by Melinda Pillsbury-Foster
Andrew Kreig's coverage of Hillary Clinton's secret email system, written in three parts, delves into the issues which he says provide, “scant scrutiny of the most sinister implications for the public.” These are certainly riveting, named by Kreig as, “Arms Smuggling: The Obama-Clinton-Petraeus 'Iran-Contra' Scandal, the Duplicity and Disloyalty by Gen. David Petraeus and the Conflict of Interest In Clinton Foundation/Hillary Clinton 2016 Funding.”
Enough there to generate multiple books and even conferences for journalists digging into the morass to extract hard evidence.
Kreig's book, “Presidential Puppetry,” as mentioned in his article on Clinton's mail system, “What's Important About Hillary Clinton's Emails,” ties back to a similar evasion of transparency for emails by Karl Rove during the Bush W. administration and then the revelations hacked into public sight by Romanian hacker, Marcel-Lehel Lazar of, “19 political intelligence memos totaling 66 pages from former 1990s Clinton White House aide Sidney Blumenthal to Clinton between August 2012 and early February 2013.”
As the narrative marches back in time we encounter the covert involvement of the CIA in Benghazi and a plot of overthrown the Syrian government of President Bashar Al-Assad. Both Republican and Democratic administrations have promoted the same kind of operations. Kreig neatly points to the similarity between Obama's training and arming of 'rebels' and the Iran-Contra run-running of the Reagan Administration.
Oil figures largely in the picture.
Ensuring actions which violate the law and are prohibited by Congress presents a probable need to ensure these actions do not come to the attention of the public. This is clearly a need for the individuals in all administrations since emailing began. This leads to the questions, “who wrote the email system used by Hillary? Was this her own system, used only by her? “
As you read through Kreig's article you find some names popping up or recognize that some individuals, for instance Karl Rove, have long understood the need for tight security when engaging in illegal actions, for instance, election fraud carried out so these same individuals could control the White House.
Is this a system which was written because some earlier event brought this vulnerability to the attention of a group of individuals, Democrats and Republicans, who realized it was necessary their convert communications had to be protected from public view? This had to have happened after communication by email became ubiquitous, say in the early 2000's.