3 years ago, National Review published an article entitled: Clinton Pushed Aide to Strip Markings from Sensitive Documents, Send through ‘Nonsecure’ Channel. From that article:
During a 2011 e-mail exchange, Hillary Clinton urged top aide Jake Sullivan to strip classified talking points of all markings and send them through “nonsecure” means after a secure fax line failed to function. On the night of June 16, 2011, Sullivan told Clinton that important talking points on an undetermined issue would be faxed to her the following morning. When Clinton informed Sullivan that the talking points had not yet materialized, he began a frantic search for the problem. “They say they’ve had issues sending secure fax,” he wrote to Clinton 15 minutes later. “They’re working on it.” “If they can’t, turn into nonpaper with no identifying heading and send nonsecure,” Clinton replied.
Two days ago, The Daily Wire, had this to say,
Over two years after the fact, newly released FBI emails obtained via a Freedom of Information Act (FOIA) request confirm that James Comey’s FBI attempted to work out a quid pro quo deal with the Obama State Department to help minimize the Hillary Clinton private email server scandal just weeks before the 2016 election.
The article goes on to describe negotiations between the State Department and the Justice Department, essentially working out a “dope deal” that would see the DOJ soft-peddling of Clinton’s open and notorious handling of highly classified material, in exchange for the Department of State increasing the number of positions allowed for FBI Agents in some of our embassies abroad. Overlooking a serious crime(s) for a bureaucratic favor!
Let me be clear, somebody committed a felony, likely several. If as some reports have indicated, there was certain overhead imagery, marked or unmarked on Secretary Clinton’s e-mail server, someone committed a serious crime. The way government information/automation systems are set up, someone had to take a deliberate series of felonious actions in order for that imagery to get there. Period.
Instead of getting into a detailed primer on Department of Defense and Department of State electronic communications, I’ll give you the short version. This is especially important as it puts to bed the bogus argument that Clinton displayed no criminal intent during her e-mail debacle. It demonstrates that it is absoloutely certain that there were several felonies committed—no doubt.
Although the State Department and the Department of Defense use different systems for their unclassified communications, they do share some of the same systems for their classified traffic. The unclassified systems used by Defense and State have e-mail, file sharing and teleconferencing capabilities. Those systems also have access to the Internet. Some agencies allow their employees to use their unclassified computers to conduct limited personal business, such as sending e-mails and looking at RedState online, during their breaks. These employees can also send e-mail to private addressees from this system.
The classified systems the agencies use jointly are:
SIPRNet (Secret Internet Protocol Router Network): used to transmit material that is classified CONFIDENTIAL or SECRET. It may not be used to transmit TOP SECRET material.
JWICS (Joint Worldwide Intelligence Communications System): used to transmit TOP SECRET information, to include highly classified satellite imagery. The JWICS system is where Private Bradley Manning likely obtained the information he later gave to Wikileaks. This is also the system the State Department uses to routinely receive and access satellite imagery and imagery analysis, along with other TOP SECRET information.
What is important to understand is that, except for extremely rare and tightly controlled circumstances, JWICS, SIPRNet and the in-house unclassified systems do not connect to each other or with outside systems. The only way to get information from one system to another is to use a system I have yet to introduce, the SneakerNet.
“SneakerNet” is IT slang, referring to someone taking information on one system, saving it to portable media, disk or thumb drive and walking (“sneakering”) it over to the other system and uploading it, thereby bypassing the procedural safeguards inherent in separate, unconnected systems. An alternative, using the same concept, would be to print the data from a JWICS terminal (possibly inside the State Department) and then scan the hard copy into an unclassified system. This method would also work were someone get access to a hard copy document or photo handed out at a meeting.
One of the advantages of this unconnected system of systems is that it virtually eliminates “spillage,” the accidental release of one level of classified information into an arena not cleared for it. If there was reconnaissance satellite imagery or analysis of that imagery on Secretary Clinton’s server or any other unclassified system, it is a virtual certainty that someone had to take a series of deliberate and felonious steps to put it there—deliberate and felonious steps.
A photo would have had to have its markings deliberately removed. Then it would have had to have been copied from JWICS onto removable media (or printed out) and uploaded (or scanned) to either an unclassified computer & e-mailed to Secretary Clinton, or directly uploaded to her server. In the case that what was on her server was merely a written assessment of what the imagery shows, the above still pertains. Someone had to make a series of deliberate decisions and steps to either copy or transcribe the assessment from JWICS and send it via a nonsecure e-mail to Secretary Clinton.
What this means, is that the conversation about this being a mistake, accident, or minor error in judgment, is a flat out lie. In my humble opinion, this lie should be rolled into an obstruction of justice charge—yet another felony. If I, Streiff, or anyone else with a TS clearance had treated classified information in such a fashion, we’d still be in Fort Leavenworth. That criminal crone Clinton along with her coterie, needs to be locked up—and they need to do hard time.
I’ll address the FBI’s conduct in a subsequent article.
Disclosure: The last time I personally used any of these systems was in 2012. Systems and procedures have likely changed since then.
Mike Ford is a retired Infantry Officer who writes on Military, Foreign Affairs and occasionally dabbles in Political and Economic matters. He has when required, held a TS-SCI Clearance.
You can find his other Red State work here.
He is also (reluctantly) on Twitter: @MikeFor10394583