There's a new story out saying there's about a 99% chance foreign governments hacked the Clinton's email server: http://www.foxnews.com/politics/201...n-intel-agencies-breached-clinton-server.html
So instead of acting as if it's a forgone conclusion, how about wait until they do or do not come out? Trump is doing just that, he's acting like it's a forgone conclusion. And the less intelligent of his followers are totally eating it up as if it's facts. This is just a continuation of the targeting of her..and after 25 years, they keep throwing shit at the wall and hoping it sticks. So far, nothing. If anything, she should be called Teflon Hil.
That's a pretty accurate statement about what the Republicans have done. It doesn't apply to the FBI investigation, however. Comey already said that laws were broken in the mishandling of classified documents. What he didn't find was intent. If the new emails demonstrate intent to delete emails that were relevant to the investigation and which were subject to congressional subpoena, that's a problem for her. Yeah, we have to wait for the investigation to be concluded, but to take the approach that this is just the usual political political sniping at Hillary is really putting your head in the sand and hoping everything turns out okay.
We'd better burn her as a witch now just to be sure. Dangerous to wait, she might cast a spell on us. Yes, if the new emails are actually new, and if they are actually relevant, and if they actually prove some crime, then there you go. barfo
So Comey says there's no evidence that it happened, but an unnamed source says there's a 99% chance. Hmm, which to believe, which to believe.... barfo
Exactly. I'm willing to wait on lighting the bonfire until the results are in. You feel free to continue your "hear no evil, see no evil, speak no evil" approach.
Yes it is. I am the one Hillary has been having an affair with. You've found me out. Please don't tell the press. barfo
Yes, I'm sure that those nasty Rooskies left Hillary's unprotected server alone while ferreting out thousands of emails from Podesta's account.
That's a brilliant defense. Are you under the impression that hacking didn't exist prior to March of this year?
https://www.engadget.com/2016/10/31/trump-russia-servers-alfa-bank-report/ This election cycle just gets better and better.
Oh, well, since hacking did exist, therefore her server must have been hacked? How brilliant is that theory? barfo
Let's see, the number of foreign governments who maintain cyber intelligence-gathering operations is probably in double or triple digits. They've managed to break into even heavily protected government data files. But, yeah, I'm sure that they'd leave the Secretary of State's homebrew server alone.
Nixon Logs Burn to Ashes The inside track on Washington politics. Politics July 1, 1998 Thousands of pages of history about Richard M. Nixon were tossed into a shredder at the National Archives last month. Just to make sure no one pieces them together again, archives officials had them stuffed into 126 burn bags and hurled into an incinerator at the Pentagon yesterday morning. for many decades these were used daily Nixon Logs Burn to Ashes Politics July 1, 1998 Thousands of pages of history about Richard M. Nixon were tossed into a shredder at the National Archives last month. Just to make sure no one pieces them together again, archives officials had them stuffed into 126 burn bags and hurled into an incinerator at the Pentagon yesterday morning. A burn bag is the informal name given to a container (usually a paper bag or some other waste receptacle) that holds sensitive or classified documents which are to be destroyed by fire or pulping after a certain period of time. The most common usage of burn bags is by government institutions, in the destruction of classified materials. Destruction via burn bags is considered superior to shredding, because shredded documents may be reconstructed. After the capture of the United States embassy in Tehran during the Iran hostage crisis, shredded documents were turned over for painstaking manual reconstruction, which revealed to Iran some U.S. operations including spies. A picture of one such reassembled document can be seen at the George Washington University website.[1] Today, scanners and computers can reconstruct shredded documents very quickly.[2] Burn bags are designed to facilitate the destruction process by not requiring the removal of the items to be destroyed beforehand and by indicating if the items require special procedures.