It looks like you're new here. Sign in or register to get started.
phlatsphil wrote: »
What the anti Trump folks here refuse to admit is the republicans here, DON'T CARE that Trump is a corrupt liar and they know he is but he is THEIR CORRUPT LIAR.
Funny how that works, huh?
Gary S wrote: »
So does this mean, that if in her opinion that American On Line was secure enough it would be OK?
Parkerboy wrote: »
Trump may be corrupt but it hasn't been proven yet and if he his it isn't from selling government access.
Gary S. Colecchio wrote: »
No, that's why she used her own sever. It was more prudent than using a commercially available service.
AOL is America Online.
Gary S. Colecchio wrote: »
Who said it was hacked?
Gary S. Colecchio wrote: »
The secretaries are not military and report within no military structure. They are independent and report to the president and serve at the president's pleasure. They also establish policies and procedures within their agencies and department:(a) Security functions
(1) The Secretary of State shall develop and implement (in consultation with the heads of other Federal agencies having personnel or missions abroad where appropriate and within the scope of the resources made available) policies and programs, including funding levels and standards, to provide for the security of United States Government operations of a diplomatic nature and foreign government operations of a diplomatic nature in the United States. Such policies and programs shall include—
(A) protection of all United States Government personnel on official duty abroad (other than Voice of America correspondents on official assignment and those personnel under the command of a United States area military commander) and their accompanying dependents;
(B) establishment and operation of security functions at all United States Government missions abroad (other than facilities or installations subject to the control of a United States area military commander);
(C) establishment and operation of security functions at all Department of State facilities in the United States; and
(D) protection of foreign missions, international organizations, and foreign officials and other foreign persons in the United States, as authorized by law.
(2) Security responsibilities shall include the following:
(A) Former Office of Security functions
Functions and responsibilities exercised by the Office of Security, Department of State, before November 11, 1985.
(B) Security and protective operations
(i) Establishment and operation of post security and protective functions abroad.
(ii) Development and implementation of communications, computer, and information security.
(iii) Emergency planning.
(iv) Establishment and operation of local guard services abroad.
(v) Supervision of the United States Marine Corps security guard program.
(vi) Liaison with American overseas private sector security interests.
(vii) Protection of foreign missions and international organizations, foreign officials, and diplomatic personnel in the United States, as authorized by law.
(viii) Protection of the Secretary of State and other persons designated by the Secretary of State, as authorized by law.
(ix) Physical protection of Department of State facilities, communications, and computer and information systems in the United States.
(x) Conduct of investigations relating to protection of foreign officials and diplomatic personnel and foreign missions in the United States, suitability for employment, employee security, illegal passport and visa issuance or use, and other investigations, as authorized by law.
(xi) Carrying out the rewards program for information concerning international terrorism authorized by section 2708(a)  of this title.
(xii) Performance of other security, investigative, and protective matters as authorized by law.
(C) Counterterrorism planning and coordination
Development and coordination of counterterrorism planning, emergency action planning, threat analysis programs, and liaison with other Federal agencies to carry out this paragraph.
(D) Security technologyDevelopment and implementation of technical and physical security programs, including security-related construction, radio and personnel security communications, armored vehicles, computer and communications security, and research programs necessary to develop such measures.
22 U.S. Code § 4802
That's the authorizing language enabling her server use.
The worst thing that can happen to them is that their boss fires them. Which is what happened to this one.[/QUOTE
So with all the above weight of responsibility to establish security, safety, and responsibility of her department she chose to put a server in her bathroom. That's the person you want to give the security, safety, and responsibility of the country?? Really??
Digital Now Included!
Give a Gift
Preview This Month's Issue
See All Other Magazines
See All Special Interest Magazines
Get the top Florida Sportsman stories delivered right to your inbox.
All Florida Sportsman subscribers now have digital access to their magazine content. This means you have the option to read your magazine on most popular phones and tablets.
To get started, click the link below to visit mymagnow.com and learn how to access your digital magazine.
Get Digital Access