The FBI could not review all of the Hillary Clinton emails under investigation because: The Clintons’ Apple personal server used for Hillary Clinton work email could not be located for the FBI to examine.
- An Apple MacBook laptop and thumb drive that contained Hillary Clinton email archives were lost, and the FBI couldn’t examine them.
- 2 BlackBerry devices provided to FBI didn’t have their SIM or SD data cards.
- 13 Hillary Clinton personal mobile devices were lost, discarded or destroyed. Therefore, the FBI couldn’t examine them.
- Various server backups were deleted over time, so the FBI couldn’t examine them.
- After State Dept. notified Hillary Clinton her records would be sought by House Benghazi Committee, copies of her email on the laptops of her attorneys Cheryl Mills and Heather Samuelson were wiped with BleachBit, and the FBI couldn’t review them.
- After her emails were subpoenaed, Hillary Clinton’s email archive was also permanently deleted from her then-server “PRN” with BleachBit, and the FBI couldn’t review it.
- Also after the subpoena, backups of the PRN server were manually deleted.
Notice the "after the subpoena" stuff at the end of the list. That's destruction of evidence which is likely yet another felony for whoever did that. After that, the report lists all classified information that was discovered from what emails the FBI investigators were able to reconstruct; a list of Clinton players involved in the scandal; and a timeline. The timeline repeatedly lists concerns raised about the email setup, security training for Clinton and her staff, events like destruction of evidence, and hacking attempts, some which were successful, into State Department affairs and personal email accounts of State Department officials and Clinton associates.
Thus, we have strong evidence for gross negligence, which is a felony even if it is not intentional, evidence of coverup of something, and a presidential candidate with a remarkable disregard for the responsibilities of her duties.
Let me walk you through the basics of Frustration and Mortification, ehem, I mean Fan and Mortar Geysers. These two erupt together and when active, the intervals typically fall every 3-7 days. Here's a labeled photo for reference.
Normally, Fan goes through cycles in which its vents turn on in a certain order. After a quiet period (during which Mortar may splash lightly from Bottom or Lower), River Vent turns on. River actually erupts horizontally, away from your perspective in the photo above - so figuring out when River is on either involves using heavy steam as a proxy or walking 100 meters up the path to the bridge where you can get a clear view of it. High and Gold begin to splash and are considered on when the splashing becomes nearly constant. Finally, Angle turns on with a swishing sound. The cycle ends when River turns off again - a single cycle can be anywhere from 20 to 70 minutes, typically.
Every once and a while, an event cycle occurs, simply meaning something different happens. Here's where things get complicated. Main Vent is not a friend to Fan's other vents, and splashing in Main Vent often leads to pauses in activity from the other event. Here's a timeline for what we might consider an "ideal" event cycle:
Main Vent splashing.....River Vent on.....River Vent pause.....River Vent on.....River Vent pause.....River Vent on.....no more Main Vent splashing.....High/Gold Vents on.....Angle Vent on
The final component needed for an eruption is called lock. In lock, High Vent erupts steadily to a height of 1.5-2 meters (5-6 feet), and Gold/Angle Vents splash continuously. An eruption may be initiated from East or Main Vent, or in Upper Mortar. Soon all the vents take off. Upper Mortar reaches 23 meters (80 feet), Main Vent hits over 30 meters (100 feet), and East Vent shows off an impressive horizontal throw that will absolutely get you wet. The following photos are from a particularly strong eruption on August 12th, 2014. Note the drenched people and the beautiful jets from Upper Mortar.
Anyway, back to my story. I came as an event cycle petered out and say on a bench. About 9am after watching nearby Riverside go off, we noticed a pause with almost all activity, particularly that of the River Vent on Fan Geyser, going quiet. One of my cowatchers stated that the pause was rather long, meaning it might just lead to an eruption later that day. He advised I stick around. Despite getting hungry, I decided to heed his advice. Just before 10am, one of the observers saw a bit of water splash in the Main Vent. I was thinking, dude, it was just a little splash. About 15 minutes later it did it again.
Now, you might ask yourself, what's the draw in watching a pile of rock emit steam and water for three hours? Even when the geysers aren't doing the real thing, there's a lot of interplay and activity. It's always doing something. Fan is the main performer here with six major vents running in a line across its mound. River Vent faces the Firehole River, of course, and provides the main indicator of the "event cycle" described above. The three vents across the top, Top, Gold, and Angle Vent all spurt steaming water and often rob power from one another. Then opposite the river are Main and finally East Vent which are the main soakers of the audience when a major eruption happens.
Meanwhile Mortar Geyser groans and hisses ominously. You could always tell when the Upper Mortar Vent was steaming because of the deep growl it emitted while nearby Bottom Mortar Vent would near continuously hiss even during the quiet periods.
So there was always something going on. After 10am, the Fan Geyser vents on the top (Top, Gold, and Angle) resumed activity and soon, we spotted the second singular splash in Fan's Main. That was faithfully radioed in at 10:15am. By this time, I noticed that we were building up a small crowd. Soon after, Top started erupting continually indicating considerable activity. But the other two by it, Gold and Angle would only erupt fitfully with Angle having very little activity. As noted above, we were now looking for "lock" all three vents going simultaneously and continually. The crowd kept building up to I'd guess around 100 people.
Some point after 10:30am, we got a key escalation with water splashing out of the Upper Mortar cone. Shortly after that, lock happened. That's about when the build up of the video above started. You can see Mortar Geyser on the left side with sporadic splashing and the mound of Fan Geyser behind and to the right with steam shooting into the river from the River Vent and the three vents on top steadily erupting to a few feet (the "lock" of course). Then there are larger spurts from the Upper Mortar Vent which shortly cascade into a full-blown eruption from every vent in the video (at 10:48). I was between the spot of the video and the main brunt of the East Fan Vent so I got wet, but didn't get a face full of water. People cleared out of that space quickly.
In addition to my parka, I also wore a hat. That turned out to be a great idea since I would have gotten completely soaked otherwise. The eruptions are hard to video because they generate a huge cloud of steam (and silica rich spray too, hard on lens!) quickly, hiding the details. But moving around, I could see the vents and where the water eventually fell.
Just as with the build up, there was some weird dynamics with power shifting between the two geysers. One geyser would surge with its vents and the other fade a little, back and forth.
I think the build up and eruptive dynamics make this one of the most spectacular geysers in the world though you have to be very lucky to see it erupt, if you don't have the time to sit around to wait on it. The local Old Faithful Visitors Center would have information on recent Fan and Mortar activity and they would be good to consult, if you're just traveling through.
After about ten minutes, the eruption stopped and the geysers entered a heavy steam phase. At that point, I headed off to bed.
Related: check out this awesome video.
By request, these are our top resident wiseasses, clowns, and wit smiths:
By count: Nick Funny Mods %Funny wonkey_monkey60635% aristarchus59625% c0lo58522% Ethanol-fueled43113% VLM3809% bob_super35624% maxwell demon35520% Tork29720% frojack2574% Bot25337%
By percent: Nick Funny Mods %Funny Anne Nonymous16960% Buck Feta19755% Bot25337% DECbot12137% skullz10137% Gaaark21536% wonkey_monkey60635% JeanCroix9232% jimshatt9530% davester66624129%
A tip of the hat to @wonkey_monkey: and @Bot: for being the only ones to make both lists. Their asses are indeed wise.
Looks like I'm going to have to up my game if I want to make the list next time.
Here we go again. AC is excluded of course because he cheats by having tens of thousands of people do his posting for him.
By count: Nick Trolls %Troll Ethanol-fueled56517% Runaway19563097% jmorris23712% The Mighty Buzzard21910% aristarchus2179% frojack1503% Hairyfeet1499% zugedneb9025% khallow876% VLM802% By percent: Nick Trolls %Troll zugedneb9025% Ethanol-fueled56517% Khyber2015% jmorris23712% The Mighty Buzzard21910% jasassin3010% aristarchus2179% Hairyfeet1499% TLA148% Runaway19563097%
A tip of the hat to the returning champions and a hearty welcome aboard to the newcomers.
So, audioguy (one of our sysadminy types) was checking the firewall logs and apparently one of the speedbumps we put in for bots got tripped by an L-3 Communications Holdings address. Not to be confused with Level 3 Communications, L-3 is the sneaky spy corp born of the Lockheed Martin merger. So, yes, we're officially being actively (as opposed to the passive scraping the NSA does to everyone's traffic) electronically surveiled.
Mind you, since they're tripping our firewall, they're not going to be seeing much unless they throttle back how many connections they use at once. They really should make use of the API for bot stuff. It's still firewalled but there are bits in it that can get you much more info at once and save us both the overhead of inefficient scraping.
To make matters worse for Hillary, it recently emerged that at least one of the emails she handed over to investigators under subpoena in fact did contain classified information that was marked as such. The April 2012 email chain discusses an impending phone call with Malawi’s new president. The important part is an email from Monica Hanley, an aide, to Clinton, including the “call sheet” for the secretary. In layman’s terms, this was a note for Secretary Clinton telling her what she needed to discuss during her scheduled phone conversation with a foreign head of state.
We don’t know what that was, however, since most of that email has been redacted as classified at the Confidential level, the lowest classification level in the U.S. Government. The smoking gun here is that the call sheet begins with the line: “(C) Purpose of Call: To offer condolences on the passing pf President Mutharika and congratulate President Banda on her recent swearing in.”
Everything after that has been redacted. But that “(C)” is what is termed a “portion marking,” a tip-off to the reader that the paragraph following is classified. (For how this all works in practice, see this explainer.) In other words, Hanley knew she was sending classified information in an unclassified email to Hillary Clinton’s personal email account, an unambiguous violation of Federal law.
and
Last week the Associated Press broke a big story about how Clinton’s “unclassified” emails included the true names of CIA personnel serving overseas under cover. This was hardly news, in fact I broke the same story four months ago in this column. However, the AP account adds detail to what Clinton and her staff did, actions that placed the lives of CIA clandestine personnel at risk. It also may be a violation of the Intelligence Identities Protection Act, a 1982 law that featured prominently in the mid-aughts scandal surrounding CIA officer Valerie Plame, which so captivated the mainstream media. More recently, former CIA officer John Kiriakou spent two years in Federal prison for violating this law.
To make matters worse for Team Clinton, last week it emerged that several of the classified emails under investigation involved discussions of impending CIA drone strikes in Pakistan. Clinton aides were careful to avoid hot-button words like “CIA” and “drone” in these “unclassified” emails, engaging in a practice that spies term “talking around” an issue.
However, the salient fact is that the CIA—which has the say here—considers this information to be Top Secret, as well as enormously sensitive. It had no business being in anybody’s unclassified emails. As the secretary of state, Ms. Clinton and her top staff had access to classified communications systems 24 hours a day. They chose not to use them here—a choice that clearly violated Federal law. Moreover, this new report demonstrates that a previous Clintonian EmailGate talking point, that discussions of drones in emails were no more than pasting press pieces, and therefore innocuous, was yet another bald-faced lie.
You can read the original article to view embedded links in the quotes above.
It makes little sense, except perhaps to further some false flag operation, to continue to make the argument that Clinton didn't break serious laws here.
On January 9, 2011, the non-Departmental advisor to President Clinton who provided technical support to the Clinton email system notified the Secretary’s Deputy Chief of Staff for Operations that he had to shut down the server because he believed “someone was trying to hack us and while they did not get in i didnt [sic] want to let them have the chance to.” Later that day, the advisor again wrote to the Deputy Chief of Staff for Operations, “We were attacked again so I shut [the server] down for a few min.” On January 10, the Deputy Chief of Staff for Operations emailed the Chief of Staff and the Deputy Chief of Staff for Planning and instructed them not to email the Secretary “anything sensitive” and stated that she could “explain more in person.”
Or some CYA discussions by the firm which ended up handling backups of the server at the end before it was seized:
In the letter, Johnson quotes from emails sent by and to employees at Platte River Networks, which indicate there was discussion about how the duration of data backups could be reduced, apparently at the direction of the Clinton Executive Service Corp.
Then this past August, a Platte River Networks employee wrote to a coworker that he was, “Starting to think this whole thing really is covering up some shaddy (sic) s**t.”
“I just think if we have it in writing that they told us to cut the backups, and that we can go public with our statement saying we have backups since day one, then we were told to trim to 30days (sic), it would make us look a WHOLE LOT better,” the unnamed employee continued.
And now the various responsible parties are coordinating their defense:
Four central figures in the FBI’s criminal investigation of Hillary Clinton’s email practices are all using the same lawyer, a move described as a “red flag” by a former U.S. attorney who now runs a government watchdog group.
Lawyer Beth Wilkinson is representing: Clinton former chief of staff Cheryl Mills; policy adviser Jake Sullivan; media gatekeeper Philippe Reines; and former aide Heather Samuelson, who helped decide which Clinton emails were destroyed before turning over the remaining 30,000 records to the State Department.
“I think it would be a real red flag,” Matthew Whitaker, executive director of the Foundation for Accountability and Civic Trust, or FACT, told Fox News, in reference to the legal defense. He suggested having a single lawyer would help the four Clinton aides align their stories for FBI interviews.
It continues to amaze me how Clinton supporters can continue to ignore rather brazen signs of corruption and criminal activity.
It's that time again. Time to pay tribute to those willing, nay eager, to say that which a lot of people do not want to hear. Be their motives sincere or simply to wind you up, they are the souls brave enough to be unpopular with the masses. Here are the top ten by sheer number of times modded Troll and (of the top 50 of the previous group) the top ten by percent of their comments that have been modded Troll. These are not an "all time" list, only the ones that haven't fallen off the end of our moderation log table.
By count:
NickTrolls%Troll
Ethanol-fueled50117%
Runaway19562617%
jmorris18412%
The Mighty Buzzard18111%
aristarchus1558%
Hairyfeet1459%
frojack1262%
zugedneb8624%
khallow706%
VLM672%
By percent:
NickTrolls%Troll
zugedneb8624%
Ethanol-fueled50117%
Khyber2015%
jmorris18412%
The Mighty Buzzard18111%
jasassin3010%
Hairyfeet1459%
aristarchus1558%
Arik418%
TLA148%