Archived material Access restricted Article
Rantburg

Today's Front Page   View All of Wed 03/18/2015 View Tue 03/17/2015 View Mon 03/16/2015 View Sun 03/15/2015 View Sat 03/14/2015 View Fri 03/13/2015 View Thu 03/12/2015
1
2015-03-18 Home Front: Politix
Breaking: State Dept Claims To Have No Record Of Hillary Signing Separation Statement, OF-109 Form
Archived material is restricted to Rantburg regulars and members. If you need access email fred.pruitt=at=gmail.com with your nick to be added to the members list. There is no charge to join Rantburg as a member.
Posted by Hupineger Glomomp52169  2015-03-18 00:00|| || Front Page|| [3 views ]  Top

#1 Laws are for little people.

It's good to be the king a member of the Inner Party.
Posted by Procopius2k 2015-03-18 00:08||   2015-03-18 00:08|| Front Page Top

#2 A huge violation of federal law.

Aaaannnd nothing will come from this.

Long past time to remove these people from our shores.
Posted by DarthVader 2015-03-18 00:18||   2015-03-18 00:18|| Front Page Top

#3 State can't produce a doc showing Hill sighed the statement. Contrawise, State has no document showing Hill *didn't* sign the statement. Therefore, no evidence she committed a crime. Paint me blue and call me a lawyer!
Posted by SteveS 2015-03-18 01:11||   2015-03-18 01:11|| Front Page Top

#4 Whoa, so IOW, and not unlike the US Dept. of US DepState now has two [or more?] CO-SECRETARIES OF STATE, I.E. KERRY + HILLARY???

lol.

Isn't this taking an Israeli-Paleo style, TWO-STATE OR THREE/MULTI-STATE SOLUTION FOR AMERIKA A BIT TOO FAR - the Bammer or the Fed must be expecting SUPER-MASSIVE INCREASE IN GOVT. BUREAUCRACY-N-REGULATION, ETC. VEE THE NAU???
Posted by JosephMendiola 2015-03-18 02:47||   2015-03-18 02:47|| Front Page Top

#5 Subpoena the State Department Special Security Officer (SSO) and see what he/she has to say. Have him bring along his Non-Disclosure as well as his Special or Sensitive Program(S) 'read-on' ledger.

While you're at it, subpoena the head of State Department Information Technology (IT) and discuss e-mail protocols for both SIPR and NIPR (secure & non-secure mail) systems as well.

Getting to the bottom of this should not be that difficult.... unless 'getting to the bottom' is not really a desired outcome.
Posted by Besoeker 2015-03-18 02:49||   2015-03-18 02:49|| Front Page Top

#6 All this bad stuff for Hillary.

Setup for Obama to defy the Constitution and run again, or simply declare himself everlasting autocrat?

The fact that one can discuss that and not be totally loony shows how far we've fallen.
Posted by no mo uro 2015-03-18 05:30||   2015-03-18 05:30|| Front Page Top

#7 So find the DoS officer who didn't get the doc and prosecute them for not following the law. The choice: give up the next person or take the fall.
It really says something when investigating the State Dept has to involve RICO tactics. But that's pretty much the entire govt these days.
Posted by ed in texas 2015-03-18 07:33||   2015-03-18 07:33|| Front Page Top

#8 Forget firing. Jail time. Lots. National security and all.
Posted by gorb 2015-03-18 09:23||   2015-03-18 09:23|| Front Page Top

#9 Link

Foggy Bottom Damage Assessment....where is it ?

UNCLASSIFIED
Damage Assessments
A. AUTHORITY: The National Security Act of 1947, as amended; the Counterintelligence Enhancement Act of 2002; Executive Order (EO)12333, as amended; EO 13526; and other applicable provisions of law.

B. PURPOSE
1. Establish policy for the conduct of damage assessments in response to the unauthorized disclosure or compromise of classified
national intelligence.

2. Provide a process for coordination and cooperation within the Intelligence Community (IC) to ensure damage assessments are produced
in an efficient, timely, consistent and collaborative manner.

3. Provide a process for the IC to use the findings and recommendations from damage assessments to strengthen the protection
of classified national intelligence and prevent future unauthorized disclosures or compromises.

C. APPLICABILITY
1. This Directive applies to the IC, as defined by the National Security Act of 1947, as amended, and to such elements of any other department or agency as may be designated an element of the IC by the President, or jointly by the Director of National Intelligence (DNI) and the head of the department or agency concerned.

2. For IC elements within departments, this Intelligence Community Directive (ICD) applies to damage assessments on unauthorized disclosure
or compromise of classified national intelligence. For all other damage
assessments, departmental policies shall have primacy.

D. POLICY
1. Damage assessments are used within the counterintelligence (Cl)
and security communities to evaluate actual or potential damage to national security resulting from the unauthorized disclosure or
compromise of classified national intelligence.
2. Damage assessments shall be conducted when there is an actual or suspected unauthorized disclosure or compromise of classified national
intelligence that may cause damage to U.S. national security.

3. Damage assessments may also be conducted when there is an actual or suspected loss, misuse, or unauthorized access to or modification
of classified national intelligence that could adversely affect national security.

4. In cases where the unauthorized disclosure or compromise involves classified national
intelligence originating from and affecting only a single IC element, the damage assessment shall
be conducted by the head of that IC element after coordination with the National Counterintelligence Executive (NCIX) to ensure that the information compromised is from and
affects only a single IC element.

5. In cases where the unauthorized disclosure or compromise involves classified national
intelligence originating from or otherwise affecting more than one IC element or U.S.
Government department or agency, there will be a Community damage assessment. Such damage assessments shall include participation and support from the affected IC elements and
other representatives as directed by the DNI.

6. Damage assessments shall be conducted in a manner as to not unduly interfere with
ongoing criminal investigations or prosecutions.

7. Damage assessments shall include the following:
a. Identification of disclosed or compromised classified national intelligence, including
sources, methods, or activities (specifically including: equipment, facilities, locations,
partnerships, plans, strategies, technologies, or programs);
b. A description of the circumstances under which the unauthorized disclosure or
compromise transpired;
c. Evaluation of the impact of the disclosure or compromise of the classified national
intelligence, including the classification level; the amount of information disclosed; the length of
time that the unauthorized disclosure or compromise continued; the breadth of organizational equities involved; and the duration or programmatic lifecycle of the systems, capabilities, or operations involved;
d. An estimate of actual or potential damage to U.S. national security, including to
intelligence sources, methods, and activities;
e. Identification of any foreign involvement in the unauthorized disclosure or compromise, as well as foreign tradecraft trends, indications, and effects of possible targeting by Foreign Intelligence Entities;
f. Identification of systemic weaknesses or vulnerabilities in security, CI, information
assurance, human resources, and other internal organizational functions that may have facilitated
the unauthorized disclosure or compromise;
g. An assessment of the likelihood and consequences of further disclosure of the
compromised classified national intelligence to an individual, organization, foreign government,
or other entity that is not authorized to receive the classified national intelligence, including
those organizations or countries hostile to the U.S.;
h. Identification of areas where additional damage may occur absent corrective action;
i. Detailed, actionable recommendations to prevent future occurrences, when
appropriate; and
j. A summary of findings for use in understanding and mitigating damage that could
result from future unauthorized disclosures and compromises.

8. Nothing in this Directive precludes an IC element from conducting an equity review of
the unauthorized disclosure or compromise of classified national intelligence. Damage
assessments are separate and distinct from an equity review, which may be conducted to
determine what classified national intelligence may have been lost or compromised; the
originator of the information; the departments and agencies that may have equity in the
information; and the activities, programs, operations, or assets that may be affected. Equity
reviews do not provide analysis and recommendations.

E. ROLES AND RESPONSIBILITIES
1. The NCIX shall:
a. Oversee and coordinate equity reviews and formal damage assessments within the IC;
b. Lead, when designated by the DNI, or facilitate damage assessment teams when the
unauthorized disclosure or compromise involves classified national intelligence affecting more
than one IC element or U.S. Government department or agency, and may as appropriate delegate
certain responsibilities to heads of IC elements;
c. Provide copies of completed damage assessments to affected parties;
d. Share lessons learned on vulnerabilities, threat identification, patterns and trends, and
adversarial capabilities and tradecraft with IC elements;
e. Share best practices such as recommended mitigation measures for implementation
throughout the IC; and
f. Ensure draft damage assessments are reviewed by all affected parties for the purposes
of validating factual accuracy.

2. The Assistant DNI for Partner Engagement shall:
a. Work with affected IC elements to ensure DNI Representatives are appropriately
informed of the potential loss or compromise of classified national intelligence;
b. Coordinate as needed with departments and agencies outside the IC regarding the loss
or compromise of their information; and
c. In coordination with NCIX, and the heads of other relevant ODNI components and IC
elements, oversee IC communications with affected foreign partners to ensure a consistent
message regarding any damage.

3. Heads of IC elements shall:
a. Consistent with Section D.4, coordinate with the NCIX to validate that the
compromise is from and affects only a single IC element;
b. Conduct damage assessments in cases where the unauthorized disclosure or
compromise involves only classified national intelligence originated and affecting only their IC element;
c. Promptly notify the DNI, through the NCIX, of any loss or compromise of classified
national intelligence concurrent with crimes reports to the Department of Justice and reports to Congress in accordance with lCD 112, Congressional Notification.

d. Provide requested support for damage assessments conducted in accordance with
paragraph D.5;
e. When the unauthorized disclosure or compromise involves a compartmented
program, ensure access to the program by appropriate personnel of the office of the NCIX and of the affected IC element for the purpose of fulfilling the responsibilities under this Directive;
f. Implement mitigation measures recommended in the final damage assessment, and
inform the DNI, through the NCIX, of implementation of those measures;
g. Upon determination that an actual or suspected unauthorized disclosure or
compromise involves the classified information or interest of another U.S. Government agency
or a foreign government, consistent with 32 CFR 2001.48:
(1) Inform the U.S. Government agency of the circumstances and findings affecting
its information or interest; and
(2) Consult with the DNI or designee to determine the appropriate U.S.
Government entities to coordinate with prior to notifying a foreign government. Foreign
governments normally will not be advised of any security system vulnerabilities that contributed
to the compromise; and
h. Provide NCIX with a copy of damage assessments completed in accordance with
Section D.4 of this Directive.
F. EFFECTIVE DATE: This Directive becomes effective on the date of signature.

Posted by Besoeker 2015-03-18 09:52||   2015-03-18 09:52|| Front Page Top

#10 I'm with Darth Vader. Nothing serious will come of this. No one will go to jail, no one will even be fired.
Posted by Rambler in Virginia 2015-03-18 09:56||   2015-03-18 09:56|| Front Page Top

#11 at her subpoena'd hearing, put it in front of her and ask her to sign it (perjury) and if she refuses (laws broken).....
Posted by Frank G 2015-03-18 10:53||   2015-03-18 10:53|| Front Page Top

#12 One of the early, key indicators of the unfortunate accuracy of Darth's 'nothing will happen' assessment is the lack of 'Suspension of Security Access' [Security Clearance] pending completion of investigation by the issuing authority.... State Dept. or White house.

They are the anointed, clearly above the law and legal conduct. Sadly, our system is broken, bankrupt.
Posted by Besoeker 2015-03-18 10:59||   2015-03-18 10:59|| Front Page Top

#13  I'm with Darth Vader. Nothing serious will come of this. No one will go to jail, no one will even be fired.

When in the course of human events
Posted by g(r)omgoru 2015-03-18 10:59||   2015-03-18 10:59|| Front Page Top

#14 Aaaannnd nothing will come from this.

Kinda makes me wish for something like the British parliamentary system where they can have vote of no confidence. They don't have to convict, just express a lack of confidence and then they get a general election with the hope that voters will throw the rascals out.
Posted by Ebbang Uluque6305 2015-03-18 11:59||   2015-03-18 11:59|| Front Page Top

#15 A Bosnian sniper shot it out of my hand!!!
Posted by Hillary! 2015-03-18 12:33||   2015-03-18 12:33|| Front Page Top

#16 A question:

This form has been in force since 9/1994:
That means that Warren Christopher and Madeline Albright were also covered by this form.

Since Hillary and State is trying to imply that nobody uses this, let's see if Clinton's 2 Secretaries of State signed their forms. If they did, Hillary is SOL.

Al
Posted by frozen al 2015-03-18 12:45||   2015-03-18 12:45|| Front Page Top

#17 Excuse me waht is this form and what happens if you don't sign it?
Posted by JFM 2015-03-18 12:48||   2015-03-18 12:48|| Front Page Top

#18 Related:
Why was Petraeus required to sign this form if Hillary wasn't?

Al
Posted by frozen al 2015-03-18 12:52||   2015-03-18 12:52|| Front Page Top

#19 Don't know about Foggy Bottom but in DoD, if you refuse to sign a Non-Disclosure Agreement (NDA) of any type, transfer, special program and the like, you're subject to have your security clearance immediately suspended, a 'flag'[suspension of favorable personnel actions] placed in your personnel file, and you'll very likely become the subject of a thorough investigation.

Yes, quite so. It's an fok'n INDICATOR of nefarious activities !
Posted by Besoeker 2015-03-18 12:55||   2015-03-18 12:55|| Front Page Top

#20 Related: Why was Petraeus required to sign this form if Hillary wasn't? Al
Posted by frozen al


My guess is she signed one, if not many. They've apparently found their way into the shredder.
Posted by Besoeker 2015-03-18 12:58||   2015-03-18 12:58|| Front Page Top

#21 Maybe it's with Champ's college records.
Posted by Bobby 2015-03-18 13:18||   2015-03-18 13:18|| Front Page Top

#22 It says 'Departmental policy shall have primacy.' So, as head of the State Department, she established the policy wherein whatever she did was ok. Hence, she obeyed all the applicable rules.
Posted by Glenmore 2015-03-18 13:20||   2015-03-18 13:20|| Front Page Top

#23 Are they really that stupid? The ISSO has all the records for her network access grants and removals.

For an example, see here from Commerce

http://ocio.os.doc.gov/ITPolicyandPrograms/dev01_003705
Posted by OldSpook 2015-03-18 14:12||   2015-03-18 14:12|| Front Page Top

#24 Here is the checklist that should have been done by Hillary's people - they should be on file, and a redacted version available for FOIA possibly.

http://csrc.nist.gov/groups/SMA/fasp/documents/security_controls/Overseas-CompSecReview.doc


State Dept security policy is on the internet. You just need to know where to look. Hey Mainstream Press - check these out.

UNCLASSIFIED (U)
U.S. Department of State Foreign Affairs Manual Volume 12 Diplomatic Security
12 FAM 680
UNCLASSIFIED (U)
12 FAM 680 REMOTE ACCESS AND MOBILE COMPUTING TECHNOLOGY

http://www.state.gov/documents/organization/109064.pdf

Lots of stuff to look at, unclassified.

(U) 5 FAM 1060 INFORMATION ASSURANCE MANAGEMENT

(U) 12 FAM 630 CLASSIFIED AUTOMATED INFORMATION SYSTEMS

http://www.state.gov/documents/organization/88409.pdf

http://www.state.gov/documents/organization/88413.pdf


http://www.state.gov/documents/organization/88409.pdf


many many more.
Posted by OldSpook 2015-03-18 14:22||   2015-03-18 14:22|| Front Page Top

#25 If the press isnt finding this then they simply arent trying. At all.
Posted by OldSpook 2015-03-18 14:25||   2015-03-18 14:25|| Front Page Top

#26 I still think this is about putting Warren up as the next candidate because Hillary can not be trusted to not investigate the current Admin while Warren will be deeply in debt to them.
Posted by rjschwarz 2015-03-18 14:31||   2015-03-18 14:31|| Front Page Top

#27 My guess is she signed one, if not many. They've apparently found their way into the shredder.

Same file as O's college applications and transcripts.
Posted by Procopius2k 2015-03-18 18:51||   2015-03-18 18:51|| Front Page Top

23:57 Mystic
23:52 JosephMendiola
23:31 JosephMendiola
23:25 JosephMendiola
23:21 JosephMendiola
23:21 trailing wife
23:12 JosephMendiola
23:10 JosephMendiola
23:05 JosephMendiola
22:36 ExtremeModerate
22:34 ExtremeModerate
22:22 Mikey Hunt
21:58 Anguper Hupomosing9418
21:47 Thing From Snowy Mountain
21:19 Mikey Hunt
21:12 trailing wife
21:02 JosephMendiola
20:59 JosephMendiola
20:49 borgboy
20:42 badanov
20:35 JosephMendiola
20:33 borgboy
20:29 borgboy
19:42 Iblis









Paypal:
Google
Search WWW Search rantburg.com