In an article for the Washington Post column “The Plum line,” Paul Waldman wrote, after noting that reports on the FBI investigation into Hillary Clinton’s mishandling of classified materials suggest that the F.B.I. has found no intent on her part to violate classification rules,
“That point about her intending to break classification rules is important, because in order to have broken the law, it isn’t enough for Clinton to have had classified information in a place where it was possible for it to be hacked. She would have had to intentionally given classified information to someone without authorization to have it, like David Petraeus did when he showed classified documents to his mistress (and then lied to the FBI about it, by the way). Despite the enormous manpower and time the Justice Department has devoted to this case, there has never been even a suggestion, let alone any evidence, that Clinton did any such thing.”
This continued a process, begun and fed by Clinton herself, to mislead the public about the investigation, the law, and Clinton’s conduct. It is the insidious “narrative” tactic again, and it apparently almost impossible to fight. For example, an old friend, a smart and informed former journalist, recently posted on Facebook to the effect that he wondered if the F.B.I. would investigate Colin Powell and Condoleeza Rice, since they also used personal e-mail for official business while Secretary of State. He wrote this in good faith, because this has been a central defense from Clinton for more than a year. It is harder to kill than the Hydra, despite the fact that it is pure deceit, for two reasons.
The first is that what was considered responsible and acceptable use of technology nine years ago is not responsible and acceptable use of technology now. What was considered responsible and acceptable use of technology nine weeks ago is often not responsible and acceptable use of technology now. The acceleration of technology development was well underway when Clinton was appointed, and new security measures and best practices at all the major agencies reflected that. If she intentionally ignored this, she was irresponsible and reckless; if she negligently failed to follow them, she was incompetent. No matter how Rice and Powell handled their e-mail, it was a different time, and the comparison is invalid and misleading. No one who understands technology and the speed with which it evolves, with accepted practices becoming dangerous and incompetent virtually over-nigh, could hear Clinton’s “They did it too!” excuse without rolling their eyes. But of course, this spin isn’t intended for those who understand the issues involved. They are designed for people like my friend, who are relatively uninformed regarding technology, and can be converted into an effective disinformation agent without his consent or knowledge.
The second is that while Powell and Rice, in the comparative Stone Age period of the internet and email use, used personal email, they did not set up their own personal server. I use personal email; I didn’t set up a personal server. Clinton and her surrogates keep repeating “personal email,” trying to fog the fact that the personal server was secret, insecure, and suspicious, and not only prevented emails from getting archived in the government’s system, but was presumably designed to do so. Every time a Clinton minion, or Clinton herself, or anyone makes this sleight of hand switch, the journalist reviewing it, repeating it, analyzing it, hearing it, or discussing it is obligated to correct the misimpression it leaves for semi-technologically illiterate people like my friend. They don’t, however. Why? I assume sometimes it is because they are also semi-technologically illiterate. Sometimes it is because they weren’t listening carefully, and sometimes it is because they too are Clinton minions, and are trying to help her avoid accountability.
Minneapolis attorney Scott Johnson pounced on Waldman’s column, and with complete justification. To be blunt, Waldman misstated the law. Johnson writes in part:
Waldman shows no evidence of knowing what he’s talking about. He provides no legal analysis. He appears to be spreading disinformation…He doesn’t examine the language of potentially applicable law. He doesn’t explicate the intent required to violate laws prohibiting the mistreatment of national defense or classified information…
One potentially applicable provision is found in 18 U.S.C. § 793(f). This provision of the Espionage Act states:
Whoever, being entrusted with or having lawful possession or control of any document. . .relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer, Shall be fined under this title or imprisoned not more than ten years, or both.
…The statute does not require that Clinton have “intentionally given classified information to someone without authorization to have it[.]” It doesn’t even require that the information be classified. It merely requires that the information “relate to the national defense”…
Andrew McCarthy is a former Assistant United States Attorney who handled serious cases involving national security. Unlike Waldman, he knows what he is talking about. Andy summarized potentially applicable law for the New York Times in part as follows:
“The laws against mishandling classified information are prosecution-friendly. For example, it is a felony for one entrusted with classified information not only to communicate it to a person unauthorized to have it, but also to enable its removal from its secure storage facility through gross negligence. It is also a crime to fail to report that information’s improper removal or communication. So is retaining materials containing classified information at an unauthorized location.
Secretary Clinton systematically conducted official business on a private unsecure system, and had subordinates do likewise, knowing the nature of their duties made classified communications inevitable. Like others with access to classified information, she signed a nondisclosure acknowledging that that this information could include “unmarked” documents and “oral communications.” At least one email finds her instructing a subordinate to remove classified markings and send a document to her via the nonsecure channel (though it is publicly unknown whether the subordinate complied). She is obviously responsible for any foreseeable wrongs committed by her subordinates using a system she set up. And she transferred the classified information on the servers to a private maintenance company and to lawyers not authorized to have it…”
Johnson concludes,
Whether or not Waldman knows what he is talking about, he is disseminating disinformation courtesy of the Washington Post.
Bingo.
Or if you prefer the Bard, “Ay, there’s the rub.” The Post has editors. Readers trust the Post. Readers assume that the Post does not and will not publish anything that isn’t true. What Waldman wrote can’t be passed off as opinion, it’s factually wrong on the law. An ethical—as in competent and responsible-newspaper doesn’t allow that kind of statement, which is, as Johnson says, pure disinformation, get published in its pages. People repeat it, like my friend. Now the Washington Post is assisting Hillary Clinton in converting unaware, well-meaning citizens into her agents of disinformation.
Indeed, maybe the Post is itself an innocent dupe, the victim of badly informed and and inattentive editors.
And maybe not. Either way, it’s unethical journalism.
_____________________________
Graphic: His Heavenly Armies
Must these people provide reasons to vote for Donald Trump?
What Clinton did was atrocious — our agencies need to lead this nation by example, and she was the head of the agency. But, all of our agencies are doing an awful job. There are policies in place that aren’t followed. And I can’t stress this last piece enough. Agencies draft policies, put them on a shelf, and never bother to hire people to update or actually enforce the policies. Further, there are insufficient protections in place — as demonstrated by the OPM data breach.
The reason that this will go nowhere though is that virtually nobody has figured out how to implement and actually follow info gov and data security policies. This is what I do every day. Nobody gets this right. My old company — one of the leaders in data security counseling — had a massive data breach and my personal information was compromised. My data was again compromised in the OPM data breach. How can that be? The leader in data security AND the federal government allowed China to get my SSN, address, and other PII (personal identifiable information) to go to Chinese hackers? Those should have been the safest people to safeguard my information!
Do we need to do better? Heck yeah, we do. Every private company and government agency who I work with struggle with this. And the government agencies are especially at risk because talented people can make vastly more money in the private sector because there is such a need right now. I approach this from the legal/compliance side, but I am even thinking of going back to get some additional certifications so I can advise on the technical side as well. That would translate into job security for life.
In short, because nobody understands this, it isn’t going to prosecuted. That doesn’t mean that this is fair or right, but we have a long way to go before people have even a basic understanding of this field. So, Clinton will get a pass.
Comment of the Day, Beth. Thanks. This needs to be said, and written, and explained, and pounded. Good job.
Well yeah. Just fix the typos first please.
(heh, heh, heh)
“Every private company and government agency who I work with struggle with this.”
Struggle, sure. But in my experience, private companies follow through. I think it’s a factor of accountability:
Privately, if you screw up, it means financial repercussions, people get fired, businesses go under. Publicly… Meh. Seriously, what are they going to do? Fine themselves? Stop providing the ‘essential service’ that they perform?
I don’t know what the answer is, but I feel I have to address the elephant in that comment: Private sector does it better.
The private sector is not doing *this* better. Not yet anyway. My message to every single private company I work with? It is not a question of if you are going to be breached, it is a question of when.
http://www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2015/
Perhaps we’re in different circles. I deal mostly with financials, and my experience with cyber security has been annoying in its’ strenuousness.
We need a global EMP burst to knock off all this bullshit for awhile.
I meant yay, not yeah. Stopping now.
So Beth, you’re saying “They all do it” and therefore HRC gets a pass?
Yes. Beth is not saying that Clinton should get a pass. She is saying that she will.
Thanks Tice.
What a goat rodeo. She signs a document saying she will abide by the department (of which she is the head) regulations and she ignores them and that’s just fine. Brilliant. Tell me again why the public employees unions are a good thing.
Infallible. Unaccountable. Entitled. President. Hillary.
“Whoever, being entrusted with or having lawful possession or control of any document. . .relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody….”
One of the big issues here: (per Clinton’s campaign website) at least 100 State Department employees sent material to Clinton’s private server. The sitting President and (while a senator) Secretary of State also sent material to the server. To the extent that this material touched on national defense, ALL of these people broke this law, by pushing the “SEND” button when they had no idea where the item was being routed, or even of they were actually corresponding with Clinton.
The law rewuires gross negligence.
What is the evidence of gross negligence?
She hired an IT firm that kept its server in their bathroom.
Ha! Wonder what the gender rules were for that room.
“Hackers Only?”
“Servers Only?”