Talk of The Villages Florida - Rentals, Entertainment & More
Talk of The Villages Florida - Rentals, Entertainment & More
#31
|
|||
|
|||
![]() Quote:
NO MALICE is required to have broken the law. But, she did have intent as evidence is in her emails to her minions, instructing them to remover classification marking before sending them to her. Even then, intent would not be necessary. The fact that classified information was removed from a secure network and distributed via a non-secure network is evidence of a broken law. WP suggests that a hacker that plead guilty of hacking into her system/server didn't really do it, is ludicrous. But, you liberals keep believing in republican conspiracies and UFOs and misuse your privilege to vote by voting for another radical, criminal in this case. Also a liar and a thief, as well as a tax fraud. |
|
#32
|
|||
|
|||
![]() Quote:
|
#33
|
|||
|
|||
![]()
And you probably are also. If you are going to generalize, don't forget to be inclusive.
|
#34
|
|||
|
|||
![]()
With party control of 99% of ALL fed gov. Agencies the cover up and systematic erasing of electronic trail has be going on for couple years. This happened first with clintons and her AIDS having 9 months or more to erase files from the server probably with help from the server.
This IMO why she when around fed gov. Secure record keeping sites securing her business from history record keeping and have the ability to remove it. As far as Obama link? This has been erased the first 9 months before she had to turn over her server for hearings. Any other business or agency under suspension information would of been seized immediately. Not giving the suspected criminal 9 months to doctor or easy files. Now, this next guestions are will the democratic controlled federal agencies have guts to go after there next head pulpit? IMO I doubt it, that's why it's being dragged out to hide and cover up the evidence. Department heads will be sacrificed as before with no crimes charged and will probably be promoted! |
#35
|
|||
|
|||
![]()
No, and I'm also not trying to control people and take their money.
|
#36
|
|||
|
|||
![]()
Progressive Handbook Rule Number 3 :
When the debate becomes too close to the truth then generalize and change the argument . ![]() |
#37
|
|||
|
|||
![]() Quote:
Progressivism is a problem-solving method. Historians generally date Progressive Era as 1890-1920, but the progressive method did not end with that date. The progressive method is not an ideology but a pragmatic search for solutions that work, grounded in a healthy skepticism. Thus, for example, Prohibition was a progressive project and was based on the social science of that era, but “The Great Experiment” of Prohibition failed in practice and progressives also worked for its repeal. The 20th century can reasonably be summarized as the rise and spread of the progressive method." would you agree? |
#38
|
|||
|
|||
![]() Quote:
How did Snowden have access to top secrets? As a system admin? Are there thousands of system admins working as contractors? Is the security on par with 2015 technology or more like 2000 technology? |
#39
|
|||
|
|||
![]() Quote:
His followers and supporters embraced him and his belief system just as firmly and blindly as those who are promoting Hillary do today . |
#40
|
|||
|
|||
![]() Quote:
Read more at: | National Review The labels people put on others are so confusing and misleading. Why bother at all? |
#41
|
|||
|
|||
![]()
" Why bother at all " --- They use the tactic because sadly it has been successful for them time and time again .
It is very ironic that all of the issues which the " Progressives " rail against today and falsely accuse the Conservatives of promoting were ideas conceived and promoted in former times by tier own Party and it`s leaders . |
#42
|
|||
|
|||
![]() Quote:
|
#43
|
|||
|
|||
![]() Quote:
Classified information is ALWAYS stored in secured locations, in safes/vaults or on secured and encrypted electronic media, such as a closed and encrypted computer network. It can never/NEVER be mingled accidentally on an open system such as the Internet because it is a totally different system. The only way that anyone could transmit classified information via an email account on the Internet is if it was purposely moved from one location to another and installed onto the open network. If classified information is discussed on an open network, then that is also a violation, because it is still classified whether marked as such or not. Only the originator is allowed to give declassification instructions. Destruction of classified material must be documented and witnessed. I am paraphrasing and not giving exact quotes of the regulations/laws pertaining to the handling of classified. |
#44
|
|||
|
|||
![]() Quote:
|
#45
|
|||
|
|||
![]() Quote:
|
|
|