BREAKING: Obama Lied Under Oath

Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?
Here is one professor Lakhota:


18 U.S. Code § 793 - Gathering, transmitting or losing defense informati



(a)
Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or

(b)
Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or

(c)
Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or

(d)
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e)
Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f)
Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.


(g)
If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

(h)
(1)
Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.

(2)
The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.

(3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A)
property subject to forfeiture under this subsection;

(B)
any seizure or disposition of such property; and

(C)
any administrative or judicial proceeding in relation to such property,

if not inconsistent with this subsection.

(4)
Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law.

(June 25, 1948, ch. 645, 62 Stat. 736; Sept. 23, 1950, ch. 1024, title I, § 18, 64 Stat. 1003; Pub. L. 99–399, title XIII, § 1306(a), Aug. 27, 1986, 100 Stat. 898; Pub. L. 103–322, title XXXIII, § 330016(1)(L), Sept. 13, 1994, 108 Stat. 2147; Pub. L. 103–359, title VIII, § 804(b)(1), Oct. 14, 1994, 108 Stat. 3440; Pub. L. 104–294, title VI, § 607(b), Oct. 11, 1996, 110 Stat. 3511.)


When you are through digesting this we can go on to the next and after that a third.
Do you have superhuman vision? LOL
Professor Lakhota can do the job very well.
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

Notice how the Republican Congress jumped all over this? They need to go!
Paul Ryan sitting on his hands. He can't use the line he used on Trump "this is not who we are" because he knows this is who they ALL are.
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

EVERYBODY in Washington who ever sent an email to Hillary Clinton knew of Clinton's private server from the first time she used it, which is to say always.

1/3 of administration staffers do business RIGHT NOW, through their private email accounts because federal government email servers are pieces of shit:, you can't access them remotely, they're frequently hacked, and staff have very limited memory for individual accounts. This is what happens when the sequestration has kicked in and your equipment is out of date.

Her email address was [email protected]. If you sent her an email, the information that she is using a private account is right there in her address. You have to be willfully blind not to see it.

Your ignorance with regards to email is just incredible. Since you obviously know nothing about how email works, and what its limitations are, your outrage over the security implications of Hillary's email server are false placed hysteria.

When working at my law office, I had to fight with bank's every day to provide me with client mortgage instructions via email and many flat out refused to do so because sensitive client information was contained in the instructions which could not be sent out via email due to concerns under The Privacy Act.

Many banks will not allow lawyers to provide their reports or draft documents via email because of security concerns. This has been happening since 1999 - concerns about security and privacy of email. And hackers lead the list of concerns.

There was NOTHING on that server which compromised the security of the United States because that's not the nature of governmental email conversations. Some of the emails deemed "classified" after the fact, contained the schedule for conference calls between staffers. It might have been sensitive information in that it pinned down locations for said staffers during those times, but since some have a public calendar, it's hard to understand why such information is deemed "classified".
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails
no big deal, obama lied under oath when he took the oath of office the first time. He promised to uphold the constitution, he had no plans of doing that.
Democrats always lie.
 
EVERYBODY in Washington who ever sent an email to Hillary Clinton knew of Clinton's private server from the first time she used it, which is to say always.

1/3 of administration staffers do business RIGHT NOW, through their private email accounts because federal government email servers are pieces of shit:, you can't access them remotely, they're frequently hacked, and staff have very limited memory for individual accounts. This is what happens when the sequestration has kicked in and your equipment is out of date.

Her email address was [email protected]. If you sent her an email, the information that she is using a private account is right there in her address. You have to be willfully blind not to see it.

Your ignorance with regards to email is just incredible. Since you obviously know nothing about how email works, and what its limitations are, your outrage over the security implications of Hillary's email server are false placed hysteria.

When working at my law office, I had to fight with bank's every day to provide me with client mortgage instructions via email and many flat out refused to do so because sensitive client information was contained in the instructions which could not be sent out via email due to concerns under The Privacy Act.

Many banks will not allow lawyers to provide their reports or draft documents via email because of security concerns. This has been happening since 1999 - concerns about security and privacy of email. And hackers lead the list of concerns.

There was NOTHING on that server which compromised the security of the United States because that's not the nature of governmental email conversations. Some of the emails deemed "classified" after the fact, contained the schedule for conference calls between staffers. It might have been sensitive information in that it pinned down locations for said staffers during those times, but since some have a public calendar, it's hard to understand why such information is deemed "classified".

Obama saw it alright....and didn't do anything about it because Hillary is a psycho and nobody messes with her. He LIED about when he knew what she was doing.....it might not have been under oath but he was speaking to the American public so putting his hand on the Koran shouldn't be necessary. He sent her classified material so his ass was in a sling too....and Loretta Lynch wasn't about to let either of them swing for it.
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?
Here is one professor Lakhota:


18 U.S. Code § 793 - Gathering, transmitting or losing defense informati



(a)
Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or

(b)
Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or

(c)
Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or

(d)
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e)
Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f)
Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.


(g)
If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

(h)
(1)
Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.

(2)
The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.

(3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A)
property subject to forfeiture under this subsection;

(B)
any seizure or disposition of such property; and

(C)
any administrative or judicial proceeding in relation to such property,

if not inconsistent with this subsection.

(4)
Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law.

(June 25, 1948, ch. 645, 62 Stat. 736; Sept. 23, 1950, ch. 1024, title I, § 18, 64 Stat. 1003; Pub. L. 99–399, title XIII, § 1306(a), Aug. 27, 1986, 100 Stat. 898; Pub. L. 103–322, title XXXIII, § 330016(1)(L), Sept. 13, 1994, 108 Stat. 2147; Pub. L. 103–359, title VIII, § 804(b)(1), Oct. 14, 1994, 108 Stat. 3440; Pub. L. 104–294, title VI, § 607(b), Oct. 11, 1996, 110 Stat. 3511.)


When you are through digesting this we can go on to the next and after that a third.
Did you actually READ those sections of the ESPIONAGE ACT? :lol:

NOT a single one of those provisions apply to Clinton's situation.... there was no INTENT to transmit anything to the ENEMY, nor was anything Taken from it's proper place and given to the enemy...

as in:


Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States



 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails


First, when did Obama say this under oath?

Second, when does an incomong e-mail say what server was used?
It says what account was used, dumbass...

Didn't Fat Al Gore teach you ANYTHING about that internet thingy he invented???

Actually, most of the mails I get have the person's name listed, not their e-mail address.

Furthermore, I have several business e-mails with a "business name".com address & I don't have a server in my basement.
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?
Here is one professor Lakhota:


18 U.S. Code § 793 - Gathering, transmitting or losing defense informati



(a)
Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or

(b)
Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or

(c)
Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or

(d)
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e)
Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f)
Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.


(g)
If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

(h)
(1)
Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.

(2)
The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.

(3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A)
property subject to forfeiture under this subsection;

(B)
any seizure or disposition of such property; and

(C)
any administrative or judicial proceeding in relation to such property,

if not inconsistent with this subsection.

(4)
Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law.

(June 25, 1948, ch. 645, 62 Stat. 736; Sept. 23, 1950, ch. 1024, title I, § 18, 64 Stat. 1003; Pub. L. 99–399, title XIII, § 1306(a), Aug. 27, 1986, 100 Stat. 898; Pub. L. 103–322, title XXXIII, § 330016(1)(L), Sept. 13, 1994, 108 Stat. 2147; Pub. L. 103–359, title VIII, § 804(b)(1), Oct. 14, 1994, 108 Stat. 3440; Pub. L. 104–294, title VI, § 607(b), Oct. 11, 1996, 110 Stat. 3511.)


When you are through digesting this we can go on to the next and after that a third.
Did you actually READ those sections of the ESPIONAGE ACT? :lol:

NOT a single one of those provisions apply to Clinton's situation.... there was no INTENT to transmit anything to the ENEMY, nor was anything Taken from it's proper place and given to the enemy...

as in:


Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States


Yes I did, now how about you support your position.
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

To my knowledge, it was NOT illegal at the time Hillary was using her private server - but the rules were later changed to make it against the rules after she left the State Department. Can you provide any "credible" proof that it was illegal when Secretary of State Hillary was using her private server?
Here is one professor Lakhota:


18 U.S. Code § 793 - Gathering, transmitting or losing defense informati



(a)
Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or

(b)
Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or

(c)
Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or

(d)
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or

(e)
Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or

(f)
Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
Shall be fined under this title or imprisoned not more than ten years, or both.


(g)
If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.

(h)
(1)
Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.

(2)
The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.

(3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A)
property subject to forfeiture under this subsection;

(B)
any seizure or disposition of such property; and

(C)
any administrative or judicial proceeding in relation to such property,

if not inconsistent with this subsection.

(4)
Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law.

(June 25, 1948, ch. 645, 62 Stat. 736; Sept. 23, 1950, ch. 1024, title I, § 18, 64 Stat. 1003; Pub. L. 99–399, title XIII, § 1306(a), Aug. 27, 1986, 100 Stat. 898; Pub. L. 103–322, title XXXIII, § 330016(1)(L), Sept. 13, 1994, 108 Stat. 2147; Pub. L. 103–359, title VIII, § 804(b)(1), Oct. 14, 1994, 108 Stat. 3440; Pub. L. 104–294, title VI, § 607(b), Oct. 11, 1996, 110 Stat. 3511.)


When you are through digesting this we can go on to the next and after that a third.
Did you actually READ those sections of the ESPIONAGE ACT? :lol:

NOT a single one of those provisions apply to Clinton's situation.... there was no INTENT to transmit anything to the ENEMY, nor was anything Taken from it's proper place and given to the enemy...

as in:


Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States


prove there was no intent.the terrorist nations certainly contributed a good deal of money to her for something. Damn sure wasn't for her looks, their goats are sexier than she is
 
Proof is in black and white folks. Obama knew of Clintons private email server long before it went public. Lies under oath and nothing will happen. This info comes via WikiLeaks newest dump. The corruption continues........

‘CLEAN THIS UP’: Obama Had Emails From Clinton’s Private Account

Updated link courtesy of Kosh: WikiLeaks - The Podesta Emails

I am with you on the corruption has to be exposed but most Americans are too brainwashed into accepting something from Wikileaks...

It is just sad that this corruption and lies are tolerated and ignored by the ignorant voters in this country!
 

Forum List

Back
Top