{"id":110818,"date":"2017-11-30T13:33:00","date_gmt":"2017-11-30T13:33:00","guid":{"rendered":""},"modified":"2023-01-08T11:04:23","modified_gmt":"2023-01-08T11:04:23","slug":"the-meaning-of","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/11\/30\/the-meaning-of\/","title":{"rendered":"The Meaning of &quot;Marked&quot;"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p> <\/p>\n<div class=\"post-header\"> <\/div>\n<p>This has not been a good stretch for Hillary Clinton.<\/p>\n<p>While she remains the Democratic front-runner for president, there are  continuing signs that some voters are kicking the tires on other  candidates.&nbsp; First came word that Senator <a href=\"http:\/\/www.nytimes.com\/politics\/first-draft\/2015\/08\/04\/hillary-clinton-and-bernie-sanders-remain-tied-in-new-hampshire-poll-shows\/\">Bernie Sanders is now within six points of Mrs. Clinton in New Hampshire<\/a>,  a margin fractionally outside the poll&#8217;s margin of error.&nbsp; The same  survey, commissioned by WMUR-TV, showed Clinton with a double-digit lead  over Sanders in the late spring. <\/p>\n<p>And if that&#8217;s not enough, other Democrats are <a href=\"http:\/\/fortune.com\/2015\/08\/03\/starbucks-ceo-president-hillary-clinton\/\">urging Starbucks CEO Howard Schultz to enter the race<\/a>.&nbsp;  At this point, there is no indication Mr. Schultz is prepared join the  fray, but he has been critical of the &#8220;lack of leadership&#8221; from  government and politicians in recent years, and like Donald Trump, he  could personally finance a sustained campaign&#8211;if he decides to jump in.  <\/p>\n<p>Of course, Mrs. Clinton&#8217;s biggest problem is the on-going e-mail  scandal, which shows no signs of going away.&nbsp; Earlier this week, we  learned the FBI is looking into the security of her private e-mail  server, which she used as a substitute for government-run networks.&nbsp;  According to the <a href=\"http:\/\/www.washingtonpost.com\/politics\/fbi-looks-into-security-of-clintons-private-e-mail-setup\/2015\/08\/04\/2bdd85ec-3aae-11e5-8e98-115a3cf7d7ae_story.html\"><i>Washington Post<\/i><\/a>,  the bureau has contacted the Denver-based IT firm which managed  Clinton&#8217;s server about the security of the system.&nbsp; Similar queries were  posed to her Washington-based lawyer, David Kendall, about a thumb  drive in his possession that contains a number of Clinton e-mails. <\/p>\n<p>Sources contacted by the Post were quick to point out that Mrs. Clinton  was not a target of the FBI probe.&nbsp; But another, unnamed federal  official, contacted by the <a href=\"http:\/\/nypost.com\/2015\/08\/05\/fbi-investigation-of-hillarys-emails-is-criminal-probe\/\">New York Post<\/a>,  said the bureau is, in fact, conducting a criminal investigation.&nbsp; A  former DOJ staffer who was willing to speak on the record noted that the  FBI is organized to ferret out wrong-doing, not work as a security  consultant:<\/p>\n<p><span style=\"font-size: xx-small;\">\u201cMy guess is they\u2019re looking to see if there\u2019s been either any breach  of that data that\u2019s gone into the wrong hands [in Clinton\u2019s case],  through their counter-intelligence group, or they are looking to see if a  crime has been committed,\u201d said Makin Delrahim, former chief counsel to  the Senate Judiciary Committee, who served as a deputy assistant  secretary in the Bush DOJ.<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><\/span><span style=\"font-size: xx-small;\">\u201cThey\u2019re not in the business of providing advisory security services,\u201d Delrahim said of the FBI. \u201cThis is real.\u201d<\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">With  these latest revelations, there was also a slight change in parsing by  the former secretary of state. When the scandal first broke, Clinton  said she was &#8220;confident&#8221; she never transmitted or received classified  information over her system, which was based on a server at her home at  Chappaqua, New York.&nbsp; But on Tuesday, Mrs. Clinton said she never  &#8220;knowingly&#8221; sent or received classified data through her e-mail network.  &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">And  this is where it gets a little fuzzy&#8211;by design.&nbsp; At this point, the  fall-back position for Team Clinton seems to rest with the security  markings of material that was stored on her server and on that thumb  drive in Mr. Kendall&#8217;s office.&nbsp; As anyone who has ever handled  classified information will tell you, the highest classification level  is clearly marked at the top and bottom of each page, and each paragraph  is marked as well.&nbsp; The covers of hard-copy documents reflect their  overall classification, and instructions for declassifying are provided  as well.&nbsp; Similar markings are found on electronic versions of  classified reports and components of the IT system are clearly labeled  to reflect the highest level of material found on the network. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">But  let&#8217;s suppose someone is viewing a classified cable or summary, either  in hard-copy form (or electronically), then summarizes the material in a  new document or e-mail on an unclassified network.&nbsp; Do the  classification rules still apply?&nbsp; Of course they do, and more  importantly, the individual who placed Secret, Top Secret, or Top  Secret\/SCI information on the non-secure system has committed a crime. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">However,  it is unlikely investigators will find complete, classified documents  in the e-mails of Hillary Clinton or others who utilized her network.&nbsp;  For starters, most government computers handling classified  information&#8211;including those at the State Department&#8211;do not allow the  uploading or downloading of documents through flash drives or similar  devices.&nbsp; There are obvious exceptions; transgender traitor Bradley  Manning copied thousands of documents onto CD-RW media and memory cards  for a digital camera, then passed them on to Wikileaks.&nbsp;&nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Another  recent turncoat, Edward Snowden, also exploited weaknesses in the  system to get the information he was looking for.&nbsp; Working for a defense  contractor at NSA, convinced a colleague to let him borrow his log-in  credentials.&nbsp; That gave Snowden access to NSANet, and some of the crown  jewels of American intelligence.&nbsp; His position as a network  administrator also allowed him to utilize thumb drives to &#8220;move&#8221;  documents from one system to another. In a matter of weeks, he  accumulated literally thousands of intel documents. &nbsp; &nbsp; <\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">For  Hillary and her associates, the process was more convoluted.&nbsp; The FBI  inquiry was requested by the Inspector General of the Director of  National Intelligence (DNI), after his staff found classified  information on four e-mails provided by Mrs. Clinton (out of a sample  batch of 40).&nbsp; Based on the IG&#8217;s cryptic description, it appears that  information found in those e-mails was similar to that contained in  classified intel documents.&nbsp; That seems to suggest the person(s) who  placed classified material on the network simply summarized or  paraphrased material they viewed in hard copy, or on systems like  SIPRNET (which handles Secret-level material), or JWICS, which is  cleared for TS-SCI.&nbsp; Quite naturally, there were no page or paragraph  markings&#8211;why call attention to an illegal act?<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">This  much we know: Mrs. Clinton and most of her senior associates utilizing  the e-mail system were cleared for the most sensitive information  produced and retained by the U.S. government.&nbsp; They had routine access  to the full range of intelligence data, up to the TS-SCI level, and a  number of SAR\/SAP programs as well.&nbsp; If you want to discuss that  information&#8211;without the hassle of creating and utilizing e-mail  accounts on SIPRNET or JWICS, just pull bits of material and put them  into an unclassified e-mail and send them over an unsecure network.&nbsp;  It&#8217;s a fair bet that most (if not all) of her e-mails are in the hands  of virtually any country with a national signals intelligence (SIGINT)  capability. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">All  the more reason for the FBI to continue a criminal probe.&nbsp; Mishandling  classified information is a crime (just ask General David Petraeus).&nbsp;  But the Clinton e-mail system went far beyond sharing hard-copy files  with a mistress\/biographer, and storing them outside a secure facility.&nbsp;  By entering classified material into an unsecure e-mail system, the  former Secretary of State and her associates likely exposed a wide range  of classified material to intercept and collection by our enemies. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">Ignore  the spin.&nbsp; This is not a matter of ensuring that classified material  was secure; it&#8217;s a question of who deliberately placed sensitive data on  a non-secure network and engaged in that practice on a recurring  basis.&nbsp; But determining guilt may be more difficult that you&#8217;d think.&nbsp;  Unless there was a system administrator moving classified documents from  State Department systems to the Clinton server, investigators may be  compelled to compare original intel documents with the e-mails,  line-by-line and word-for-word.&nbsp; In response, Mrs. Clinton and her  cronies may claim they thought the information was unclassified (nod,  nod, wink, wink), and literally dare DOJ to press charges. &nbsp;<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">And  there&#8217;s the rub.&nbsp; Attorney General Loretta Lynch may decide to take a  pass on filing charges, or drag out the investigation over many months,  announcing a decision after November, 2016.&nbsp; That is not to say that  Hillary Clinton is off the hook, but given DOJ&#8217;s recent record in  prosecuting any number of Democratic scandals, any day of reckoning is  far down the road&#8211;if it ever comes.<\/span><\/span><\/p>\n<p><span style=\"font-size: xx-small;\"><span style=\"font-size: x-small;\">But  Ms. Lynch can&#8217;t do anything about the damage the e-mail issue is  inflicting on Hillary&#8217;s campaign.&nbsp; Her opponents smell blood in the  water, and more revelations may destroy her latest White House bid,  regardless of what happens with the FBI probe.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This has not been a good stretch for Hillary Clinton. While she remains the Democratic front-runner for president, there are continuing signs that some voters are kicking the tires on other candidates.&nbsp; First came word that Senator Bernie Sanders is now within six points of Mrs. Clinton in New Hampshire, a margin fractionally outside the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110818"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=110818"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/110818\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=110818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=110818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=110818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}