I copied the transcript of James B. Comey’s spoken statement regarding Hillary Clinton’s Personal Email usage a few days ago, and added my comments / explanations in bold italicized type . . .
Statement by FBI Director James B. Comey on the Investigation of Secretary Hillary Clinton’s Use of a Personal E-Mail System
July 05, 2016
FBI National Press Office
Remarks prepared for delivery at press briefing.
Good morning. I’m here to give you an update on the FBI’s investigation of Secretary Clinton’s use of a personal e-mail system during her time as Secretary of State. After a tremendous amount of work over the last year, the FBI is completing its investigation and referring the case to the Department of Justice for a prosecutive decision. What I would like to do today is tell you three things: what we did; what we found; and what we are recommending to the Department of Justice.
[THE GRAND SETUP]
This will be an unusual statement in at least a couple ways.
First, I am going to include more detail about our process than I ordinarily would, because I think the American people deserve those details in a case of intense public interest.
[ RATIONALIZING — False Pretext to satisfy our desires or interests. A rather childish ploy used on the American public – because they believe your intelligence level to be that of a pre-teen, and many are deceived by this statement. The statement challenges you to accept whatever they tell you, because why would they go out of their way to please public interest if they were liars.]
Second, I have not coordinated or reviewed this statement in any way with the Department of Justice or any other part of the government. They do not know what I am about to say.
[ MISPLACED BURDEN OF PROOF — Telling you their statements are not flawed because the FBI has not broken any perceived rules.]
I want to start by thanking the FBI employees who did remarkable work in this case. Once you have a better sense of how much we have done, you will understand why I am so grateful and proud of their efforts.
[ALSO MISPLACED BURDEN OF PROOF — The FBI’s employees are not to be on trial – Ms. Clinton is.]
So, first, what we have done:
The investigation began as a referral from the Intelligence Community Inspector General in connection with Secretary Clinton’s use of a personal e-mail server during her time as Secretary of State. The referral focused on whether classified information was transmitted on that personal system.
[A “referral from the Intelligence Community Inspector General” — How interesting in that reading about the Intelligence Community Inspector General – who does not seem to have authority to do this with regards to The Secretary of State – I perused his/her responsibilities which are very dry administrative crap (salaries, benefits, and such) and do cover several agencies, but not The Secretary of State. With John’s and my medical appointment blowing up lately, I don’t know when I will have the time to finish reading the very lengthy crap about this one position. In the early to middle part of the boring crap, it did list about 16 agencies it does have administrative review over – but, like I said, it made no mention of The Secretary of State.
Gee, I don’t know, common sense tells me that President Obama should have made the formal request, since he hired Hillary Clinton to be Secretary of State.]
Our investigation looked at whether there is evidence classified information was improperly stored or transmitted on that personal system, in violation of a federal statute making it a felony to mishandle classified information either intentionally or in a grossly negligent way, or a second statute making it a misdemeanor to knowingly remove classified information from appropriate systems or storage facilities.
[“or in a grossly negligent way” – duh – that is the minimum of what was proven, and they said so.]
Consistent with our counterintelligence responsibilities, we have also investigated to determine whether there is evidence of computer intrusion in connection with the personal e-mail server by any foreign power, or other hostile actors.
I have so far used the singular term, “e-mail server,” in describing the referral that began our investigation. It turns out to have been more complicated than that. Secretary Clinton used several different servers and administrators of those servers during her four years at the State Department, and used numerous mobile devices to view and send e-mail on that personal domain. As new servers and equipment were employed, older servers were taken out of service, stored, and decommissioned in various ways. Piecing all of that back together—to gain as full an understanding as possible of the ways in which personal e-mail was used for government work—has been a painstaking undertaking, requiring thousands of hours of effort.
For example, when one of Secretary Clinton’s original personal servers was decommissioned in 2013, the e-mail software was removed. Doing that didn’t remove the e-mail content, but it was like removing the frame from a huge finished jigsaw puzzle and dumping the pieces on the floor. The effect was that millions of e-mail fragments end up unsorted in the server’s unused—or “slack”—space. We searched through all of it to see what was there, and what parts of the puzzle could be put back together.
FBI investigators have also read all of the approximately 30,000 e-mails provided by Secretary Clinton to the State Department in December 2014. Where an e-mail was assessed as possibly containing classified information, the FBI referred the e-mail to any U.S. government agency that was a likely “owner” of information in the e-mail, so that agency could make a determination as to whether the e-mail contained classified information at the time it was sent or received, or whether there was reason to classify the e-mail now, even if its content was not classified at the time it was sent (that is the process sometimes referred to as “up-classifying”).
From the group of 30,000 e-mails returned to the State Department, 110 e-mails in 52 e-mail chains have been determined by the owning agency to contain classified information at the time they were sent or received. Eight of those chains contained information that was Top Secret at the time they were sent; 36 chains contained Secret information at the time; and eight contained Confidential information, which is the lowest level of classification. Separate from those, about 2,000 additional e-mails were “up-classified” to make them Confidential; the information in those had not been classified at the time the e-mails were sent.
[He could have said all of this in a few sentences. Most of the information is not necessary, or repetitive.
“contain classified information at the time they were sent or received. Eight of those chains contained information that was Top Secret at the time they were sent; 36 chains contained Secret information at the time; and eight contained Confidential information, which is the lowest level of classification. Separate from those, about 2,000 additional e-mails were “up-classified” to make them Confidential; the information in those had not been classified at the time the e-mails were sent.
“upclassified” to keep us from reading them. Looks like she is guilty from this statement. If it were you or I, it wouldn’t have even gone this far before we would have seen the inside of a prison cell.]
The FBI also discovered several thousand work-related e-mails that were not in the group of 30,000 that were returned by Secretary Clinton to State in 2014. We found those additional e-mails in a variety of ways. Some had been deleted over the years and we found traces of them on devices that supported or were connected to the private e-mail domain. Others we found by reviewing the archived government e-mail accounts of people who had been government employees at the same time as Secretary Clinton, including high-ranking officials at other agencies, people with whom a Secretary of State might naturally correspond.
[“several thousand work-related emails that were not in the group of 30,000 that were returned ..” and “Some had been deleted over the years” which is not stated that the first were not turned over by Hillary Clinton, and the second is a direct violation of law”
AND finding emails on other employee’s servers that Hillary did not turn over, especially “including high-ranking officials at other agencies” MEANS these were also deleted and a direct violation of law.
DO WE DETECT A BIT OF “DOWNPLAYING”? WHICH IS A RHETORICAL DEVICE.]
This helped us recover work-related e-mails that were not among the 30,000 produced to State. Still others we recovered from the laborious review of the millions of e-mail fragments dumped into the slack space of the server decommissioned in 2013.
[“Still others we recovered from the laborious review of the millions of e-mail fragments dumped into the slack space of the server decommissioned in 2013.” THIS ALONE would have Nixon resigning and impeached!]
With respect to the thousands of e-mails we found that were not among those produced to State, agencies have concluded that three of those were classified at the time they were sent or received, one at the Secret level and two at the Confidential level. There were no additional Top Secret e-mails found. Finally, none of those we found have since been “up-classified.”
[“have concluded that three of those were classified at the time they were sent or received, one at the Secret level and two at the Confidential level.” 1. WHAT ABOUT THE ONES NOT YET FOUND? 2. My John has the highest classification of security clearance that existed in the 80’s, and his last duty station was in Washington as Non-Commissioned Officer In Charge of the Classified Files Division at Hdqtr. Marine Corp., and he will not even tell me the content of even one Secret. Other than secrets he took an oath to keep, John and I share everything. I cannot imagine anyone at the level of Secretary of State not required to be on level of secret keeping as my husband.]
I should add here that we found no evidence that any of the additional work-related e-mails were intentionally deleted in an effort to conceal them. Our assessment is that, like many e-mail users, Secretary Clinton periodically deleted e-mails or e-mails were purged from the system when devices were changed. Because she was not using a government account—or even a commercial account like Gmail—there was no archiving at all of her e-mails, so it is not surprising that we discovered e-mails that were not on Secretary Clinton’s system in 2014, when she produced the 30,000 e-mails to the State Department.
[More DOWNPLAYING. AND WEASELER RHETORIC – All of this is designed to protect claim from criticism by weakening it. This is dishonest at best.]
It could also be that some of the additional work-related e-mails we recovered were among those deleted as “personal” by Secretary Clinton’s lawyers when they reviewed and sorted her e-mails for production in 2014.
[and More Downplaying and Weaseling!]
The lawyers doing the sorting for Secretary Clinton in 2014 did not individually read the content of all of her e-mails, as we did for those available to us; instead, they relied on header information and used search terms to try to find all work-related e-mails among the reportedly more than 60,000 total e-mails remaining on Secretary Clinton’s personal system in 2014. It is highly likely their search terms missed some work-related e-mails, and that we later found them, for example, in the mailboxes of other officials or in the slack space of a server.
[and More Downplaying and Weaseling! When will this stop?]
It is also likely that there are other work-related e-mails that they did not produce to State and that we did not find elsewhere, and that are now gone because they deleted all e-mails they did not return to State, and the lawyers cleaned their devices in such a way as to preclude complete forensic recovery.
[So, ‘we deleted all that had not been turned over to – er – um – well, make sure you could see that there are no more in existence for us to review.’ And, if one of us was in cahoots with whomever – and deleted some that should have been turned over that would have further proven her guilt -well, hahahahaha no one will ever know!!
At this point, it is important to point out all through this there is a certain APPEAL TO IGNORANCE: Trying to convince you that there is a lack of evidence against a claim, (even though they have already told you that there is evidence), hoping that you will believe the claim doesn’t get any positive points. And that is exactly what this person is trying to do in these statements upon similar statements.]
We have conducted interviews and done technical examination to attempt to understand how that sorting was done by her attorneys. Although we do not have complete visibility because we are not able to fully reconstruct the electronic record of that sorting, we believe our investigation has been sufficient to give us reasonable confidence there was no intentional misconduct in connection with that sorting effort.
[The RHETORIC is simply trying to persuade you to an unwarranted conclusion, rather than give you logical proof.
Also, “intentional” or not – when you and I break a law – “ignorance of the law is no excuse”, and we are prosecuted!
ALSO, SUCH AN IGNORAMUS WHO BROKE THE LAW WANTS US TO ELECT HER PRESIDENT? EITHER SHE IS AN IGNORAMUS – THEREFORE SHE IS NOT QUALIFIED TO BE PRESIDENT;
SHE DID IT DELIBERATELY, AND IS A LIAR AND A CHEAT – THEREFORE SHE IS NOT QUALIFIED TO BE PRESIDENT!]
And, of course, in addition to our technical work, we interviewed many people, from those involved in setting up and maintaining the various iterations of Secretary Clinton’s personal server, to staff members with whom she corresponded on e-mail, to those involved in the e-mail production to State, and finally, Secretary Clinton herself.
[MORE APPEAL TO IGNORANCE: Meaningless to John Public and Jane Public, since we do not get to know about any of it.]
Last, we have done extensive work to understand what indications there might be of compromise by hostile actors in connection with the personal e-mail operation.
[More blah, blah, blah to you the Citizen who deserve to know the details.]
That’s what we have done. Now let me tell you what we found:
Although we did not find clear evidence that Secretary Clinton or her colleagues intended to violate laws governing the handling of classified information, there is evidence that they were extremely careless in their handling of very sensitive, highly classified information.
[Wow – pick your rhetorical device – this could be a GOUP THINK FALLACY, OR RATIONALIZING, OR WISHFUL THINKING, OR COMMON PRACTICE . . . but, either way you slice it – YOU – AMERICA – ARE BEING DELIBERATELY DECEIVED!)
For example, seven e-mail chains concern matters that were classified at the Top Secret/Special Access Program level when they were sent and received. These chains involved Secretary Clinton both sending e-mails about those matters and receiving e-mails from others about the same matters. There is evidence to support a conclusion that any reasonable person in Secretary Clinton’s position, or in the position of those government employees with whom she was corresponding about these matters, should have known that an unclassified system was no place for that conversation. In addition to this highly sensitive information, we also found information that was properly classified as Secret by the U.S. Intelligence Community at the time it was discussed on e-mail (that is, excluding the later “up-classified” e-mails).
[This is actually an argument invoking PITY!! Of course she was smart enough as Secretary of State, and being a lawyer to know that what she did was flamboyantly ILLEGAL!!!!]
None of these e-mails should have been on any kind of unclassified system, but their presence is especially concerning because all of these e-mails were housed on unclassified personal servers not even supported by full-time security staff, like those found at Departments and Agencies of the U.S. Government—or even with a commercial service like Gmail.
[SO, SHE IS GUILTY!! (but we will soon ignore that fact.)]
Separately, it is important to say something about the marking of classified information. Only a very small number of the e-mails containing classified information bore markings indicating the presence of classified information. But even if information is not marked “classified” in an e-mail, participants who know or should know that the subject matter is classified are still obligated to protect it.
[So, we are back to the whole thing – either she is an ignoramus and should never hold public office, or she is a deliberate lying, cheat and should never hold public office.]
While not the focus of our investigation, we also developed evidence that the security culture of the State Department in general, and with respect to use of unclassified e-mail systems in particular, was generally lacking in the kind of care for classified information found elsewhere in the government.
[ARGUMENT OF COMMON PRACTICE – why everyone is committing the same crime, so what she knows she deliberately did just isn’t thaaaat baaaaad!]
With respect to potential computer intrusion by hostile actors, we did not find direct evidence that Secretary Clinton’s personal e-mail domain, in its various configurations since 2009, was successfully hacked. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence. We do assess that hostile actors gained access to the private commercial e-mail accounts of people with whom Secretary Clinton was in regular contact from her personal account. We also assess that Secretary Clinton’s use of a personal e-mail domain was both known by a large number of people and readily apparent. She also used her personal e-mail extensively while outside the United States, including sending and receiving work-related e-mails in the territory of sophisticated adversaries. Given that combination of factors, we assess it is possible that hostile actors gained access to Secretary Clinton’s personal e-mail account.
[ Whoa!!! This paragraph needs to be dissected . . .
1. With respect to potential computer intrusion by hostile actors, we did not find direct evidence that Secretary Clinton’s personal e-mail domain, in its various configurations since 2009, was successfully hacked.
THEY ARE TELLING YOU THAT THEY DIDN’T FIND ANY DIRECT EVIDENCE OF EVIL HACKERS . . . BUT!!!!
2. But, given the nature of the system and of the actors potentially involved, we assess that we would be unlikely to see such direct evidence.
THEY ADMIT THEY PROBABLY COULDN’T FIND ANY DIRECT EVIDENCE EVEN IF IT WERE THERE! MAKING #1 STATEMENT USELESS. #1 & #2 SHOULD HAVE BEEN DELETED FROM THIS STATEMENT, BUT THEY USED IT AGAINST YOU AS A PERFECTIONIST FALLACY.
3. We do assess that hostile actors gained access to the private commercial e-mail accounts of people with whom Secretary Clinton was in regular contact from her personal account.
THEY ADMIT THAT HER EMAIL ACCOUNT WAS HACKED BY WAY OF HER EMAIL ACTIVITY WITH OTHERS THAT WERE KNOWN TO BE HACKED. AND THEY ARE HOPING YOU WON’T NOTICE THIS SENTENCE AFTER THE LAST TWO SENTENCES THAT ARE USELESS SENTENCES BECAUSE THEY CANCEL EACH OTHER OUT.
4. We also assess that Secretary Clinton’s use of a personal e-mail domain was both known by a large number of people and readily apparent.
[GROUP THINK FALLACY – Identifying with a group takes the place of reason and deliberation on an issue.]
5. She also used her personal e-mail extensively while outside the United States, including sending and receiving work-related e-mails in the territory of sophisticated adversaries.
[er – um – shouldn’t this make her guilty of something really, really bad????]
6. Given that combination of factors, we assess it is possible that hostile actors gained access to Secretary Clinton’s personal e-mail account.
[So, why didn’t they use the word treason?]
So that’s what we found. Finally, with respect to our recommendation to the Department of Justice:
In our system, the prosecutors make the decisions about whether charges are appropriate based on evidence the FBI has helped collect. Although we don’t normally make public our recommendations to the prosecutors, we frequently make recommendations and engage in productive conversations with prosecutors about what resolution may be appropriate, given the evidence. In this case, given the importance of the matter, I think unusual transparency is in order.
[“In this case, given the importance of the matter, I think unusual transparency is in order.” If only it were true!]
Although there is evidence of potential violations of the statutes regarding the handling of classified information, our judgment is that no reasonable prosecutor would bring such a case. Prosecutors necessarily weigh a number of factors before bringing charges. There are obvious considerations, like the strength of the evidence, especially regarding intent. Responsible decisions also consider the context of a person’s actions, and how similar situations have been handled in the past.
[OMGoodness!!!! Really????? She knew what she was doing was wrong. Go back a page or two and this speech says she knew what she was doing, and she knew it was wrong. To say she did not is to say she is a blithering idiot. AND the bad guys hacked her through those she emailed.
In looking back at our investigations into mishandling or removal of classified information, we cannot find a case that would support bringing criminal charges on these facts. All the cases prosecuted involved some combination of: clearly intentional and willful mishandling of classified information; or vast quantities of materials exposed in such a way as to support an inference of intentional misconduct; or indications of disloyalty to the United States; or efforts to obstruct justice. We do not see those things here.
[Perhaps the person making this statement is the blithering idiot – for how – after identifying all of Hillary’s guilt earlier in this speech – how can he say “we do not see those things here?”]
To be clear, this is not to suggest that in similar circumstances, a person who engaged in this activity would face no consequences. To the contrary, those individuals are often subject to security or administrative sanctions. But that is not what we are deciding now.
[So, this is clearly the SUBJECTIVISM FALLACY: An assumption that is true for one person, but not for another. So true for Hillary, but not for you and I – to be clear!!!]
As a result, although the Department of Justice makes final decisions on matters like this, we are expressing to Justice our view that no charges are appropriate in this case.
[PANTS ON FIRE!!! This man has deliberately deceived the American people, and is therefore an un-American citizen who should not be accepted by honest society. Period. It is about time for the good American people to shun snake oil salesmen in lawyer’s suits, who line their own pockets with riches paid to them for their lies and crimes against the American people.]
I know there will be intense public debate in the wake of this recommendation, as there was throughout this investigation. What I can assure the American people is that this investigation was done competently, honestly, and independently. No outside influence of any kind was brought to bear.
[A BALD FACE LIE; AND IF YOU DON’T SEE IT, THEN YOU AREN’T BEING HONEST WITH YOURSELF, OR YOU ARE CONFUSED.]
I know there were many opinions expressed by people who were not part of the investigation—including people in government—but none of that mattered to us. Opinions are irrelevant, and they were all uninformed by insight into our investigation, because we did the investigation the right way. Only facts matter, and the FBI found them here in an entirely apolitical and professional way. I couldn’t be prouder to be part of this organization.
[Disgusting P O S!
I know a good citizen, a Police Officer, a Detective, who would call this person who delivered this speech a P O S – I added the disgusting for good measure. ]
Copyright © 2016 by Juanita Holloway-Walters, All Rights Reserved