of postpolitics.com and weapon weapon washington post columnist ruth marcus. first of all, colin powell used private e-mails and frequently telling friends he was trying to drag the state department s information system into the information age. he used his own e-mails and did not take records with him. and indicated to nbc news that the e-mail records would be as clinton had said hers would be with the recipients of the e-mails in the official colleagues. what about about this story? how much smoke and fire? i think it s not great andrea because i think it plays into what our existing narratives that many people either believe or suspect about the clintons they operate under their own set of rules are very political in the way they do things. they are surrounded at times by
the magazine is apologizing because a number of major papers have begun to question the validity of the piece but when they talk about discrepancies in jackie s story, and we know what they are. i just got off the phone with the attorney of this fraternity. he said, one, they went through e-mail records and council records, a council at the school that regulates greek life. no party that night. the night she describes that she was brutally raped by seven men, there was no party. the guy they said orchestrated the whole thing and brought her to the party and lured her into the room, he was not a member of the fraternity. they identified him. not a member. there was no side staircase which was a big detail how she
erratic manner but then in a long distance, that it was time to take yet another or additional step towards looking at the pilot pilots homes. they could have already without our knowing been searching their bank account, phone records, internet accounts, e-mail records. you know, even without that. but you know, they may have wanted to look at their personal computers within the house or see if there s any other, you you know, information that might lead to them to believe they were going to fly that aircraft to some particular location that s not normal for malaysian air to fly. and so, mark, this is even though malaysian authorities are saying they believe that this was a deliberate act, no one is really pinpointing motivation yet but very similar to a crime scene that most people are familiar with, it appears as though investigators are looking at those closest to the plane, the crew, passengers, just as you would if a crime took place at someone s home you would be looking at
and it seems the committee has more than one way to get at least some of this material. for example, if they are subpoenaing in the records, the e-mail records of the governor s office, some of bridget anne kelly s e-mails or all of her government e-mails would theoretically show up in that direction collection, but her personal e-mails on the personal account, which they were using in this situation, you would have to the subpoena would have to get those through her, it seems. that s exactly right, law rengs. when you look at these kinds of investigations, whether they re government or corporate. you try to do an end to end matchup. you try to say okay, we have every outgoing e-mail, every incoming e-mail. we want to do that for authenticity and thoroughness. in a lot of cases, particularly with regard to what we know to be suspicious activity, government e-mails and plans and meetings about a supposed traffic story of overall.
subpoenaing in the records, the e-mail records of the governor s office, some of bridget anne kelly s e-mails or all of her government e-mails would theoretically show up in that direction collection, but her personal e-mails on the personal account, which they were using in this situation, you would have to the subpoena would have to get those through her, it seems. that s exactly right, law rengs. when you look at these kinds of investigations, whether they re government or corporate. you try to do an end to end matchup. you try to say okay, we have every outgoing e-mail, every incoming e-mail. we want to do that for authenticity and thoroughness. in a lot of cases, particularly with regard to what we know to be suspicious activity, government e-mails and plans and meetings about a supposed traffic story of overall. the private stuff in the text is what they re trying to get at with these subpoenas.