Sam Adams Associates for Integrity in Intelligence

Annie Machon

Know all ye by these presents that Annie Machon is hereby honored with the traditional Sam Adams Corner-Brightener Candlestick Holder, in symbolic recognition of her courage in shining light into dark places.

“If you see something, say something.” Long before that saying came into vogue, Annie Machon took its essence to heart.

MI5, the British domestic intelligence agency, recognized how bright, enterprising, and unflappable Annie was and recruited her as soon as she completed her studies at Cambridge.

The good old boys in MI5 apparently thought she would have a malleable conscience, as well — such that she would have no qualms about secret monitoring of the very government officials overseeing MI5 itself, for example.

Annie would not be quiet about this secret abuse. Her partner, David Shayler, an MI5 colleague and — like Annie — a person of integrity and respect for law, became aware of an MI6 plan to assassinate Libyan leader Muammar Gaddafi.

They decided to blow the whistle and fled to France. (Many years later, a woman of high station but more flexible integrity openly gloated over Gaddafi’s brutal assassination.)

After three years on the lam, hiding mostly in France, they returned to the UK, where Annie was arrested (but never charged with a crime). The powers-that-be, however, chose to make an example of Shayler (not unlike what they are now doing to Julian Assange).

Shayler’s whistleblowing case dragged on for seven years, during which he did a brief stint in the infamous high-security prison where Julian Assange still rots (having been denied bail, yet again). A strong mitigation plea by Annie helped reduce Shayler’s remaining prison time. All in all, though, what he was forced to endure took a hard toll on him.

More broadly, the issues that surfaced around whistleblowing at the time remain largely the same two decades later. Annie Machon has been a very prominent and strong supporter of Julian. She has also been a much admired mentor to less experienced women and men as they seek to become better informed on issues of integrity and courage, and take Annie up on her offer to “help them meet interesting people”, as she puts it.

We would be remiss today were we not to call to mind the courageous example of our first two awardees, Coleen Rowley (FBI) and Katharine Gun (GCHQ), who took great risks in exposing malfeasance and in trying to head off the attack on Iraq. And, as Julian Assange did when he won this award, we again honor his treasured source, Chelsea Manning, for her continuing courage and scarcely believable integrity.

Ed Snowden, our Sam Adams awardee in 2013, noted that we tend to ignore some degree of evil in our daily life, but, as Ed put it, “We also have a breaking point and when people find that, they act.”

Annie is still acting, as one can see as this World Ethical Data Forum unfolds.

Presented this 17th day of March at the World Ethical Data Forum by admirers of the example set by the late CIA analyst, Sam Adams.

Related Articles

Intel Vets Urge Fast Report on Clinton’s Emails

A group of U.S. intelligence veterans is calling on President Obama to expedite the FBI review of former Secretary of State Clinton’s alleged email security violations so the public can assess this issue in a timely fashion.

MEMORANDUM FOR: The President

FROM: Veteran Intelligence Professionals for Sanity

SUBJECT: Those “Damn Emails” – “Really a Concern”

Introduction

Last Wednesday Robert Gates, CIA Director under President Bush-41 and Defense Secretary under President Bush-43, publicly commented that Secretary Hillary Clinton’s “whole email thing … is really a concern in terms of her judgment,” adding, “I don’t know what originally prompted her to think that was a good idea.”

What originally prompted her does not matter. As your Secretary of State and your subordinate, she willfully violated laws designed to protect classified information from unauthorized disclosure. It may be somewhat difficult for those not as immersed in national security matters as we have been to appreciate the seriousness of the offense, including the harm done in compromising some of the most sensitive U.S. programs and activities. This is why we write.

Pundits and others are playing down the harm. A charitable interpretation is that they have no way to gauge what it means to expose so much to so many. We do know, and our overriding concern is to protect the national security of our country from further harm. It would be a huge help toward this end, if you would order Attorney General Loretta Lynch to instruct the FBI to stop slow-walking the email investigation and release its findings promptly.

If you choose, instead, to give precedence to politics over national security, the American people will be deprived of timely appreciation of the gravity of the harm done; national security officials who do follow the rules will be scandalized; FBI investigators will conclude that that their job is more political than professional; and the noxious impression will grow that powerful people cannot be held accountable when they break the law. Worse: if the results of the FBI investigation remain under lock and key, dangerous pressures are likely to be exerted on the most senior U.S. officials by those who have the key – as we explain below.

* * *

We the undersigned Veteran Intelligence Professionals for Sanity (VIPS) have spent 400 years working with classified information – up to and including TOP SECRET, Codeword, and Special Access Programs (SAP). Given that experience, we believe that much of the commentary on the former Secretary of State Hillary Clinton email controversy has been misplaced, focusing on extraneous issues having little or nothing to do with the overriding imperative to protect classified information.

As intelligence, military, and foreign service professionals, we are highly aware not only of that compelling need, but also of the accompanying necessity to hold accountable those whose actions compromise – whether for reasons of convenience or espionage – sensitive operations, programs and persons. In addition, we know that successful mutual cooperation with foreign intelligence services depends largely on what they see as our ability to keep secrets secret.

Background

Last August, Secretary Clinton handed over her private email server to the FBI, five months after she acknowledged she had used it for work-related emails as Secretary of State. She admitted to having deleted about 31,000 emails she described as personal. Media reports last fall, however, indicated that the FBI was able to recover the personal emails, and was reviewing them, as well as the 30,000 others she had described as work-related.

In January, the Department of State announced that, of the 30,000 work-related emails, at least 1,340 contained classified material. The Department retroactively classified 22 of those TOP SECRET and prevented their release. Among the 22 were some that, according to media reports, included information on highly sensitive Special Access Programs (SAP).

The White House has said it will do nothing to impede the FBI investigation and possible filing of charges against Clinton, if the facts should warrant that kind of action. Inasmuch as the outcome of the investigation is bound to have major political consequences, such White House assurances stretch credulity.

By all indications, the FBI is slow-walking the investigation and mainstream media are soft-pedaling the issue. As things now stand, most Americans remain unaware of the import of this industrial-scale compromise of very sensitive national security information in Secretary Clinton’s emails.

Our concern mounted in January when the Inspector General of the intelligence community wrote to the chairs of the congressional intelligence committees that he had received from one of the intelligence agencies two “sworn declarations” asserting that Secretary Clinton’s emails contained not only CONFIDENTIAL and SECRET information, but also information at the TOP SECRET/SAP level.

In 2009, you signed an Executive Order regarding SAP (Special Access Programs), so we assume you were briefed on their extremely high sensitivity and the consequent need to sharply limit the number of people allowed to be “read-in” on them. The mishandling of SAP information can neutralize intelligence programs costing billions of dollars, wreck liaison relationships assiduously cultivated for decades, and get a lot of people killed.

‘It Wasn’t That Bad’

All those directly or peripherally involved in the investigation of the Clinton email issue know very well that it could have a direct impact on who is likely to become the next President of the United States, and they will be making decisions with that reality in mind. They know that it is with you that “the buck stops,” and they are sensitive to signs of your preferences. Those were not difficult to discern in your commencement address at Howard University on May 7, in which you strongly advocated the same basic policy approaches as those espoused by one Democratic presidential candidate – Hillary Clinton.

Your White House has also made excuses for deliberate security violations by Secretary Clinton that would have gotten senior officials like us fired and probably indicted. We look with suspicion at what we see as contrasting and totally inappropriate attempts by the administration and media to play down the importance of Secretary Clinton’s deliberate disregard of basic security instructions and procedures.

It appears that the option chosen by the White House is using the declared need for “thoroughness” to soft-pedal and delay completion of the investigation for several more months, while the corporate media sleeps on. Four months have already gone by since the smoking-gun-type revelations in the intelligence community Inspector General’s letter to Congress, and it has been well over a year since Secretary Clinton first acknowledged using an insecure email server for official business.

Another claim emanating from your White House is that Clinton was careless in managing her emails and has admitted as much, but that she has not damaged American national security. She has called it a “mistake,” but security officials of the National Security Agency explicitly forewarned her against violating basic laws and regulations designed to prevent the compromise of classified information.

NSA, FBI Have Enough Evidence

Surely, enough time has passed, and enough material has been reviewed, to permit a preliminary damage assessment. The NSA has the necessary information and should, by now, have shared that information with the FBI. Secretary Clinton’s server in her house in Chappaqua, New York, was not a secured device. Her email address incorporated her initials, “hdr” (apparently for her maiden name, Hillary Diane Rodham). It also included the “clinton” server identity, so it was easy for a hacker to spot.

Anyone with the proper equipment, knowledge and motivation might have been able to obtain access. That is what hackers are able to do, with considerable success, against government servers that are far better protected than the private email server located in her New York State home.

In fact, there have been reports that Secretary Clinton’s emails were, indeed, hacked successfully by foreigners. The Romanian hacker who goes by the name Guccifer claimed earlier this month that he had repeatedly hacked her email server. He described the server as “like an open orchid on the Internet” and that “it was easy … easy for me, for everybody.” Guccifer has been extradited from Romania and is now in jail in Alexandria, Virginia, where the FBI is said to be questioning him on the emails. There have also been credible claims that Russian intelligence and other foreign services were able to hack the Secretary’s server.

Another argument being surfaced, in a transparent attempt to defend Secretary Clinton, has to do with intent. It is said that she did not intend to have classified information on her computer in New York and had no intention of handling secret material in a way that would be accessible to foreign intelligence or others lacking the proper security clearances and the need-to-know.

But while intent might be relevant in terms of punishment, it does not change the fact that as a member of the Senate Armed Services Committee, then Senator Clinton had clearances for classified information for years before becoming Secretary of State. She knew the rules and yet as Secretary she handled classified information carelessly after a deliberate decision to circumvent normal procedures for its safeguarding, thus making it vulnerable to foreign intelligence, as well as to criminal hackers.

Anyone who has ever handled classified material knows that there are a number of things that you do not do. You do not take it home with you, you do not copy it and share it with anyone who does not have a clearance and a need-to-know, you do not strip off the classification marks and treat it as unclassified, and you do not transfer it to another email account that is not protected by a government server.

If you have a secured government computer operating off of a secure server that means that what is on the computer stays on the computer. This is not a matter of debate or subject to interpretation. It is how one safeguards classified information, even if one believes that the material should not be classified, which is another argument that has been made in Clinton’s defense. Whether or not the classification is unnecessary is not your decision to make.

Apart from the guidelines for proper handling of classified information, outlined in Executive Order 13526 and 18 U.S.C Sec. 793(f) of the federal code, there is some evidence of a cover-up regarding what was compromised. This itself would be a violation of the 2009 Federal Records Act and the Freedom of Information Act.

Numerous messages both in New York and in Washington have reportedly been erased or simply cannot be found. In addition, the law cited above explicitly makes it a felony to cut and paste classified information removing its classification designation. Retaining such information on a private email system is also a felony. In one of Secretary Clinton’s emails, she instructed her staff simply to remove a classification and send the information to her on her server.

So the question is not whether Secretary Clinton broke the law. She did. If the laws are to be equally applied, she should face the same kind of consequences as others who have been found, often on the basis of much less convincing evidence, guilty of similar behavior.

Some More Equal Than Others

Secretary Clinton’ case invites comparison with what happened to former CIA case officer Jeffrey Sterling, now serving a three-and-a-half-year prison term for allegedly leaking information to New York Times journalist James Risen. Sterling first came to the media’s attention when in 2003 he blew the whistle on a botched CIA operation called Operation Merlin, telling the Senate Intelligence Committee staff that the operation had ended up revealing nuclear secrets to Iran. When in 2006 James Risen published a book that discussed, inter alia, this amateurish cowboy operation, the Department of Justice focused on Sterling as the suspected source.

In court, the federal prosecutors relied almost entirely on Risen’s phone and email logs, which reportedly demonstrated that the two men had been in contact up until 2005. But the prosecutors did not provide the content of those communications even though the FBI was listening in on some of them. Risen has claimed that he had multiple sources on Operation Merlin, and Sterling has always denied being involved.

Jeffrey Sterling was not permitted to testify in the trial on his own behalf because he would have had to discuss Operation Merlin, which was and is still classified. He could not mention any details about it even if they were already publicly known through the Risen book. No evidence was ever produced in court demonstrating that any classified information ever passed between the two men, but Sterling, an African American, was nevertheless convicted by an all-white jury in Virginia based on “suspicion” and the presumption that “it had to be him.”

The contrast between the copious evidence – some of it self-admitted – of Secretary Clinton’s demonstrable infractions, on the one hand, and the very sketchy, circumstantial evidence used to convict and imprison Jeffrey Sterling, on the other, lend weight to the suspicion that there is one law for the rich and powerful in the United States and another for the rest of us.

Failing to take steps against a politically powerful presidential candidate and letting her off unscathed for crimes of her own making, while an institutionally unprotected Jeffrey Sterling sits in prison would be a travesty of justice not dissimilar to the gentle wrist-slap given Gen. David Petraeus for giving his mistress extremely sensitive information and then lying to the FBI about it.

Your order to then-Attorney General Eric Holder to let Gen. David Petraeus off easy created a noxious – and demoralizing – precedent in the national security community indicating that, whatever the pains taken at lower levels to prevent compromise of duly classified information, top officials are almost never held accountable for disregarding well-established rules. These are some of the reasons we are so concerned that this is precisely the direction in which you seem to be leaning on the Clinton email issue.

In our view, the sole legitimate reason for disclosing classified information springs from the only “oath” we all took – “to support and defend the Constitution of the United States against all enemies foreign and domestic.” When, for example, Edward Snowden saw the U.S. government grossly violating our Fourth Amendment right to be “secure” against warrantless “searches and seizures,” he gave more weight to that oath (ethicists call it a supervening value) than to the promise he had made not to disclose information that could harm U.S. national security.

Possibly Still Worse Ahead

You might give some thought, Mr. President, to a potentially messy side of this. What is already known about NSA’s collect-it-all electronic practices over the past several years strongly suggests that NSA, and perhaps the FBI, already know chapter and verse. It is virtually certain they know what was in Secretary Clinton’s emails – including the ones she thought she had deleted. It is likely that they have also been able to determine which foreign intelligence agencies and other hackers were able to access the emails.

One ignores this at one’s peril. Secretary Clinton’s security violations can have impact not only on whether she becomes your successor, but also on whether she would, in that case, be beholden to those who know what lies hidden from the rest of us – perhaps even from you.

Intelligence professionals (in contrast to the occasional political functionary) take the compromise of classified information with utmost seriousness. More important: this is for us a quintessentially nonpartisan issue. It has to do, first and foremost, with the national security of the United States.

We are all too familiar with what harm can come from blithe disregard of basic procedures designed to protect sensitive intelligence and other national security information. Yes, the lamentable unevenness in how such infractions are handled is also an important issue – but that is not our main focus in the present context.

The Truth Will Out

Not all workers at the NSA or the FBI are likely to keep their heads in the sand, as they watch very senior officials and politicians with their own agendas disregard laws to safeguard the nation’s security. We know what it is like to do the difficult, disciplined work of protecting information from being compromised by strictly abiding by what often seem to be cumbersome rules and regulations. We’ve been there; done that.

If you encourage the Department of Justice and the FBI to continue slow-walking the investigation, there is a good chance the truth will come out anyway. As you are aware, the Justice Department, the FBI, and NSA have all yielded recent patriots who, in such circumstances, decided that whistleblowing – rather than silence – was the only way to honor the oath we all swore – to support and defend the Constitution.

To sum up our concern regarding how all this plays out, if you order the Justice Department and FBI to pursue the investigation with “all deliberate speed,” so to speak, and Secretary Clinton becomes president, the juicy email secrets in the hidden hands of the NSA and FBI are likely to give those already powerful institutions a capacity for blackmail that would make J. Edgar Hoover’s mouth water. In addition, information hacked by foreign intelligence services or Guccifer-like hackers can also provide useful grist for leverage or blackmail.

Taking Care the Laws Are Faithfully Executed

We strongly urge you to order Attorney General Loretta Lynch to instruct FBI Director James Comey to wind up a preliminary investigation and tell the country now what they have learned. By now they – and U.S. intelligence agencies – have had enough time to do an early assessment of what classified data, programs and people have been compromised. Realistically speaking, a lengthier, comprehensive post-mortem-type evaluation – however interesting it might be, might never see the light of day under a new president.

We believe the American people are entitled to prompt and full disclosure, and respectfully suggest that you ensure that enforcement of laws protecting our national security does not play stepchild to political considerations on this key issue.

On April 10, you assured Chris Wallace, “I guarantee that there is no political influence in any investigation conducted by the Justice Department, or the FBI – not just in this [Clinton email] case, but in any case. Full stop. Period.”

We urge you to abide by that promise, and let the chips fall where they may. Full stop. Period.

For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)

William Binney, Technical Director, NSA; co-founder, SIGINT Automation Research Center (ret.)

Thomas Drake, Senior Executive, NSA (former)

Philip Giraldi, CIA, Operations Officer (ret.)

Mike Gravel, former Adjutant, top secret control officer, Communications Intelligence Service; special agent in the Counter Intelligence Corps and a United States Senator representing Alaska

Matthew Hoh, former Capt., USMC, Iraq & Foreign Service Officer, Afghanistan (associate VIPS)

Larry C. Johnson, CIA & State Department (ret.)

Michael S. Kearns, Captain, USAF Intelligence Agency (ret.), ex-Master SERE Instructor

John Kiriakou, Former CIA Counterterrorism Officer

Ray McGovern, former US Army infantry/intelligence officer & CIA analyst (ret.)

Elizabeth Murray, Deputy National Intelligence Officer for Middle East, CIA (ret.)

Todd Pierce, MAJ, US Army Judge Advocate (ret.)

Scott Ritter, former MAJ, USMC, former UN Weapon Inspector, Iraq

Diane Roark, DOE, DOD, NSC, & professional staff, House Intelligence Committee (ret.)

Robert David Steele, former CIA Operations Officer

Peter Van Buren, U.S. Department of State, Foreign Service Officer (ret.) (associate VIPS)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA, (ret.)

Ann Wright, U.S. Army Reserve Colonel (ret) and former U.S. Diplomat

(Originally published by Consortiumnews.com)

Inside the Assassination Complex: Whistleblowing Is Not Just Leaking–It’s an Act of Political Resistance

By Edward Snowden, May 3, The Intercept

“I’ve been waiting 40 years for someone like you.” Those were the first words Daniel Ellsberg spoke to me when we met last year. Dan and I felt an immediate kinship; we both knew what it meant to risk so much — and to be irrevocably changed — by revealing secret truths.

One of the challenges of being a whistleblower is living with the knowledge that people continue to sit, just as you did, at those desks, in that unit, throughout the agency, who see what you saw and comply in silence, without resistance or complaint. They learn to live not just with untruths but with unnecessary untruths, dangerous untruths, corrosive untruths. It is a double tragedy: What begins as a survival strategy ends with the compromise of the human being it sought to preserve and the diminishing of the democracy meant to justify the sacrifice.

But unlike Dan Ellsberg, I didn’t have to wait 40 years to witness other citizens breaking that silence with documents. Ellsberg gave the Pentagon Papers to the New York Times and other newspapers in 1971; Chelsea Manning provided the Iraq and Afghan War logs and the Cablegate materials to WikiLeaks in 2010. I came forward in 2013. Now here we are in 2016, and another person of courage and conscience has made available the set of extraordinary documents that are published in The Assassination Complex, the new book out today by Jeremy Scahill and the staff of The Intercept. (The documents were originally published last October 15 in The Drone Papers.)

We are witnessing a compression of the working period in which bad policy shelters in the shadows, the time frame in which unconstitutional activities can continue before they are exposed by acts of conscience. And this temporal compression has a significance beyond the immediate headlines; it permits the people of this country to learn about critical government actions, not as part of the historical record but in a way that allows direct action through voting — in other words, in a way that empowers an informed citizenry to defend the democracy that “state secrets” are nominally intended to support. When I see individuals who are able to bring information forward, it gives me hope that we won’t always be required to curtail the illegal activities of our government as if it were a constant task, to uproot official lawbreaking as routinely as we mow the grass. (Interestingly enough, that is how some have begun to describe remote killing operations, as “cutting the grass.”)

A single act of whistleblowing doesn’t change the reality that there are significant portions of the government that operate below the waterline, beneath the visibility of the public. Those secret activities will continue, despite reforms. But those who perform these actions now have to live with the fear that if they engage in activities contrary to the spirit of society — if even a single citizen is catalyzed to halt the machinery of that injustice — they might still be held to account. The thread by which good governance hangs is this equality before the law, for the only fear of the man who turns the gears is that he may find himself upon them.

(Read more here.)

Avaaz Ignores Libya Lessons in Advocating for Syria No-Fly Zone

A recent two-part series in The New York Times laid out in detail the pivotal role that then-Secretary of State Hillary Clinton played in President Obama’s decision to join in France and Britain’s 2011 military campaign against long-time Libyan leader Muammar Gaddafi. The Times articles make the case that Clinton bears a heavy part of the responsibility for the tragic, increasingly chaotic aftermath of that campaign in which Gaddafi was ousted and killed.

As The Times summaries of the articles put it, Gaddafi’s fall “seemed to vindicate Hillary Clinton. Then militias refused to disarm, neighbors fanned a civil war, and the Islamic State found refuge,” leaving Libya “a failed state and a terrorist haven.”

While neocons, right-wingers and humanitarian interventionists back in 2011 were seeking regime change in Libya, there was one non-governmental organization that was alone among progressive groups in mobilizing public opinion around the world in support of military action in Libya in the form of a no-fly zone.

And this wasn’t just any organization, but the fast-growing, on-line advocacy giant Avaaz.org, which in 2011 had 7 million members and today boasts 43.1-million members in 194 countries. As such, the New York City-based Avaaz is, as we noted in a previous article, the largest and most influential Internet-based, international advocacy organization on the planet.

Through its members’ petitions and a full-page ad last June in The New York Times, Avaaz has for the last few years been pushing for a no-fly zone in Syria, as have assorted neocons and war-hawks in congress and think-tanks who favor military operations to remove Syrian President Bashar al-Assad from power. Hillary Clinton (but not other presidential candidates Bernie Sanders and Donald Trump) is a staunch advocate for a no-fly zone and regime change in Syria.

Like Clinton and other interventionists, Avaaz — in advocating for a no-fly zone in Syria — has not been chastened by what its advocacy wrought in Libya. Some of the same arguments for a no-fly zone that Avaaz made for Libya, it has made again over the last few years for Syria. This, despite as we noted in that earlier article, that top U.S. generals have warned that a no-fly zone in Syria is a “high-risk operation..a violent combat action that results in lots of casualties,” civilian and military.

(Full article by John Hanrahan at Expose Facts is here.)

As in Libya, Avaaz Campaigns for Syria No-Fly Zone That Even Top Generals Oppose

◾“I worry sometimes that, when people say ‘impose a no-fly zone,’ there is this almost antiseptic view that this is an easily accomplished military task. It’s extraordinarily difficult. Having overseen imposing a no-fly zone in Libya, a force that is vastly inferior in air forces and air defenses to that which exists in Syria, it’s a pretty high-risk operation…It first entails — we should make no bones about it. It first entails killing a lot of people and destroying the Syrian air defenses and those people who are manning those systems. And then it entails destroying the Syrian air force, preferably on the ground, in the air if necessary. This is a violent combat action that results in lots of casualties and increased risk to our own personnel.” — Now-retired four-star General Carter Ham, former commander, U.S. Africa Command, who oversaw U.S. military enforcement of the Libyan no-fly zone in 2011 [CBS News]
◾“It is quite frankly an act of war and it is not a trivial matter…I know it sounds stark, but what I always tell people when they talk to me about a no-fly zone is . . . it’s basically to start a war with that country because you are going to have to go in and kinetically take out their air defense capability.” — Four-star General Philip Breedlove, NATO’s current supreme allied commander, U.S. European Command [Stars and Stripes]
◾The New York Times reported that in 2012 General Martin E. Dempsey, chairman of the Joint Chiefs of Staff, told the White House that imposing a no-fly zone in Syria — in the Times paraphrasing — “would require as many as 70,000 American servicemen to dismantle Syria’s sophisticated antiaircraft system and then impose a 24-hour watch over the country.” [New York Times] (Dismantle being a Times polite euphemism for bombing the bejeezus out of Syria’s antiaircraft defenses.)
….

In its call for no-fly zones in Libya and Syria, Avaaz has turned the concept of progressive advocacy on its head and appears to be untrue to the direction it has followed in the overwhelming majority of its campaigns. Advocacy organizations should be about stopping wars, not asking their members to buy into a dubious military tactic for Syria that even leading U.S. generals say “entails killing a lot of people…[and is] a violent combat action that results in lots of casualties” for those very Syrian civilians that Avaaz argues it is trying to protect.

(Here is full article by John Hanrahan at Expose Facts.)

Is Hillary Clinton Above the Law? (by Ray McGovern)

“Enough of the emails,” said Sen. Bernie Sanders in Brooklyn-ese, while turning to Secretary Hillary Clinton during their first debate on Oct. 13, 2015. Sanders won loud applause for what seemed a gentlemanly gesture in withholding criticism for her use of a private email server for classified information.

But when Sanders said “The American people are sick and tired of hearing about your damn emails,” I had a flashback to a House hearing three decades ago on large liberties taken with the law during the Iran-Contra affair under President Ronald Reagan. Beginning his testimony, then-Secretary of State George Shultz made the mistake of saying, in effect, who cares about laws being violated: “The American people are tired of hearing about Iran-Contra.”

Rep. David Obey, D-Wisconsin, was quick to respond: “Mr. Secretary, I did not take an oath to uphold and defend the Constitution of the United States until I got tired.”

Well, we intelligence professionals also took an oath to support and defend the Constitution of the United States against all enemies foreign and domestic. There was no “until we got tired” – or even “until we retired” in that oath. It has no expiration date. Congressman Obey’s persistence and tenacity offer a model for patriots.

(More at Antiwar.com)