E-mail Servers, Hacking, and Our Endangered National Security | American Center for Law and Justice
  Search  |  Login  |  Register

ACLJ Profile Completion

Verified

Endangered National Security

By Jay Sekulow1439477216449

In the 21st century, technology allows us to communicate with anyone from anywhere on nearly any electronic device.

But the enemies of freedom are frequently targeting our technological infrastructure to wreak havoc and collect any amount of personal and classified information they can.

Unfortunately, due to the recklessness of the Obama Administration and former Secretary of State Hillary Clinton – the chief diplomat in charge of national security – our national security is at risk.

First, the recent Office of Personnel Management hack resulted in malicious hackers – potentially led by the Chinese government – stealing personal information on over 20 million Americans and government officials. This information could provide our enemies with a spy-recruiting database.

The government deflected and downplayed this hack, which some are calling the 9/11 of cyber security attacks.

And now, new revelations show that former Secretary of State Clinton used an unsecured, private e-mail server at her home for classified and “Top Secret” State Department e-mails.

Secretary Clinton and her spokespeople have repeatedly insisted none of the e-mails sent using that private server were classified at the time she sent or received them.

That now appears to be completely false, but with the way Secretary Clinton conducted her private, unsecured e-mail server, how would we know?

As The New York Times reported:

“[A]n examination of records requests sent to the department reveals how the practice protected a significant amount of her correspondence from the eyes of investigators and the public. Mrs. Clinton’s exclusive use of personal email for her government business is unusual for a high-level official, archive experts have said. Federal regulations, since 2009, have required that all emails be preserved as part of an agency’s record-keeping system. In Mrs. Clinton’s case, her emails were kept on her personal account and her staff took no steps to have them preserved as part of State Department record.”

Secretary Clinton has stated that she has deleted personal e-mails and, until recently, refused to turn over the other e-mails on the server or on her lawyer’s thumb drive.

Several weeks ago, however, the inspector general of the intelligence community found that four e-mails out of a forty e-mail random sample contained classified information. Contrary to Secretary Clinton’s assertions, the spokeswoman for the inspector general affirmed that the e-mails “were classified when they were sent and are classified now.”

The Wall Street Journal has more:

“As a result of the findings, the inspector general referred the matter to the Federal Bureau of Investigation’s counterintelligence division. An official with the Department of Justice said Friday that it had received a referral to open an investigation into the potential mishandling of classified information. Initially, a Justice Department official said Friday morning the investigation was criminal in nature, but the department reversed course hours later without explanation.”

The FBI has broad investigative powers, spanning both areas involving criminal justice and national security. Although these two can intertwine, it is possible for the FBI to conduct investigations that are not criminal in nature and focus only on national security concerns. However, these investigations could later become criminal in nature if such violations are discovered.

Recent developments this week reveal that the inspector general has now told Members of Congress that two of the four e-mails actually contained “top secret” information, a higher classification than previously reported.

Secretary Clinton has subsequently handed over her private computer server and the thumb drive containing copies of her e-mails.

Several questions arise.

Did Secretary Clinton’s e-mail practices put our national security at risk? With Secretary of State Kerry’s recent claims that China and Russia likely gained access to his e-mails, one can only imagine who could have accessed this “top secret” information on Secretary Clinton’s unsecured private server stored at her home.

Federal regulations (18 CFR 3a.11) define “Top Secret” as:

Top Secret refers to national security information or material which requires the highest degree of protection. The test for assigning Top Secret classification is whether its unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Examples of exceptionally grave damage include armed hostilities against the United States or its allies; disruption of foreign relations vitally affecting the national security; the compromise of vital national defense plans or complex cryptologic and communications intelligence systems; the revelation of sensitive intelligence operations; and the disclosure of scientific or technological developments vital to national security. This classification is to be used with the utmost restraint.

The fact that information that could cause “exceptionally grave damage to the national security” was sitting on an unsecured server at Secretary Clinton’s house should be of concern to every American.

Have any crimes been committed? Have any laws been violated? Should the Department of Justice and FBI be conducting a criminal investigation?

There are many laws, both civil and criminal, that could potentially be at play here.

The Federal Records Act (44 U.S.C. § 3101) requires all government agencies and government officials to preserve records and keep copies of official correspondence dealing with the agency’s business, functions, policies, procedures, and more. As The Wall Street Journal reported, “[I]n 2009, the National Archives did issue regulations that said agencies allowing employees to do official business on nonofficial email accounts had to ensure that any records sent on private email systems are preserved “in the appropriate agency recordkeeping system.”

As for potential criminal violations:

  • 18 U.S.C. § 1924: “Whoever, being an officer, employee, contractor, or consultant of the United States, and, by virtue of his office, employment, position, or contract, becomes possessed of documents or materials containing classified information of the United States, knowingly removes such documents or materials without authority and with the intent to retain such documents or materials at an unauthorized location shall be fined under this title or imprisoned for not more than one year, or both.”
  • 18 U.S.C § 793: “(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,
    (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
    (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
    Shall be fined under this title or imprisoned not more than ten years, or both.”
  • 18 U.S.C. § 2071 makes it a felony whenever any custodian of official government records “willfully and unlawfully conceals, removes, mutilates, obliterates, falsifies, or destroys the same.”

Shannen Coffin – a former senior Justice Department official – discusses this last law in National Review:

“The crime is punishable by up to three years in prison. And interestingly, Congress felt strongly enough about the crime that it included the unusual provision that the perpetrator shall “forfeit his office and be disqualified from holding any office under the United States.” The requirement for specific intent in this criminal law — “willfully and unlawfully” — and the fact that Loretta Lynch would ultimately decide whether to bring prosecution, makes it doubtful that charges would be filed. But the better question is how could Hillary Clinton, in light of this prohibition, decide that this was a good (or legal) idea? Setting up a shadow e-mail server to conduct all official business as secretary of state is an action plainly undertaken for the purpose of evading federal-records laws. And Clinton was successful at that, avoiding congressional and citizen demands for review of her record during her term in office.”

As Mr. Coffin points out, if there is a need for criminal investigations, can we really trust the same Department of Justice that colluded with FBI and IRS officials to unconstitutionally target grassroots conservative groups to thoroughly investigate this issue?

The ACLJ is preparing critical legal letters to the DOJ and Congress demanding a full investigation, not a faux investigation.

We are aggressively working on Capitol Hill to ensure a thorough investigation.

This isn’t about politics. Our vital national security is at stake.

Investigate Sec. of State Clinton Emails

National Security  Signatures

LOGIN

Receive the latest news, updates, and contribution opportunities from ACLJ.

$20
$40
$60
$120
$240
Make this a monthly tax-deductible gift.

Our national security is at risk. We're uniquely positioned to demand a full investigation. Have your gift doubled in support of our work.

Email Address is required.
First Name is required.
Last Name is required.
Credit Card Number is required.
Verification Code is required.
Expiration Month is required.
Expiration Year is required.
Receive the latest news, updates, and contribution opportunities from ACLJ.
Encourage your friends to sign and donate by sharing this petition.

Why Border Security Matters

By Wesley Smith1536242400000

Who would have thought just a few short years ago that both Democrats and Republicans, who saw securing our southern border as an important issue and a point of agreement between the two parties, would be in a political battle over the matter? As the President and GOP members of Congress call for...

read more

What You Need to Know About the North Korea Agreement

By Wesley Smith1528920513933

The historic five-hour meeting between President Trump and North Korea’s Kim Jong Un ended with a signed agreement between the two leaders. It is not a treaty, as it does not contain any details as to implementation or a way forward in order to bring about the general goals in the signed agreement.

read more

The Complicated Hope of a Deal with North Korea

By Wesley Smith1528212074714

As the planned summit between the United States and North Korea was on, then off, and now on again, President Trump acknowledged that the phased dismantling of North Korea’s nuclear weapons program was a possibility. Many in the media latched onto this as a reversal of the President’s pledge that...

read more

Oral Argument in National Security Proclamation Case

By Edward White1525460400000

Last week, the Supreme Court of the United States heard oral arguments concerning the legality of President Trump’s National Security Proclamation . The Proclamation, issued in September, fulfilled the promise of President Trump’s March 6, 2017 National Security Executive Order. The March 6th...

read more