This week we revealed that there are at least 18 classified emails in the 806 documents recently produced by the State Department from the FBI’s investigation into former Secretary of State Hillary Clinton’s illicit email system. The emails were found on the laptop of Anthony Weiner, who is the estranged husband of former Clinton aide Huma Abedin.
JW Spurs New Criminal Investigation of Hillary Clinton
January 5, 2018
 

At Least 18 Classified Emails Found on Weiner’s Laptop
Judicial Watch Takes on Unsolved Murder of a New York Police Officer at Mosque
 

At Least 18 Classified Emails Found on Weiner’s Laptop

Big news.
 
This week we revealed that there are at least 18 classified emails in the 806 documents recently produced by the State Department from the FBI’s investigation into former Secretary of State Hillary Clinton’s illicit email system. The emails were found on the laptop of Anthony Weiner, who is the estranged husband of former Clinton aide Huma Abedin.

Abedin was Clinton’s deputy chief of staff. Weiner is a disgraced former congressman and New York mayoral candidate who pleaded guilty to transferring obscene material to a minor. Abedin kept a non-State.gov email account on Hillary Clinton’s notorious email server that she used repeatedly for government business.

There are five new classified emails among 147 new State Department documents released by the State Department on Friday, December 29, 2017.

Thirteen emails containing classified information were also found on the Weiner laptop computer; these had already been released to the public. This classified material includes discussions about Saudi Arabia, The Hague, Egypt, South Africa, Zimbabwe, the identity of a CIA official, Malawi, the war in Syria, Lebanon, Hamas, and the PLO. 

On two occasions, classified material was sent by Abedin on her clintonemail.com account to Weiner’s laptop (sent to “Anthony Campaign”). On November 25, 2010, an email discusses an upcoming call with Prince Saud of “expected WikiLeaks leaks.” Abedin sent classified information the following day to Weiner’s laptop concerning a call that “Jeff” (presumably then- U.S. Assistant Secretary of State for Near Eastern Affairs Jeffrey Feltman) had with United Arab Emirates Prime Minister Abdullah bin Zayed.

The Weiner laptop also contains classified material from Abedin’s BlackBerry. A July 9, 2011, email contained classified information regarding a then-upcoming call between Clinton and Israeli Prime Minister Netanyahu. On November 25, 2011, classified information was sent regarding Feltman’s notes on the Egyptian Ministry of Foreign Affairs’ impression of the Hamas- Palestine Liberation Organization talks. On May 4, 2012, additional classified material from the BlackBerry backup was sent.

Our work in federal court holding the government accountable to the rule of law has forced the State Department to finally release these documents. The classified information on Weiner’s laptop is part of a pattern of mishandling national security material by Clinton and her aides.
 
The Weiner emails emphasize the need for the Justice Department to conduct a fresh, serious investigation of Hillary Clinton’s and Huma Abedin’s obvious violations of law. That’s why we are pleased to learn that the Justice Department has reportedly at least begun asking questions about the Clinton classified material. We have no doubt that the Justice Department is taking these steps due to the ongoing disclosures of Clinton email misconduct from our lawsuits.

In September 2017 we made public Abedin’s use of the unsecure Clinton email system for the transmission of sensitive passwords.
 
On August 18, 2009, confidential assistant Monica Hanley provided Abedin with laptop and fob (a physical device that provides a login code) logins and passwords to log onto a laptop, as well as a secure State Department website at https://one.state.gov. Included were a PIN number and instructions on how to access her email from the secure State Department website. Abedin forwarded this information to her unsecure account.
 
On January 2, President Trump, again following our lead, tweeted: “Crooked Hillary Clinton’s top aide, Huma Abedin, has been accused of disregarding basic security protocols. She put Classified Passwords into the hands of foreign agents. Remember sailors’ pictures on submarine? Jail! Deep State Justice Dept must finally act? Also on Comey & others.”

The documents produced on December 12, 2017, are part of a court ordered production of documents. A State Department court filing states: “The State Department “identified approximately 2,800 work-related documents among the documents provided by the Federal Bureau of Investigation.” Evidently nearly 2,000 of the documents turned out to be something other than government records. We are suspicious of that assertion and are following up.

The documents were produced in our May 5, 2015, lawsuit against the State Department (Judicial Watch, Inc. v. U.S. Department of State (No. 1:15-cv-00684)). We sued after the State Department failed to respond to a March 18, 2015, Freedom of Information Act (FOIA) request seeking: “All emails of official State Department business received or sent by former Deputy Chief of Staff Huma Abedin from January 1, 2009 through February 1, 2013 using a non-‘state.gov’ email address.”

We have previously released 20 productions of documents in this case that show examples of mishandling of classified information and instances of pay-to-play between the Clinton State Department and the Clinton Foundation. Also, at least 627 emails were not part of the 55,000 pages of emails that Clinton turned over, and further contradict a statement by Clinton that, “as far as she knew,” all of her government emails had been turned over to the State Department.

To see examples of previously released documents containing classified and sensitive information sent through the Clinton non-government server, click here.
 
As one interviewer at Fox News commented, “If it wasn’t for Judicial Watch none of this would be happening …” And if it weren’t for the support of hundreds of thousands of Americans like you, none of Judicial Watch’s successes would ever occur. And more is coming, so stay tuned!

Judicial Watch Takes on Unsolved Murder of a New York Police Officer at Mosque

How about a mystery involving questionable FBI activities and a radical mosque in Harlem? Sounds like typical news fare for 2018. However, this particular mystery occurred four decades ago, and we aren’t going to let it go.
 
We have sued the Justice Department, as well as the City of New York and the New York Police Department (NYPD), to compel them to release information regarding the April 14, 1972, murder of police officer Phillip Cardillo at a mosque in Harlem. Cardillo was killed while responding to a fake “10-13” officer in distress phone call.
 
We filed the Freedom of Information Act (FOIA) lawsuit against the Department of Justice after it failed to adequately search for records responsive to our May 15 FOIA request (Judicial Watch v. U.S. Department of Justice (No. 1:17-cv-024687)). We seek:

All records concerning the Nation of Islam Mosque #7 in Harlem, Manhattan, New York City, or the building located at 102 West 116th Street. This request includes, but is not limited to, all informant, wiretap, electronic surveillance, and physical surveillance records relevant to the Nation of Islam Mosque #7, located at 102 West 116th Street, in New York City.

We also sued New York City and the NYPD after they failed to respond to our June 5 Freedom of Information Law (FOIL) requests (Judicial Watch v. The City of New York and the New York City Police Department (No. 0160286/2017)). Here we seek:

  • The audio tape of the 10-13 "officer in distress" call recorded by the Police Communications Division at 11:41 a.m. on April 14, 1972; and 
  • The Major Case Squad report and files on the homicide of NYPD Patrolman Philip Cardillo.  

In our complaint we note that, “[NY City and NYPD] have yet to provide one responsive document and only have provided conclusory, unsubstantiated, non-specific bases for denial by an individual with no personal knowledge of the underlying investigation.”
 
We dispute the claim made by NY City and the NYPD that the case is ongoing.
 
New York Post article titled, “Did an FBI call accidentally kill an NYPD officer?” written by Judicial Watch Chief Investigative Reporter Micah Morrison, details Officer Cardillo’s murder:

A 10-13 is every cop’s worst nightmare, a red alert meaning “officer in distress.”
 
Two policemen, Phillip Cardillo and Vito Navarra, rushed to the address, which was the Muhammed Mosque #7 of the Nation of Islam. Its leader, Louis Farrakhan, had offices on the third floor.
 
The mosque doors, usually bolted shut and manned by the Nation of Islam’s own paramilitary force, the Fruit of Islam, were unlocked and unguarded.
 
In the reception area, Cardillo and Navarra encountered six men. Navarra darted up the stairs. Somewhere up on the second floor, he believed, a brother officer was in serious trouble. He was met by 10 men who forced him back down the stairs.
 
Nine more cops rushed into the reception area. A fight broke out.

Cardillo died from his injuries six days after the fake 10-13 call. A suspect was tried twice but not convicted. The NYPD’s Major Case Squad reopened the investigation in 2006. 
 
Officer Cardillo’s murder, over 40 years ago, is relevant today. We need to completely clear this case to properly honor a fallen hero. There should be no informal statute of limitations on the death of one of New York’s finest. 

Additional details on this story are available here and here. New York attorney Ethan Leonard from the Law Offices of Neal Brickman P.C. is representing Judicial Watch.
 
It is shameful that we are being stonewalled by law enforcement bureaucracies on this murder. Rank-and-file NYPD officers want answers, too.
 

Until next week …

 
 
 
Tom Fitton
President


Judicial Watch is a 501(c)(3) nonprofit organization. Contributions are received from individuals, foundations, and corporations and are tax-deductible to the extent allowed by law.
judicialwatch.org