E-mail Servers, Hacking, and Our Endangered National Security | American Center for Law and Justice
  Search  |  Login  |  Register

ACLJ Profile Completion

Verified

Endangered National Security

By Jay Sekulow1439477216449

In the 21st century, technology allows us to communicate with anyone from anywhere on nearly any electronic device.

But the enemies of freedom are frequently targeting our technological infrastructure to wreak havoc and collect any amount of personal and classified information they can.

Unfortunately, due to the recklessness of the Obama Administration and former Secretary of State Hillary Clinton – the chief diplomat in charge of national security – our national security is at risk.

First, the recent Office of Personnel Management hack resulted in malicious hackers – potentially led by the Chinese government – stealing personal information on over 20 million Americans and government officials. This information could provide our enemies with a spy-recruiting database.

The government deflected and downplayed this hack, which some are calling the 9/11 of cyber security attacks.

And now, new revelations show that former Secretary of State Clinton used an unsecured, private e-mail server at her home for classified and “Top Secret” State Department e-mails.

Secretary Clinton and her spokespeople have repeatedly insisted none of the e-mails sent using that private server were classified at the time she sent or received them.

That now appears to be completely false, but with the way Secretary Clinton conducted her private, unsecured e-mail server, how would we know?

As The New York Times reported:

“[A]n examination of records requests sent to the department reveals how the practice protected a significant amount of her correspondence from the eyes of investigators and the public. Mrs. Clinton’s exclusive use of personal email for her government business is unusual for a high-level official, archive experts have said. Federal regulations, since 2009, have required that all emails be preserved as part of an agency’s record-keeping system. In Mrs. Clinton’s case, her emails were kept on her personal account and her staff took no steps to have them preserved as part of State Department record.”

Secretary Clinton has stated that she has deleted personal e-mails and, until recently, refused to turn over the other e-mails on the server or on her lawyer’s thumb drive.

Several weeks ago, however, the inspector general of the intelligence community found that four e-mails out of a forty e-mail random sample contained classified information. Contrary to Secretary Clinton’s assertions, the spokeswoman for the inspector general affirmed that the e-mails “were classified when they were sent and are classified now.”

The Wall Street Journal has more:

“As a result of the findings, the inspector general referred the matter to the Federal Bureau of Investigation’s counterintelligence division. An official with the Department of Justice said Friday that it had received a referral to open an investigation into the potential mishandling of classified information. Initially, a Justice Department official said Friday morning the investigation was criminal in nature, but the department reversed course hours later without explanation.”

The FBI has broad investigative powers, spanning both areas involving criminal justice and national security. Although these two can intertwine, it is possible for the FBI to conduct investigations that are not criminal in nature and focus only on national security concerns. However, these investigations could later become criminal in nature if such violations are discovered.

Recent developments this week reveal that the inspector general has now told Members of Congress that two of the four e-mails actually contained “top secret” information, a higher classification than previously reported.

Secretary Clinton has subsequently handed over her private computer server and the thumb drive containing copies of her e-mails.

Several questions arise.

Did Secretary Clinton’s e-mail practices put our national security at risk? With Secretary of State Kerry’s recent claims that China and Russia likely gained access to his e-mails, one can only imagine who could have accessed this “top secret” information on Secretary Clinton’s unsecured private server stored at her home.

Federal regulations (18 CFR 3a.11) define “Top Secret” as:

Top Secret refers to national security information or material which requires the highest degree of protection. The test for assigning Top Secret classification is whether its unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Examples of exceptionally grave damage include armed hostilities against the United States or its allies; disruption of foreign relations vitally affecting the national security; the compromise of vital national defense plans or complex cryptologic and communications intelligence systems; the revelation of sensitive intelligence operations; and the disclosure of scientific or technological developments vital to national security. This classification is to be used with the utmost restraint.

The fact that information that could cause “exceptionally grave damage to the national security” was sitting on an unsecured server at Secretary Clinton’s house should be of concern to every American.

Have any crimes been committed? Have any laws been violated? Should the Department of Justice and FBI be conducting a criminal investigation?

There are many laws, both civil and criminal, that could potentially be at play here.

The Federal Records Act (44 U.S.C. § 3101) requires all government agencies and government officials to preserve records and keep copies of official correspondence dealing with the agency’s business, functions, policies, procedures, and more. As The Wall Street Journal reported, “[I]n 2009, the National Archives did issue regulations that said agencies allowing employees to do official business on nonofficial email accounts had to ensure that any records sent on private email systems are preserved “in the appropriate agency recordkeeping system.”

As for potential criminal violations:

  • 18 U.S.C. § 1924: “Whoever, being an officer, employee, contractor, or consultant of the United States, and, by virtue of his office, employment, position, or contract, becomes possessed of documents or materials containing classified information of the United States, knowingly removes such documents or materials without authority and with the intent to retain such documents or materials at an unauthorized location shall be fined under this title or imprisoned for not more than one year, or both.”
  • 18 U.S.C § 793: “(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,
    (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
    (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
    Shall be fined under this title or imprisoned not more than ten years, or both.”
  • 18 U.S.C. § 2071 makes it a felony whenever any custodian of official government records “willfully and unlawfully conceals, removes, mutilates, obliterates, falsifies, or destroys the same.”

Shannen Coffin – a former senior Justice Department official – discusses this last law in National Review:

“The crime is punishable by up to three years in prison. And interestingly, Congress felt strongly enough about the crime that it included the unusual provision that the perpetrator shall “forfeit his office and be disqualified from holding any office under the United States.” The requirement for specific intent in this criminal law — “willfully and unlawfully” — and the fact that Loretta Lynch would ultimately decide whether to bring prosecution, makes it doubtful that charges would be filed. But the better question is how could Hillary Clinton, in light of this prohibition, decide that this was a good (or legal) idea? Setting up a shadow e-mail server to conduct all official business as secretary of state is an action plainly undertaken for the purpose of evading federal-records laws. And Clinton was successful at that, avoiding congressional and citizen demands for review of her record during her term in office.”

As Mr. Coffin points out, if there is a need for criminal investigations, can we really trust the same Department of Justice that colluded with FBI and IRS officials to unconstitutionally target grassroots conservative groups to thoroughly investigate this issue?

The ACLJ is preparing critical legal letters to the DOJ and Congress demanding a full investigation, not a faux investigation.

We are aggressively working on Capitol Hill to ensure a thorough investigation.

This isn’t about politics. Our vital national security is at stake.

Investigate Sec. of State Clinton Emails

National Security  Signatures

LOGIN

Receive the latest news, updates, and contribution opportunities from ACLJ.

$20
$40
$60
$120
$240
Make this a monthly tax-deductible gift.

Our national security is at risk. We're uniquely positioned to demand a full investigation. Have your gift doubled in support of our work.

Email Address is required.
First Name is required.
Last Name is required.
Credit Card Number is required.
Verification Code is required.
Expiration Month is required.
Expiration Year is required.
Receive the latest news, updates, and contribution opportunities from ACLJ.
Encourage your friends to sign and donate by sharing this petition.

Does Protecting the Homeland Violate the Constitution?

By Wesley Smith1568040051160

A federal judge on September 4th ruled that a federal government watchlist designed to protect the United States and its citizens is unconstitutional. The Terror Screening Database ( TSDB) compiles the names of people who are “known or suspected terrorists,” and the judge decreed that such a list...

read more

Supreme Court Grants Emergency Stay for Border Security

By Jordan Sekulow1564187971387

The U.S. Supreme Court has just issued an emergency stay , ruling that the Trump Administration can proceed with repurposing funding for border security while the case continues on appeal. This ruling is a major victory for national security and agrees with the arguments we have been making in our...

read more

JSL: President Trump Makes History

By Jordan Sekulow1562009840392

President Trump always does things differently, and this weekend was no different when he once again made history as the first sitting American President to step foot on North Korean soil. On today’s broadcast, we discussed the President’s unprecedented meeting with North Korean leader Kim Jong Un...

read more

What You Need to Know About the Crisis on the Border

By Wesley Smith1560526036441

The situation on the southern border is one of mayhem and an unresolved crisis of ever-increasing magnitude. The inaction by Congress combined with judicial proceedings designed to prevent any action being taken as to border security, and immigration in general, is inexcusable, with stark results.

read more