The airport meeting with Clinton and Lynch was purpously created to create votes

So what?
Hillary wasn't hacked.
State was.
bullshit.you have no clue.
and if Hillary was hacked ( which is more then likely) she was hacked with classified info -whereas State was hacked only on the low side (non-classified info)
 
bullshit.you have no clue.
and if Hillary was hacked ( which is more then likely) she was hacked with classified info -whereas State was hacked only on the low side (non-classified info)

Hackers do not hack classified info, they hack everything, which means Putin also has Hillarie's Clinton Foundation crimes in the Kremlin files. This is a clear case of espionage, in fact it is the biggest espionage case in U.S. history.
 
So you have seen the FBI and NSA reports about Hillaries server. Where did you get access to these? The fact is that the IG report did not say that the server wasn't hacked so you are mumbling what you want to be true. Bye the way the State dept. had to shut down their own security because Hillaries server was viewed as a hacker of the State system.

So try again little one.

So you are a retard?
I thought as much.

Please, by all means post your evidence that Hillary's server was hacked.
I will wait. Until November.
 
Hackers do not hack classified info, they hack everything, which means Putin also has Hillarie's Clinton Foundation crimes in the Kremlin files. This is a clear case of espionage, in fact it is the biggest espionage case in U.S. history.

Your proof?
 
She does not have to have been hacked, she had people sending her email thru Yahoo and Google, and she replied and there is no way for the USA to retrieve all copies of these because they lie outside the USA. It's really dumb, Hilly even said so.

LA LA LA

So she wasn't hacked. Got it.
Thanks
 
So you are a retard?
I thought as much.

Please, by all means post your evidence that Hillary's server was hacked.
I will wait. Until November.

In order to have proof of hacking of the Hillipoos server, you would need the FBI reports which you do not have, so you have not a shred of evidence that Hillypoos server was not hacked. Can you understand that kid? Probably not but you um know might you know be um you know right, like Caroline Kennedy was um you know right.
Another bright Democrat who knew it all, you know.
 
Hackers do not hack classified info, they hack everything, which means Putin also has Hillarie's Clinton Foundation crimes in the Kremlin files. This is a clear case of espionage, in fact it is the biggest espionage case in U.S. history.
True. we know of several hacking attempts. I'll go with Gates on this:
http://dailycaller.com/2016/01/21/f...hina-and-iran-accessed-hillarys-server-video/
Former Secretary of Defense Robert Gates says, “I think the odds are pretty high” countries like Iran, China, and Russia hacked Hillary Clinton’s email server.

In an interview with Hugh Hewitt on Thursday, the former CIA director said “the Pentagon acknowledges that they get attacked about 100,000 times a day.”
 
In order to have proof of hacking of the Hillipoos server, you would need the FBI reports which you do not have, so you have not a shred of evidence that Hillypoos server was not hacked. Can you understand that kid? Probably not but you um know might you know be um you know right, like Caroline Kennedy was um you know right.
Another bright Democrat who knew it all, you know.

Ok.
So like anatta you have zere proof yet you make a claim anyway.
Guess what zipperhead, anatta has no (zero) credibility here. He has cried wolf (lied and been caught) once too often.

Congrats, you have now joined anatta in the zerocredibility society. Nota pretty place to be
 
True. we know of several hacking attempts. I'll go with Gates on this:
http://dailycaller.com/2016/01/21/f...hina-and-iran-accessed-hillarys-server-video/
Former Secretary of Defense Robert Gates says, “I think the odds are pretty high” countries like Iran, China, and Russia hacked Hillary Clinton’s email server.

In an interview with Hugh Hewitt on Thursday, the former CIA director said “the Pentagon acknowledges that they get attacked about 100,000 times a day.”

Circumstancial?
Why bother idiot.
 
Ok.
So like anatta you have zere proof yet you make a claim anyway.
Guess what zipperhead, anatta has no (zero) credibility here. He has cried wolf (lied and been caught) once too often.

Congrats, you have now joined anatta in the zerocredibility society. Nota pretty place to be
Rune you have no evidence that Hillaries unprotected server was not hacked, and the FBI actually has the hacker in custody.

So get a grip kid
 
anatta?
Not even a single iota of proof?
I thought not.
Why do you hate honesty anatta?

I am glad that you are now admitting that there is not even a single iota of proof that Hillies server was not hacked.

Putin is laughing his ass off over idiots like you.

He might even make a TV show based upon Hillaries emails.
 
Rune you have no evidence that Hillaries unprotected server was not hacked, and the FBI actually has the hacker in custody.

So get a grip kid

Please post any evidence at all.
I am waiting.

The truth of the matter is simple;
If there were any proof at all you would publish it in an instant.
 
Circumstancial?
Why bother idiot.
you can't even get your terms correct -it's evidential. Circumstantial would be related to,
but not direct evidence. There is direct evidence she had hacking attempts, and Gates ( former CIA) "odds are pretty high" it was

You crowing about my lack of credibility is fucking hilarious. You can't even defend Clinton's "security" as many times as you've tried.
You try to link it to States high side, when there is no evidence she had even the minimal equivalent of State's low side.
 
I am glad that you are now admitting that there is not even a single iota of proof that Hillies server was not hacked.

Putin is laughing his ass off over idiots like you.

He might even make a TV show based upon Hillaries emails.

Is your name really anatta?
:legion:
 
Please post any evidence at all.
I am waiting.

The truth of the matter is simple;
If there were any proof at all you would publish it in an instant.

https://www.law.cornell.edu/uscode/text/18/part-I/chapter-37 That is the evidence which clearly spells out the laws that Hilly violated. No hacking or classified info need be available, that said you will neglect to read it.

(a) Whoever, with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation, communicates, delivers, or transmits, or attempts to communicate, deliver, or transmit, to any foreign government, or to any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, or to any representative, officer, agent, employee, subject, or citizen thereof, either directly or indirectly, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, note, instrument, appliance, or information relating to the national defense, shall be punished by death or by imprisonment for any term of years or for life, except that the sentence of death shall not be imposed unless the jury or, if there is no jury, the court, further finds that the offense resulted in the identification by a foreign power (as defined in section 101(a) of the Foreign Intelligence Surveillance Act of 1978) of an individual acting as an agent of the United States and consequently in the death of that individual, or directly concerned nuclear weaponry, military spacecraft or satellites, early warning systems, or other means of defense or retaliation against large-scale attack; war plans; communications intelligence or cryptographic information; or any other major weapons system or major element of defense strategy.

(b) Whoever, in time of war, with intent that the same shall be communicated to the enemy, collects, records, publishes, or communicates, or attempts to elicit any information with respect to the movement, numbers, description, condition, or disposition of any of the Armed Forces, ships, aircraft, or war materials of the United States, or with respect to the plans or conduct, or supposed plans or conduct of any naval or military operations, or with respect to any works or measures undertaken for or connected with, or intended for the fortification or defense of any place, or any other information relating to the public defense, which might be useful to the enemy, shall be punished by death or by imprisonment for any term of years or for life.

(c) If two or more persons conspire to violate this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

(d)
(1) Any person convicted of a violation of this section shall forfeit to the United States irrespective of any provision of State law—
(A) any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, as the result of such violation, and

(B) any of the person’s property used, or intended to be used, in any manner or part, to commit, or to facilitate the commission of, such violation.

For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.

(2) The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.

(3) The provisions of subsections (b), (c) and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A) property subject to forfeiture under this subsection;

(B) any seizure or disposition of such property; and

(C) any administrative or judicial proceeding in relation to such property,

if not inconsistent with this subsection
 
They had to shut down her server ( or State her account..not sure)at least once because of "repeated hacking attempts"
Then it was her using her Blackberry ( tied to her Email) in un-secured areas -what could possibly go wrong?

Clinton's personal BlackBerry less secure
the security risks were magnified because Clinton used her personal BlackBerry on travel in foreign countries where State Department employees are routinely cautioned about the use of mobile devices.
http://www.politico.com/story/2015/03/hillary-clintons-personal-blackberry-less-secure-116200

Official cautions against BlackBerry use
http://dailycaller.com/2016/03/23/h...w-so-far-about-hillarys-shady-blackberry-use/
Boswell, the diplomatic security chief, was clearly not keen on the idea of Clinton using a BlackBerry on Mahogany Row, records obtained last year by the Competitive Enterprise Institute shows.

In a March 2 memo to Mills, Boswell wrote that the bureau of diplomatic security had conducted a review and reaffirmed its belief that “vulnerabilities and risks associated with the use of Blackberries in the Mahogany Row [redacted] significantly outweigh the convenience their use can add to staff that have access to the unclassified OpenNet system on their desktops.”

Boswell also appeared to suggest that Clinton could sync her BlackBerry with OpenNet, the State Department’s unclassified email network.

“Those Blackberries can be synchronized with your OpenNet Microsoft Outlook accounts, provide full cellular, e-mail, and internet functionality, and provide unclassified mobile technology when you are away from Mahogany Row.”

Clinton never did use an OpenNet system, however. She opted instead for an email system that utilized an email server maintained in her personal residence.
 
Back
Top