E-mail Servers, Hacking, and Our Endangered National Security | American Center for Law and Justice
  Search  |  Login  |  Register

ACLJ Profile Completion

Verified

Endangered National Security

By Jay Sekulow1439477216449

In the 21st century, technology allows us to communicate with anyone from anywhere on nearly any electronic device.

But the enemies of freedom are frequently targeting our technological infrastructure to wreak havoc and collect any amount of personal and classified information they can.

Unfortunately, due to the recklessness of the Obama Administration and former Secretary of State Hillary Clinton – the chief diplomat in charge of national security – our national security is at risk.

First, the recent Office of Personnel Management hack resulted in malicious hackers – potentially led by the Chinese government – stealing personal information on over 20 million Americans and government officials. This information could provide our enemies with a spy-recruiting database.

The government deflected and downplayed this hack, which some are calling the 9/11 of cyber security attacks.

And now, new revelations show that former Secretary of State Clinton used an unsecured, private e-mail server at her home for classified and “Top Secret” State Department e-mails.

Secretary Clinton and her spokespeople have repeatedly insisted none of the e-mails sent using that private server were classified at the time she sent or received them.

That now appears to be completely false, but with the way Secretary Clinton conducted her private, unsecured e-mail server, how would we know?

As The New York Times reported:

“[A]n examination of records requests sent to the department reveals how the practice protected a significant amount of her correspondence from the eyes of investigators and the public. Mrs. Clinton’s exclusive use of personal email for her government business is unusual for a high-level official, archive experts have said. Federal regulations, since 2009, have required that all emails be preserved as part of an agency’s record-keeping system. In Mrs. Clinton’s case, her emails were kept on her personal account and her staff took no steps to have them preserved as part of State Department record.”

Secretary Clinton has stated that she has deleted personal e-mails and, until recently, refused to turn over the other e-mails on the server or on her lawyer’s thumb drive.

Several weeks ago, however, the inspector general of the intelligence community found that four e-mails out of a forty e-mail random sample contained classified information. Contrary to Secretary Clinton’s assertions, the spokeswoman for the inspector general affirmed that the e-mails “were classified when they were sent and are classified now.”

The Wall Street Journal has more:

“As a result of the findings, the inspector general referred the matter to the Federal Bureau of Investigation’s counterintelligence division. An official with the Department of Justice said Friday that it had received a referral to open an investigation into the potential mishandling of classified information. Initially, a Justice Department official said Friday morning the investigation was criminal in nature, but the department reversed course hours later without explanation.”

The FBI has broad investigative powers, spanning both areas involving criminal justice and national security. Although these two can intertwine, it is possible for the FBI to conduct investigations that are not criminal in nature and focus only on national security concerns. However, these investigations could later become criminal in nature if such violations are discovered.

Recent developments this week reveal that the inspector general has now told Members of Congress that two of the four e-mails actually contained “top secret” information, a higher classification than previously reported.

Secretary Clinton has subsequently handed over her private computer server and the thumb drive containing copies of her e-mails.

Several questions arise.

Did Secretary Clinton’s e-mail practices put our national security at risk? With Secretary of State Kerry’s recent claims that China and Russia likely gained access to his e-mails, one can only imagine who could have accessed this “top secret” information on Secretary Clinton’s unsecured private server stored at her home.

Federal regulations (18 CFR 3a.11) define “Top Secret” as:

Top Secret refers to national security information or material which requires the highest degree of protection. The test for assigning Top Secret classification is whether its unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Examples of exceptionally grave damage include armed hostilities against the United States or its allies; disruption of foreign relations vitally affecting the national security; the compromise of vital national defense plans or complex cryptologic and communications intelligence systems; the revelation of sensitive intelligence operations; and the disclosure of scientific or technological developments vital to national security. This classification is to be used with the utmost restraint.

The fact that information that could cause “exceptionally grave damage to the national security” was sitting on an unsecured server at Secretary Clinton’s house should be of concern to every American.

Have any crimes been committed? Have any laws been violated? Should the Department of Justice and FBI be conducting a criminal investigation?

There are many laws, both civil and criminal, that could potentially be at play here.

The Federal Records Act (44 U.S.C. § 3101) requires all government agencies and government officials to preserve records and keep copies of official correspondence dealing with the agency’s business, functions, policies, procedures, and more. As The Wall Street Journal reported, “[I]n 2009, the National Archives did issue regulations that said agencies allowing employees to do official business on nonofficial email accounts had to ensure that any records sent on private email systems are preserved “in the appropriate agency recordkeeping system.”

As for potential criminal violations:

  • 18 U.S.C. § 1924: “Whoever, being an officer, employee, contractor, or consultant of the United States, and, by virtue of his office, employment, position, or contract, becomes possessed of documents or materials containing classified information of the United States, knowingly removes such documents or materials without authority and with the intent to retain such documents or materials at an unauthorized location shall be fined under this title or imprisoned for not more than one year, or both.”
  • 18 U.S.C § 793: “(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,
    (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
    (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—
    Shall be fined under this title or imprisoned not more than ten years, or both.”
  • 18 U.S.C. § 2071 makes it a felony whenever any custodian of official government records “willfully and unlawfully conceals, removes, mutilates, obliterates, falsifies, or destroys the same.”

Shannen Coffin – a former senior Justice Department official – discusses this last law in National Review:

“The crime is punishable by up to three years in prison. And interestingly, Congress felt strongly enough about the crime that it included the unusual provision that the perpetrator shall “forfeit his office and be disqualified from holding any office under the United States.” The requirement for specific intent in this criminal law — “willfully and unlawfully” — and the fact that Loretta Lynch would ultimately decide whether to bring prosecution, makes it doubtful that charges would be filed. But the better question is how could Hillary Clinton, in light of this prohibition, decide that this was a good (or legal) idea? Setting up a shadow e-mail server to conduct all official business as secretary of state is an action plainly undertaken for the purpose of evading federal-records laws. And Clinton was successful at that, avoiding congressional and citizen demands for review of her record during her term in office.”

As Mr. Coffin points out, if there is a need for criminal investigations, can we really trust the same Department of Justice that colluded with FBI and IRS officials to unconstitutionally target grassroots conservative groups to thoroughly investigate this issue?

The ACLJ is preparing critical legal letters to the DOJ and Congress demanding a full investigation, not a faux investigation.

We are aggressively working on Capitol Hill to ensure a thorough investigation.

This isn’t about politics. Our vital national security is at stake.

Investigate Sec. of State Clinton Emails

National Security  Signatures

LOGIN

Receive the latest news, updates, and contribution opportunities from ACLJ.

$20
$40
$60
$120
$240
Make this a monthly tax-deductible gift.

Our national security is at risk. We're uniquely positioned to demand a full investigation. Have your gift doubled in support of our work. Have your gift doubled through our Matching Challenge.

Email Address is required.
First Name is required.
Last Name is required.
Credit Card Number is required.
Verification Code is required.
Expiration Month is required.
Expiration Year is required.
Receive the latest news, updates, and contribution opportunities from ACLJ.
Encourage your friends to sign and donate by sharing this petition.

Fourth Circuit Hears National Security Case

By Edward White1513000800000

This past Friday, the Fourth Circuit Court of Appeals (thirteen active judges) heard oral argument in the case where a Maryland federal court enjoined the full implementation of President Trump’s National Security Proclamation . The Proclamation places travel restrictions on foreign nationals from...

read more

Oral Argument in National Security Case

By Edward White1512684000000

Yesterday afternoon, the Ninth Circuit Court of Appeals heard oral argument concerning a Hawaii federal court’s injunction blocking the full implementation of President Trump’s National Security Proclamation to begin enhanced vetting procedures of foreign nationals seeking entry into the United...

read more

SCOTUS Rules on Enhanced Vetting

By Edward White1512438120334

In a major victory for the Trump Administration as well as for our national security, the Supreme Court today granted the Administration’s motions to stay the preliminary injunctions imposed against the President’s National Security Proclamation . Those injunctions blocked the Proclamation from...

read more

North Korea: A Long-Term Threat

By Wesley Smith1512142167563

North Korea has launched 23 missiles since the beginning of 2017. Tuesday’s launch of an Intercontinental Ballistic Missile (the third ICBM this year) flew higher and longer than any previous missile, traveling some 2800 miles into space (10 times higher than the International Space Station) for 50...

read more