The Pronk Pops Show 511, August 12, 2015, Story 1: President Barack Obama Ordered National Security Agency (NSA) To Target Hillary Clinton As A National Security Risk? — Dossier Used As Leverage — Hanging Hillary Out To Dry and To Twist Slowly in The Wind — They Are Coming To Take Clinton Away To The Funny Farm For Risking The National Security of The United States — Hillary Clinton Is Lying and Has Committed Felonies — Videos

Posted on August 12, 2015. Filed under: American History, Applications, Benghazi, Blogroll, Breaking News, Business, Communications, Computers, Congress, Constitutional Law, Corruption, Crime, Economics, Education, Elections, Federal Government, Foreign Policy, Government, Government Spending, Hardware, Hillary Clinton, History, Law, Media, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, Progressives, Radio, Raymond Thomas Pronk, Regulation, Scandals, Security, Servers, Social Science, Software, Spying, Success, Taxation, Technology, Terror, Terrorism, United States Constitution, Videos, Violence, Wall Street Journal, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 511: August 11, 2015 

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Pronk Pops Show 496: June 30, 2015

Pronk Pops Show 495: June 29, 2015

Pronk Pops Show 494: June 26, 2015

Pronk Pops Show 493: June 25, 2015

Pronk Pops Show 492: June 24, 2015

Pronk Pops Show 491: June 23, 2015

Pronk Pops Show 490: June 22, 2015

Pronk Pops Show 489: June 19, 2015

Pronk Pops Show 488: June 18, 2015

Pronk Pops Show 487: June 17, 2015

Pronk Pops Show 486; June 16, 2015

Pronk Pops Show 485: June 15, 2015

Pronk Pops Show 484: June 12, 2015

Pronk Pops Show 483: June 11, 2015

Pronk Pops Show 482; June 10, 2015

Pronk Pops Show 481: June 9, 2015

Pronk Pops Show 480: June 8, 2015

Pronk Pops Show 479: June 5, 2015

Pronk Pops Show 478: June 4, 2015

Pronk Pops Show 477: June 3, 2015

Pronk Pops Show 476: June 2, 2015

Pronk Pops Show 475: June 1, 2015

Pronk Pops Show 474; May 29, 2015

Pronk Pops Show 473: May 28, 2015

Pronk Pops Show 472: May 27, 2015

Pronk Pops Show 471: May 26, 2015

Pronk Pops Show 470: May 22, 2015

Pronk Pops Show 469: May 21, 2015

Pronk Pops Show 468: May 20, 2015

Pronk Pops Show 467: May 19, 2015

Pronk Pops Show 466: May 18, 2015

Pronk Pops Show 465: May 15, 2015

Pronk Pops Show 464; May 14, 2015

Pronk Pops Show 463; May 13, 2015

Pronk Pops Show 462: May 8, 2015

Pronk Pops Show 461: May 7, 2015

Pronk Pops Show 460; May 6, 2015

Pronk Pops Show 459: May 4, 2015

Pronk Pops Show 458: May 1, 2015

Story 1: President Barack Obama Ordered National Security Agency (NSA) To Target Hillary Clinton As A National Security Risk? — Dossier Used As Leverage — Hanging Hillary Out To Dry and To Twist Slowly in The Wind — They Are Coming  To Take Clinton Away To The Funny Farm For Risking The National Security of The United States — Hillary Clinton Is Lying and Has Committed Felonies — Videos

The U.S. Bill of Rights

The Preamble to The Bill of Rights

Congress of the United States
begun and held at the City of New-York, on
Wednesday the fourth of March, one thousand seven hundred and eighty nine.

THE Conventions of a number of the States, having at the time of their adopting the Constitution, expressed a desire, in order to prevent misconstruction or abuse of its powers, that further declaratory and restrictive clauses should be added: And as extending the ground of public confidence in the Government, will best ensure the beneficent ends of its institution.

RESOLVED by the Senate and House of Representatives of the United States of America, in Congress assembled, two thirds of both Houses concurring, that the following Articles be proposed to the Legislatures of the several States, as amendments to the Constitution of the United States, all, or any of which Articles, when ratified by three fourths of the said Legislatures, to be valid to all intents and purposes, as part of the said Constitution; viz.

ARTICLES in addition to, and Amendment of the Constitution of the United States of America, proposed by Congress, and ratified by the Legislatures of the several States, pursuant to the fifth Article of the original Constitution.

Note: The following text is a transcription of the first ten amendments to the Constitution in their original form. These amendments were ratified December 15, 1791, and form what is known as the “Bill of Rights.”


Amendment I

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.


Amendment II

A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.


Amendment III

No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.


Amendment IV

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.


Amendment V

No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.


Amendment VI

In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the Assistance of Counsel for his defence.


Amendment VII

In Suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved, and no fact tried by a jury, shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law.


Amendment VIII

Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.


Amendment IX

The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.


Amendment X

The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.

http://www.archives.gov/exhibits/charters/bill_of_rights_transcript.html

NSA Utah Data Center Bluffdale servers-roomswapable hard drivesNSA Collection DataPRISMnsa2

Judge Napolitano: Hillary’s Legal Problems ‘Worse Than Grave’

Inspector Finds Top Secret Emails Were On Hillary Clinton’s Server – Trey Gowdy – Benghazi Gate

Top Secret Email Found On Hillary Clinton Server – Special Report All Star Panel

Report: Clinton e-mails contained ‘top secret’ material

Federal Judge Orders Hillary Clinton to Give Sworn Statement on E-Mails • Kelly File • 8/3/15 •

GOP presidential debate: Rand Paul vs Chris Christie HEATED EXCHANGE

Obama: My Emails Could Be Targeted Too

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

NSA Whistleblower William Binney on how they target us, abuse us, spy on us

“The NSA Is Lying”: U.S. Government Has Copies of Most of Your Emails Says NSA Whistleblower

Top Whistle blowers Expose NSA Lies

Former NSA Head Exposes Agency’s Real Crimes

NSA Whistleblower William Binney: The Future of FREEDOM

A 36-year veteran of America’s Intelligence Community, William Binney resigned from his position as Director for Global Communications Intelligence (COMINT) at the National Security Agency (NSA) and blew the whistle, after discovering that his efforts to protect the privacy and security of Americans were being undermined by those above him in the chain of command.

The NSA data-monitoring program which Binney and his team had developed — codenamed ThinThread — was being aimed not at foreign targets as intended, but at Americans (codenamed as Stellar Wind); destroying privacy here and around the world. Binney voices his call to action for the billions of individuals whose rights are currently being violated.

William Binney speaks out in this feature-length interview with Tragedy and Hope’s Richard Grove, focused on the topic of the ever-growing Surveillance State in America.

On January 22, 2015: (Berlin, Germany) – The Government Accountability Project (GAP) is proud to announce that retired NSA Technical Director and GAP client, William “Bill” Binney, will accept the Sam Adams Associates for Integrity in Intelligence Award today in Berlin, Germany. The award is presented annually by the Sam Adams Associates for Integrity in Intelligence (SAAII) to a professional who has taken a strong stand for ethics and integrity. http://whistleblower.org/press/nsa-wh…

What You Didn’t Know About The NSA Bluffdale Spy Center – From Former NSA Director Bill Binney

Obama Defends NSA Spying

Carly Fiorina vs Chris Matthews on Hillary Clinton’s Lies

Walker: Russians & Chinese “Know More About Hillary Clinton’s Email” Than Congress

Rand Paul on Hillary Clinton’s Servers – The O’Reilly Factor

Benghazi Gate – Rand Paul and Hillary Clinton – Question & Answer

Obama Admin. Was Likely Running Arms To Islamic Jihadists Through Benghazi

Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood

Uncovering the Benghazi Cover-up: Obama was Watching Siege After Drone Arrived (10/28/12)

Obama LIED About Benghazi Attack!!! (Lt. Col. Tony Shaffer Interview)

SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria

Benghazi-Gate: Connection between CIA and al-Qaeda in Libya and Syria, with Turkey’s Help

(FULL) 13 Hours in Benghazi: Fox News Special Report

Russia Hacks Pentagon + China Hack = 25 Million Records. Fed Judge Requests All Clinton Emails

Bill Clinton on NSA: Be Careful What’s in Your Emails

Obama: ‘Lives Have Been Saved’ by NSA Programs

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Judge Napolitano: Glenn Greenwald To Release List Of Names Targeted By NSA

Guardian Reporter Glenn Greenwald: We Have List of NSA Targets

Glenn Greenwald on How NSA Leaker Edward Snowden Helped Expose a “Massive Surveillance Apparatus”

President Obama on Edward Snowden and the NSA PRISM Program Leak (2013)

NSA Surveillance and What To Do About It

Glenn Becks “SURVEILLANCE STATE”

Enemy of the State 1998 Full Movie In English [HD 1080p] – Will Smith, Gene Hackman, Jon Voight

Funny Farm- coming to take me away

The Spy Satellite Secrets in Hillary’s Emails

These weren’t just ordinary secrets found in Clinton’s private server, but some of the most classified material the U.S. government has.
After months of denials and delaying actions, Hillary Clinton has decided to turn over her private email server to the Department of Justice. As this controversy has grown since the spring, Clinton and her campaign operatives have repeatedly denied that she had placed classified information in her personal email while serving as Secretary of State during President Obama’s first term. (“I am confident that I never sent nor received any information that was classified at the time it was sent and received,” she said last month.) Her team also denied that she would ever hand over her server to investigators. Now both those assertions have been overturned.

Hillary Clinton has little choice but to hand over her server to authorities since it now appears increasingly likely that someone on her staff violated federal laws regarding the handling of classified materials. On August 11, after extensive investigation, the Intelligence Community’s Inspector General reported to Congress that it had found several violations of security policy in Clinton’s personal emails.

Most seriously, the Inspector General assessed that Clinton’s emails included information that was highly classified—yet mislabeled as unclassified. Worse, the information in question should have been classified up to the level of “TOP SECRET//SI//TK//NOFORN,” according to the Inspector General’s report.

You may have seen acronym lists like these on declassified documents before—and glazed over them. This is the arcane language of the cleared cognoscenti so let me explain what this means:

• TOP SECRET, as the name implies, is the highest official classification level in the U.S. government, defined as information whose unauthorized release “could cause exceptionally grave damage to national security or foreign relations.”

• SI refers to Special Intelligence, meaning it is information derived from intercepted communications, which is the business of the National Security Agency, America’s single biggest source of intelligence. They’re the guys who eavesdrop on phone calls, map who’s calling who, and comb through emails. SI is a subset of what the intelligence community calls Sensitive Compartmented Information or SCI. And these materials always require special handling and protection. They are to be kept in a Sensitive Compartmented Information Facility or SCIF, which is a special hardened room that is safe from both physical and electronic intrusion.

• TK refers to Talent Keyhole, which is an IC caveat indicating that the classified material was obtained via satellite.

• NOFORN, as the name implies, means that the materials can only be shown to Americans, not to foreigners.

In short: Information at the “TOP SECRET//SI//TK//NOFORN” level is considered exceptionally highly classified and must be handled with great care under penalty of serious consequences for mishandling. Every person who is cleared and “read on” for access to such information signs reams of paperwork and receives detailed training about how it is to be handled, no exceptions—and what the consequences will be if the rules are not followed.

People found to have willfully mishandled such highly classified information often face severe punishment. Termination of employment, hefty fines, even imprisonment can result.
In the real world, people with high-level clearances are severely punished for willfully violating such rules. At a minimum, those suspected of mishandling things like NSA “signals intelligence”—intercepts calls, emails, and the like—have their clearances suspended pending the outcome of the investigation into their misconduct. Any personal items—computers, electronics—where federal investigators suspect the classified wound up, wrongly, will be impounded and searched. If it has TOP SECRET//SI information on it, “your” computer now belongs to the government, since it is considered classified.

People found to have willfully mishandled such highly classified information often face severe punishment. Termination of employment, hefty fines, even imprisonment can result. Yes, people really do go to jail for mishandling classified materials. Matthew Aid, a writer on intelligence matters, served over a year in prison for mishandling TOPSECRET//SI information from NSA, for example. The well connected tend to avoid jail, however. Sandy Berger and John Deutsch—who both served in high-level positions under President Bill Clinton, did not go to prison for mishandling TOP SECRET intelligence (though Berger got probation and was fined $50,000).

What, then, does all this means for Hillary? There is no doubt that she, or someone on her State Department staff, violated federal law by putting TOP SECRET//SI information on an unclassified system. That it was Hillary’s private, offsite server makes the case even worse from a security viewpoint. Claims that they “didn’t know” such information was highly classified do not hold water and are irrelevant. It strains belief that anybody with clearances didn’t recognize that NSA information, which is loaded with classification markings, was signals intelligence, or SIGINT. It’s possible that the classified information found in Clinton’s email trove wasn’t marked as such. But if that classification notice was omitted, it wasn’t the U.S. intelligence community that took such markings away. Moreover, anybody holding security clearances has already assumed the responsibility for handling it properly.
As Secretary of State, Hillary Clinton had no authority to disseminate IC information on her own, neither could she make it less highly classified (a process termed “downgrading” in the spy trade) without asking IC permission first.

It is a very big deal and less connected people who do this sort of thing ruin their lives, as any IC counterintelligence official can attest. During my NSA time, I saw junior personnel terminated for relatively minor infractions of security regulations. While the U.S. government unquestionably does over-classify items on the policy side, where almost everything in the Defense and State Departments gets some sort of classification stamp, not usually at a high level, intelligence reporting by its very nature is classified. If you don’t want the responsibility of a high-level government position, which inevitably brings with it TOP SECRET//SI access, then don’t accept that burden.

There’s still a lot we don’t know about Hillary’s Emailgate. Exactly how many emails contained TOPSECRET//SI information is unclear. We may never know since thousands of emails were already destroyed by Clinton. Who exactly placed the classified information in emails—it may not have been Hillary Clinton—and how did they access the information in the first place? How many of Hillary’s staffers at Foggy Bottom were also using her personal server?

Underlying all this is the question of why Hillary Clinton decided to employ her own private email and server to handle so much of her official State Department business. This is, to say the least, highly irregular—not to mention a violation of numerous U.S. government rules and regulations—so there had to be a compelling reason to do this. What was it?

The Clinton campaign was concerned enough about the issue to send out an email blast Wednesday afternoon with the subject line: “A note about Hillary Clinton’s emails.”

“You might hear some news over the next few days about Hillary Clinton’s emails,” began the email from Jennifer Palmieri, the communications director for Hillary for America.

“Because you are an important part of this team, we wanted to take a few minutes to talk through the facts—we need your help to make sure they get out there. There’s a lot of misinformation, so bear with us; the truth matters on this.”

Underneath the greeting were several bolded bullet points, including, “Hillary didn’t send any classified materials over email.” There was also a link to a longer, 4,000+ word explanation of why Clinton used a private email address and server in her official capacity as Secretary of State.

The FBI is now on the case and one hopes they will exercise due diligence in their investigation of what may be a serious leak of classified information, made worse by the fact that Clinton’s personal server was wholly unencrypted for three months, leaving it wide open to exploitation by foreign intelligence services.

The number of spy services interested in the communications of the U.S. Secretary of State numbers more than a hundred. Given their technical proficiency, it’s naïve to assume that the Russians and Chinese aren’t among them—a fact that John Kerry, the current secretary, recently admitted.

It’s safe to assume, then, that Moscow and Beijing know what Hillary’s “private” emails as Secretary of State contained. Let’s hope that the American public will someday as well.

http://www.thedailybeast.com/articles/2015/08/12/the-spy-satellite-secrets-in-hillary-s-emails.html

 

EXCLUSIVE: Tech company which maintained Hillary’s secret server was sued for ‘illegally accessing’ database and ‘stealing White House military advisers’ phone numbers’

  • Platte River Networks was used by Clinton to maintain ‘homebrew’ server in her New York State house which held her State Department emails
  • She handed over the server and a thumb drive this week to FBI after emails were found to contain ‘above top secret’ material
  • Her White House campaign is said to be in ‘panic’ over the growing scandal which comes out of probe into US diplomats’ deaths in Benghazi 
  • Daily Mail Online can reveal Denver, Colorado, based firm was sued for illegally accessing master database of US phone numbers
  • It was also accused of causing chaos to White House military advisers when their numbers stopped working as it took their numbers
  • Case raises questions over how Platte River Networks’ ability to secure server which would have been major target for foreign spy hackers 

The Internet company used by Hillary Clinton to maintain her private server was sued for stealing dozens of phone lines including some which were used by the White House.

Platte River Networks is said to have illegally accessed the master database for all US phone numbers.

It also seized 390 lines in a move that created chaos across the US government.

Among the phone numbers which the company took – which all suddenly stopped working – were lines for White House military support desks, the Department of Defense and the Department of Energy, a lawsuit claims.

Others were the main numbers for major financial institutions, hospitals and the help desk number for T2 Communications, the telecom firm which owned them.

A lawsuit filed on behalf of T2 claims that the mess took 11 days to fix and demands that Platte River pay up $360,000 in compensation.

TROUBLE IN CHAPPAQUA: Hillary Clinton faces new questions and new levels of outrage as messages on her private email server were found to contain top-secret signal intercepts and information from spy satellites

IN THE SPOTLIGHT: Platte River Systems was used by Hillary Clinton to maintain her server. Its website boasts that the Denver, Colorado firm, offers to 'build better networks'.

IN THE SPOTLIGHT: Platte River Systems was used by Hillary Clinton to maintain her server. Its website boasts that the Denver, Colorado firm, offers to ‘build better networks’.

BOAST: The firm's website describes it as having 'connections in all the right places'.

National Intelligence Community Inspector General Charles McCullough told members of Congress in writing that two of Clinton's emails were so sensitive that it would have been illegal to show them to any foreigner

The claims raise questions about the competence of Platte River, which is based in Denver, Colorado, to handle Mrs Clinton’s highly sensitive personal information while she was Secretary of State.

The Secretary of State’s emails would have been potentially a target for foreign espionage.

Mrs Clinton installed the system at her home in Chappaqua, upstate New York, and did not even have an official email address until the year she left office.

Earlier this week it emerged that she has handed over the server to the FBI which is investigating her and a number of her top aides.

Mrs Clinton acted after the Inspector General for the intelligence community said that he had found four emails that were stored on it were classified and two of those were Top Secret, the highest level of classification.

DOCUMENTED: The claim made against Platte River Networks and its co-contractors

DOCUMENTED: The claim made against Platte River Networks and its co-contractors

KEY SECTION: The passage in the claim which makes clear that the White House's military support desks and the Department of Defense had their phone numbers allegedly taken

KEY SECTION: The passage in the claim which makes clear that the White House’s military support desks and the Department of Defense had their phone numbers allegedly taken

Until now Mrs Clinton has insisted that none of the emails were classified at the time she sent or received them.

The lawsuit was filed by T2 in November last year and relates to a deal that went through in June.

By that time Mrs Clinton has left her post as Secretary of State; she was in office between 2009 and 2013.

T2 alleges that it had provided 16 phone lines to an insurance broker called Cambridge until they decided to switch providers and signed up with Windstream Communications, who worked with McLeod USA, a local exchange carrier owned by Windstream, and Platte River.

But instead of taking over the 16 lines, T2 claims that the companies asked for 390 more lines in what they called ‘intentional misappropriation’.

T2 alleges that they did this by illegally accessing the database for the Number Portability Administration Centre, the master agency which manages all US phone numbers.

The lawsuit states: ‘Under NPAC regulations, telecommunications providers are only allowed to access the NPAC data base for the exclusive purpose of routing, rating of calls, billing of calls, or performing maintenance in connection with the provision of telecommunications services.

‘Contrary to these NPAC regulations, Defendants accessed the NPAC database to find T2s 390 telephone lines as well as to obtain T2 and its customers’ proprietary network information for use in marketing T2’s lines to their existing and prospective customers.’

The lawsuit describes at length the chaos that resulted when the 390 numbers used by T2 customers suddenly stopped working.

SAFE FOR NOW? Clinton signed a statement under penalty of perjury, but there's no indication when or whether her top staffers will follow suit

EYE IN THE SKY: The classification acronym 'TK' stands for 'Talent Keyhole,' a kind of taskable satellite that delivers high-resolution imagery like this from 200 miles or more above the earth

Among the lines which went dead was that for T2’s main number and its help desk, which meant customers were unable to contact the company at a time when they needed it the most.

THE AGENCY: The CIA's headquarters campus in Langley, Virginia (shown) is likely buzzing over the former secretary of state's apparent casual management of sensitive information

THE CLINTON DEFENSE 

Hillary’s campaign issued a 4,000-word defense of her on Wednesday, including two separate claims that she never used her private email account to handle classified information. The complete sections are reproduced here, including bolded text in the original:

————————

‘Clinton said she did not use her email to send or receive classified information, but the State Department and two Inspectors General said some of these emails do contain classified information. Was her statement inaccurate?

‘Clinton only used her account for unclassified email. No information in Clinton’s emails was marked classified at the time she sent or received them.

‘When information is reviewed for public release, it is common for information previously unclassified to be upgraded to classified if the State Department or another agency believes its public release could cause potential harm to national security, law enforcement or diplomatic relations.

‘After reviewing a sampling of the 55,000 pages of emails, the Inspectors General have proffered that a small number of emails, which did not contain any classified markings and/or dissemination controls, should have been classified at the time they were sent. The State Department has said it disagrees with this assessment.

‘Clinton hopes the State Department and the agencies involved in the review process will sort out as quickly as possible which of the 55,000 pages of emails are appropriate to share with the public.

‘How did Clinton receive and consume classified information?

‘The Secretary’s office was located in a secure area. Classified information was viewed in hard copy by Clinton while in the office. While on travel, the State Department had rigorous protocols for her and traveling staff to receive and transmit information of all types.

‘A separate, closed email system was used by the State Department for the purpose of handling classified communications, which was designed to prevent such information from being transmitted anywhere other than within that system.’

T2 employees’ numbers also stopped working as did lines for: ‘The Department of Defense, Department of Energy; multiple medical emergency facilities as numbers used for general, pre- and post-surgical contact, and obstetric or gynecological emergencies; Federal Contract Support Desks; White House Military Operations support desks, several financial institution’s main telephone numbers, multiple Denver-based Charter schools’ main and backdoor phone numbers, a US-Based telephone number for IBM China, multiple other information technology companies and their support and internal telephone numbers, as well as T2’s main telephone numbers’.

The lawsuit states that the lines were dead for at least 21 hours and that it took the company at least 10 days to ‘unwind’ the mess and get the numbers back.

Among the legal documents filed in the case is a third party complaint filed by Thomas W. Snyder, a lawyer, on behalf of Windstream and McLeod.

It goes into more detail about Platte River’s role in the deal and claims that the company worked as the sales agent for Windstream in connection with the Cambridge account.

It says that Platte River was responsible for ‘spotting any red flags’ and for ‘resolving any inaccuracies’ with the deal.

The document states: ‘Platte River acted negligently and breached this duty by failing to identify that the 390 additional lines were improper.’

The lawsuit adds a new twist to the row about Mrs Clinton’s email server that is refusing to go away amid intense pressure from Republicans.

Mrs Clinton has said that she exchanged about 60,000 emails over the four years in office on the system, of which half were personal and were deleted.

Mrs Clinton turned over the other half to the Department of State in December last year and they are being reviewed and slowly released to the public.

She has until now refused to hand over the server – which she has wiped clean – but changed her mind when it emerged that some of the emails were classified.

Mr Snyder declined to comment.

Daily Mail Online has reached out to Barbara Wells, a Denver lawyer who represents Platte River, Mrs Clinton’s campaign and T2’s lawyers for comment. We have not received any response.

TIMELINE: THE CLINTON EMAIL SAGA

Hillary Clinton’s email troubles began when her private address was exposed by a Romanian hacker. Now the resulting scandal threatens to torpedo her presidential ambitions.

2008 – Hillary Clinton acquires a personal email server for her use in running for president, and has it installed in her Chappaqua, New York home

January 13, 2009 – Internet records show that the domain ‘clintonemail.com’ was created

January 21, 2009 – Clinton is confirmed by the U.S. Senate as President Obama’s secretary of state

February 1, 2013 – Clinton leaves the State Department

March 20, 2013 – Clinton’s private email address, hdr22@clintonemail.com, is made public when a Romanian hacker named ‘Guccifer’ (whose real name is Marcel Lazăr Lehel) hacks into longtime Clinton adviser Sidney Blumenthal’s AOL email account and leaks images of his inbox – including emails from Clinton

June 2013 – Hillary’s team shifts control of the email domain to an outside IT contractor in Denver called Platte River Networks, and sends the original server hardware to a data center facility in New Jersey, where it is erased

August 11, 2014 – Following a congressional subpoena and more than a year of delays, the State Department hands over a small number of Clinton’s private emails, 10 in all, to a House committee investigating the 2012 terror attack on a State Department compound in Benghazi, Libya – including some emails from the hdr22@clintonemail.com address

November 2014 – The Benghazi committee asks the State Department for a larger batch of Clinton’s emails and receives about 300 that relate to the Libya saga, amounting to 850 printed pages

December 5, 2014 – Clinton’s aides say that in response to a request from the State Department, they have handed over about 55,000 pages of her work-related emails, comprising 30,490 messages

February 13, 2015 – The State Department sends the Benghazi committee another 850 pages of Clinton’s emails, including some from two different accounts on the private ‘clintonemail.com’ server

February 27, 2015 – State Department staffers tell Benghazi committee aides that Clinton had used her private address exclusively during her tenure at the agency, and that they don’t have any of her emails other than those she provided voluntarily

March 4, 2015 – The Associated Press reports that it has traced Clinton’s private email address back to a private server at her Chappaqua, New York home, and that the server was registered under a fake name

March 10, 2015 – In a contentious press conference following a speech at the United Nations, Clinton admits that she deleted more than 30,000 emails that she says were personal in nature, and says she turned over everything work-related to the State Department, while insisting that ‘I did not email any classified material to anyone on my email; there is no classified material’

March 11, 2015 – The Associated Press sues the State Department to force the release of Clinton’s emails and other documents that the agency has failed to turn over following a Freedom Of Information Act request

April 12, 2015 – Clinton launches her second presidential campaign with an online video and begins two months of low-key campaigning marked by a lack of interaction with reporters

May 22, 2015 – The first 300 of Clinton’s emails are made public by the State Department, revealing a close relationship with Blumenthal in the weeks following the Benghazi terror attack; one of them has been retroactively classified by the FBI as ‘secret’ but Clinton insists it was ‘handled appropriately’

May 27, 2015 – A federal judge orders the State Department to begin releasing all of Clinton’s emails in installments every 30 days, setting monthly targets for the agency so the work is completed by January 29, 2016

July 23, 2015 – Charles McCullough, the inspector general for the U.S. intelligence community tells members of Congress in a letter that a random sampling of 40 Clinton emails turned up four that contained material classified as secret

July 24, 2015 – Andrea Williams, spokeswoman for the McCulloush, says that the emails ‘were classified when they were sent and are classified now.’

July 25, 2015 – During a campaign appearance in Iowa, Clinton modifies her position and tells reporters in Iowa that ‘I am confident that I never sent nor received any information that was classified at the time it was sent and received’ 

July 31, 2015 – The second State Department release of Clinton’s emails, more than 1,300 in all, includes 41 that were marked ‘classified’ before they were made public

August 4, 2015 – Clinton spokesman Nick Merrill says in a statement that the candidate ‘did not send nor receive any emails that were marked classified at the time’

August 11, 2015 – McCullough revises his statement to Congress, saying that two of the four emails in question should have been classified ‘top secret’ – but were not marked that way – and contained information from signal intercepts and keyhole satellite data; he adds that the other two emails are still being evaluated

August 11, 2015 – The FBI takes possession of Clinton’s server hardware and three thumb drives in her lawyer’s possession, which are said to contain copies of everything she turned over to the State Department

http://www.dailymail.co.uk/news/article-3197093/Tech-company-maintained-Hillary-s-secret-server-sued-illegally-accessing-databases-creating-chaos-stealing-White-House-phone-numbers.html

‘Top Secret’ emails found as Clinton probe expands to key aides

Four former aides have turned over personal emails

Senior senator skeptical of the extent of the review

Intelligence investigators say they have yet to see aides’ emails

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 510-511

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

578

Advertisements

Make a Comment

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Liked it here?
Why not try sites on the blogroll...

%d bloggers like this: