 2015
#155
It's just your opinion, as your supporters in this thread have argued. That's about as much thought
Metric System
Aug 2015
#48
This post is a lie; Hillary is not being investigate for anything: Nothing but a GOP attack!
lewebley3
Aug 2015
#61
Would Bernie Sanders say smut such as the OP? NO, he would not and woud be very
riversedge
Aug 2015
#67
Because some people lack confidence in their preferred candidate, so they post garbage about others.
pnwmom
Aug 2015
#153
SORRY, Righties, State Dept. Says There’s Nothing Illegal About Hillary’s Emails
liberal N proud
Aug 2015
#152
Agreed, I will vote for the winner. The alternative will kill people. Period. Not acceptable. n/t
freshwest
Aug 2015
#197
".. this reply ws written by a REAL Bernie Sanders supporter... " Not someone spreading
Cha
Aug 2015
#205
This is old and simply not true - misrepresentations, lies, whatever - here are links to facts
Sancho
Aug 2015
#159
Once you get to Hillary's rank in politics, you always have a team of lawyers
passiveporcupine
Aug 2015
#199
I have some questions for the seminal poster that I would request he or she answers
DemocratSinceBirth
Aug 2015
#169
This post shows some Sanders supporters will just post anything to take Hillary down.
hrmjustin
Aug 2015
#170
The fact that you mention her private server shows that you don't understand this case
Recursion
Aug 2015
#206
Hindsight is better than foresight and Madame Secretary's judgment is open to scrutiny...
DemocratSinceBirth
Aug 2015
#210
Gosh. Ex-CIA man is going to prison for getting a phone call from a reporter.
Octafish
Aug 2015
#223