There are More Non-Official Email Accounts, Server-Gate

Every day brings new information and keeping a timeline is difficult given the number of people and the countless moving parts. The previous list and timeline is here for reference an context.

Strip their security clearance NOW due to dereliction of duty, oath and reckless control of classified material.

Further a subpoena should be issued to Brian Pagliano, who actually built the infrastructure of the Hillary server and managed it during her presidential run in 2008 until the time the platform was turned over to Platte River. Pagliano also worked a dual job at the State Department once Hillary was confirmed as Secretary. He is now in a private IT practice.

It should also be noted that any external communications device that has any protective classifications on the material by default becomes the official property of the Federal government, which is policy.

State Dept. confirms Clinton aides had other unreported email accounts

By Stephen Dinan – The Washington Times – Friday, August 14, 2015

Huma Abedin and Cheryl Mills, former Secretary of State Hillary Rodham Clinton’s top aides, used personal email accounts to conduct government business in addition to a State Department email and an account on the controversial server Mrs. Clinton kept at her New York home, the State Department confirmed to a federal court Friday.

The State Department admitted to the judge that it doesn’t have control over those documents, and can’t be sure it has all of the records from their time in the administration.

John F. Hackett, the top open-records official at the department, said they have officially concluded that Ms. Abedin and Ms. Mills “used personal email accounts located on commercial servers at times for government business.” Ms. Abedin, meanwhile, had an account at clintonemail.com, the domain tied to the Clinton home server.

Mr. Hackett also said he has no way of knowing what else might be out there, and has to trust the two women and their lawyers to turn over what they have.

“The department is not in a position to attest to non-department servers, accounts, hard drives or other devices that may contain responsive information,” Mr. Hackett said in a declaration filed with Judge Emmet G. Sullivan in a case brought by Judicial Watch, which is seeking records from Mrs. Clinton’s aides.

Judicial Watch has argued that Mrs. Clinton’s unique email arrangement, in which she used an email account tied to a server she kept at her home in New York, rather than using the regular State Department system, does not absolve her or her aides, who also used that server, of responsibility to make sure they are all stored by the administration as official records.

Tim Fitton, president of Judicial Watch, said the Hackett declaration didn’t provide the answers his group and the court were seeking, and said it taints the Obama administration.

“The State Department refused to answer questions about what is even in its possession. Now we know that the Obama administration and Hillary Clinton have joined hands in this email scandal,” he said. “It is now clear that Mrs. Clinton is withholding servers and emails from the FBI and Justice Department, and Judge Sullivan is being misled to conclude otherwise. We will seek appropriate relief from the court.”

Mr. Hackett said the State Department “is not currently aware” of any other devices, such as computers or phones “issued by the department to former Secretary Clinton, Ms. Abedin or Ms. Mills that may contain responsive records.”

Mrs. Clinton has asserted, through her lawyer, that she has turned over all of her relevant documents to the State Department.

For her part, Ms. Mills said through her lawyer that she has already returned all documents she believes are official business.

Ms. Abedin’s lawyer said she’ll return her official government documents that she kept by Aug. 28.

The State Department for years had been performing records-searches without access to Mrs. Clinton’s emails — though it never publicly admitted the searches were likely incomplete. The situation became public earlier last year after the Benghazi panel learned of Mrs. Clinton’s use of a clintonemail.com account for official business, and demanded to see some of those messages.

The State Department then went back to Mrs. Clinton and asked her to return the records that were supposed to have been in the government’s possession, and she belatedly complied in December, or nearly two years after she left office.

She returned the messages — a total of about 30,000 — by printing them out on 55,000 pages. The State Department then spent months and manpower going back and re-digitizing those messages.

The story continues here.

Enter Mark Levin on Hillary vs. the Espionage Act.

Section 793 of the Penal Code, subsection (f) is a problem for Hillary Clinton. It is very specific in defining the offenses which meet the criteria for a violation and it appears that Ms Clinton has potentially thousands of counts, perhaps tens or hundreds of thousands, against her.

Levin: ‘Sect. 793 of Penal Code … Is What Hillary Clinton Has to Worry About’

 

al Qaeda and Taliban New Allegiance in Afghanistan

The Taliban has raised their flag after they take control of the Helmand district in Afghanistan. Afghan soldiers bailed out and the Taliban has seized military gear supplied to the Afghanistan forces after killing 40 Afghan soldiers and police.

Sharia will be imposed and wield deeper power in the region.

After the official declaration of the deal of Mullah Omar was announced, the Taliban leadership was fractured due to a sense of betrayal. During many tribal meetings, it was soon announced that Mullah Akhtar Mansour would be the new leader.

 Omar

 Mansour

Ayman al Zawahiri, who took control of al Qaeda after the death of Usama bin Ladin made a declaration of pledge and cooperation with Akhtar Mansour where new threats against America have been officially broadcasted.


al Zawahiri has been thought to be hiding in the Pakistan border region and recently produced an audio raising news fears in the region. Additionally, while there have been several attempts at peace talks with the Afghanistan government, the Taliban is now formally opposed.

In part from Reuters: The swift announcement that Mansour, Omar’s longtime deputy, would be the new leader has riled many senior Taliban figures, and Omar’s family said this month that it did not endorse the move.

Mansour’s position could be shored up by the vote of confidence by al Qaeda, the global militant group that has maintained ties with the Taliban for almost two decades since the tenure of its founder and late leader Osama bin Laden.

“As leader of the al Qaeda organization for jihad, I offer our pledge of allegiance, renewing the path of Sheikh Osama and the devoted martyrs in their pledge to the commander of the faithful, the holy warrior Mullah Omar,” Zawahiri added.

Reiterating support for the Taliban is also a tacit rejection of Islamic State, the new ultra-radical Sunni Muslim movement that is ensconced in Iraq and Syria and has gained the support of a few Afghan insurgent commanders.

Al Qaeda is being challenged by Islamic State for leadership of the global jihadist movement, as determined backers of IS have cropped up in Libya and Yemen this year.

Al Qaeda was set up by Arab guerrillas who flocked to Afghanistan to fight Soviet occupation forces in the 1980s. It thrived under the Taliban’s 1996-2001 rule in Afghanistan before the U.S. invasion that followed Al Qaeda’s Sept. 11, 2001 attacks on New York and Washington drove both groups underground.

StemExpress Cuts Ties with Planned Parenthood

LifeNews: StemExpress Cuts Ties With Planned Parenthood After Expose’ Videos Show Sales of Aborted Babies

A breaking news report this afternoon indicates the biotech firm StemExpress is officially cutting ties with the Planned Parenthood abortion business after a series of expose’ videos show the abortion company selling it aborted babies and body parts from aborted babies

The sixth and most recent video features Holly O’Donnell, a licensed phlebotomist who unsuspectingly took a job as a “procurement technician” at the fetal tissue company and biotech start-up StemExpress in late 2012. That’s the company that acts as a middleman and purchases the body parts of aborted babies from Planned Parenthood to sell to research universities and other places.

The new video includes O’Donnell’s eyewitness narrative of the daily practice of fetal body parts harvesting in Planned Parenthood abortion clinics, describing tissue procurement workers’ coordination with abortion providers, the pressure placed on patients, and disregard for patient consent.

StemExpress is one of a handful of biotech firms that works with Planned parenthood by purchasing aborted babies and their body parts and selling them to scientists at research universities for medical experiments. But Politico is reporting that the biologics company is breaking its ties with the abortion corporation.

Politico reports that notice of the decision to cut ties came in the form of a letter from StemExpress to a Congressional committee that is investigating the abortion business and its sales of aborted babies. More details here.

Meanwhile the White House is making threats if Planned Parenthood is defunded.

WH warns states: Defunding Planned Parenthood might break law

The Obama administration has warned Louisiana and Alabama that they could be violating federal law by cutting off Planned Parenthood from their states’ Medicaid programs.
The Republican governors in both states this month terminated their state Medicaid contracts with the organization in the wake of controversial undercover videos showing Planned Parenthood officials discussing the price of fetal tissue for medical research.
But the White House points out that federal law says Medicaid beneficiaries may obtain services from any qualified provider and that cutting Planned Parenthood out of the program restricts that choice.
The federal Centers for Medicare and Medicare Services (CMS) has contacted Louisiana and Alabama about the issue.

“CMS has notified states who have taken action to terminate their Medicaid provider agreements with Planned Parenthood that they may be in conflict with federal law,” Department of Health and Human Services spokesman Ben Wakana said in a statement.
“Longstanding Medicaid laws prohibit states from restricting individuals who have coverage through Medicaid from receiving care from a qualified provider,” he said. “By restricting which provider a woman could choose to receive care from, women could lose access to critical preventive care, such as cancer screenings.”
The warning was first reported by The Wall Street Journal.
Federal courts have in the past blocked state attempts by states including Indiana and Arizona to cut Planned Parenthood out of Medicaid, citing the law that gives consumers a choice in providers.
Mike Reed, a spokesman for Louisiana Gov. Bobby Jindal (R), indicated the state and its Department of Health and Hospitals (DHH) are standing by its decision.
He cited a provision in the state Medicaid contract allowing either party to cancel it at will, with 30 days notice.
“CMS reached out to DHH after we canceled the Medicaid provider contract with Planned Parenthood,” Reed said. “DHH explained to CMS why the state chose to exercise our right to cancel the contract without cause.”
Jindal is one of 17 big-name Republicans running for president in 2016.
Planned Parenthood praised the Obama administration’s move.
“It’s good to hear that HHS has clarified what we already know — blocking women’s access to care at Planned Parenthood is against the law,” Dawn Laguens, the group’s executive vice president, said in a statement.
She added that the group will “do everything in our power to protect women’s access to health care in all fifty states.”
White House press secretary Josh Earnest has defended Planned Parenthood and said it follows the “highest ethical standards.” The White House has also threatened to veto any government spending bill that defunds the organization, which some Republicans are calling for.

Lives and Crimes DONT Matter in Baltimore

Violent Racketeering Conspiracy: A Maryland gang member was sentenced to 188 months in prison today for conspiring to participate in a racketeering enterprise known as La Mara Salvatrucha, or MS-13.

The sentence was announced by Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division; U.S. Attorney Rod J. Rosenstein of the District of Maryland; Special Agent in Charge Andre Watson of U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (ICE-HSI); Chief Mark A. Magaw of the Prince George’s County, Maryland Police Department; Prince George’s County State’s Attorney Angela D. Alsobrooks; Chief J. Thomas Manger of the Montgomery County, Maryland, Police Department; Chief Alan Goldberg of the Takoma Park, Maryland, Police Department; and Montgomery County State’s Attorney John McCarthy.

Wilmer Argueta, aka Chengo, 23, of Hyattsville, Maryland, pleaded guilty on April 20, 2015, before U.S. District Judge Roger W. Titus of the District of Maryland to one count of Racketeer Influenced and Corrupt Organizations Act (RICO) conspiracy.

According to the stipulated facts agreed to in connection with Argueta’s guilty plea, MS-13 is an international criminal organization and one of the largest street gangs in the United States with branches or “cliques” operating throughout Prince George’s and Montgomery Counties in Maryland. Both to maintain membership in the gang and to enforce internal discipline, members are required to engage in acts of intimidation and violence, including against members of rival gangs.

In connection with his plea, Argueta admitted that from 2009 until at least 2012, he was a member and leader of the Peajes Locos Salvatrucha clique of MS-13, and that he and members of the Peajes and other MS-13 cliques committed crimes to further the interests of the gang, including murder, assault, robbery, extortion by threat of violence, obstruction of justice, witness tampering and witness retaliation.

Argueta admitted that on Jan. 3, 2010, he and other MS-13 members attempted to kidnap and assault two individuals with various weapons because Argueta and his co-conspirators believed one of the individuals was associating with a rival gang. After the individuals fled in different directions, several MS-13 members caught one of the victims and sexually assaulted her as retribution for associating with a rival gang.

In addition, according to the plea agreement, on Jan. 13, 2011, Argueta attended a Peajes clique meeting during which another MS-13 member criticized members of the clique for not committing enough violent crimes and encouraging clique members to target rival gang members with acts of violence. After the meeting, Argueta and other MS-13 members strangled and stabbed an individual whom the clique members believed to be a member of a rival gang. Although the MS-13 members left the victim for dead, he survived.

Argueta also admitted that between March and November 2011, he and other members of the Peajes clique extorted a former MS-13 associate under the threat of a “greenlight” (an order to kill). Argueta admitted that he ordered other MS-13 associates to relay the death threats to the victim, and he contacted the victim himself on multiple occasions to arrange extortion payments.

According to admissions made in connection with his plea, between September and November 2011, Argueta conspired to kill an individual who had been assaulted by Argueta and other MS-13 members and who had agreed to testify as a witness against Argueta in state court. Specifically, Argueta admitted that, while incarcerated in the Prince George’s County Corrections Facility, he ordered the “greenlight” by contacting a co-conspirator who then relayed the instruction to other MS-13 members. On Nov. 15, 2011, three MS-13 members drove to the victim/witness’ home, and one of the co-conspirators shot at the victim from a moving vehicle, striking the victim in the chest. The victim survived.

To date, five of the 14 defendants charged in this case have pleaded guilty to participating in the racketeering conspiracy.

The case is being investigated by HSI Baltimore, the Prince George’s County and Montgomery County Police Departments, the Prince George’s County State’s Attorney’s Office, the Takoma Park Police Department and the Montgomery County State’s Attorney’s Office. The Prince George’s County Sheriff’s Office, HSI Baltimore’s Operation Community Shield Task Force and the Maryland Department of Corrections Intelligence Unit also provided assistance.

The case is being prosecuted by Trial Attorney Kevin L. Rosenberg of the Criminal Division’s Organized Crime and Gang Section and Assistant U.S. Attorneys William D. Moomau and Lindsay Eyler Kaplan of the District of Maryland. ***

Yes, there is more.

Former Baltimore prosecutor: Marilyn Mosby has a role in city’s violence increase 
It is only August, and Baltimore is staring at 200 dead men, women and children. Having been a prosecutor in this city for 12 years, four in the Homicide Division, I can no longer stand idly by and watch State’s Attorney Marilyn Mosby avoid taking responsibility for her role in the increase in violence.

The most recent example of her questionable leadership is her decision to restrict the Homicide Review Commission to closed cases that occurred before she became state’s attorney. She claims the program is a waste of money, places witnesses in jeopardy and is pointless because she knows the reason for the increase in violence is drugs.

When I was involved in the commission in its early stages, organizers asked us to send one prosecutor, for one afternoon, once a month. It did not cost the state’s attorney’s office anything except time. Coming off the deadliest month in decades –— deadliest in our history per capita — is now really the time to be turning down free help? More to the story here.

Russia’s Silent Effective War Against the United States

There is no country that is better with propaganda tactics than Russia and they are in use today. The measure of the costs related to Russia’s tactics especially when it comes to the internet is not measurable.

This silent war is noticed even by Secretary of State John Kerry when he declared he was certain that both China and Russia have access or have read his emails. So why no declaration of war or prosecution of espionage?

***

A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say.

The records, discovered by Hold Security, a firm in Milwaukee, include confidential material gathered from 420,000 websites, including household names, and small Internet sites. Hold Security has a history of uncovering significant hacks, including the theft last year of tens of millions of records from Adobe Systems. More details here.

***

Exclusive: Russian antivirus firm faked malware to harm rivals – Ex-employees

Reuters: Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as malicious, according to two former employees.

They said the secret campaign targeted Microsoft Corp (MSFT.O), AVG Technologies NV (AVG.N), Avast Software and other rivals, fooling some of them into deleting or disabling important files on their customers’ PCs.

Some of the attacks were ordered by Kaspersky Lab’s co-founder, Eugene Kaspersky, in part to retaliate against smaller rivals that he felt were aping his software instead of developing their own technology, they said.

“Eugene considered this stealing,” said one of the former employees. Both sources requested anonymity and said they were among a small group of people who knew about the operation.

Kaspersky Lab strongly denied that it had tricked competitors into categorizing clean files as malicious, so-called false positives.

“Our company has never conducted any secret campaign to trick competitors into generating false positives to damage their market standing,” Kaspersky said in a statement to Reuters. “Such actions are unethical, dishonest and their legality is at least questionable.”

Executives at Microsoft, AVG and Avast previously told Reuters that unknown parties had tried to induce false positives in recent years. When contacted this week, they had no comment on the allegation that Kaspersky Lab had targeted them.

The Russian company is one of the most popular antivirus software makers, boasting 400 million users and 270,000 corporate clients. Kaspersky has won wide respect in the industry for its research on sophisticated Western spying programs and the Stuxnet computer worm that sabotaged Iran’s nuclear program in 2009 and 2010.

The two former Kaspersky Lab employees said the desire to build market share also factored into Kaspersky’s selection of competitors to sabotage.

“It was decided to provide some problems” for rivals, said one ex-employee. “It is not only damaging for a competing company but also damaging for users’ computers.”

The former Kaspersky employees said company researchers were assigned to work for weeks or months at a time on the sabotage projects.

Their chief task was to reverse-engineer competitors’ virus detection software to figure out how to fool them into flagging good files as malicious, the former employees said.

The opportunity for such trickery has increased over the past decade and a half as the soaring number of harmful computer programs have prompted security companies to share more information with each other, industry experts said. They licensed each other’s virus-detection engines, swapped samples of malware, and sent suspicious files to third-party aggregators such as Google Inc’s (GOOGL.O) VirusTotal.

By sharing all this data, security companies could more quickly identify new viruses and other malicious content. But the collaboration also allowed companies to borrow heavily from each other’s work instead of finding bad files on their own.

Kaspersky Lab in 2010 complained openly about copycats, calling for greater respect for intellectual property as data-sharing became more prevalent.

In an effort to prove that other companies were ripping off its work, Kaspersky said it ran an experiment: It created 10 harmless files and told VirusTotal that it regarded them as malicious. VirusTotal aggregates information on suspicious files and shares them with security companies.

Within a week and a half, all 10 files were declared dangerous by as many as 14 security companies that had blindly followed Kaspersky’s lead, according to a media presentation given by senior Kaspersky analyst Magnus Kalkuhl in Moscow in January 2010.

When Kaspersky’s complaints did not lead to significant change, the former employees said, it stepped up the sabotage.

INJECTING BAD CODE

In one technique, Kaspersky’s engineers would take an important piece of software commonly found in PCs and inject bad code into it so that the file looked like it was infected, the ex-employees said. They would send the doctored file anonymously to VirusTotal.

Then, when competitors ran this doctored file through their virus detection engines, the file would be flagged as potentially malicious. If the doctored file looked close enough to the original, Kaspersky could fool rival companies into thinking the clean file was problematic as well.

VirusTotal had no immediate comment.

In its response to written questions from Reuters, Kaspersky denied using this technique. It said it too had been a victim of such an attack in November 2012, when an “unknown third party” manipulated Kaspersky into misclassifying files from Tencent (0700.HK), Mail.ru (MAILRq.L) and the Steam gaming platform as malicious.

The extent of the damage from such attacks is hard to assess because antivirus software can throw off false positives for a variety of reasons, and many incidents get caught after a small number of customers are affected, security executives said.

The former Kaspersky employees said Microsoft was one of the rivals that were targeted because many smaller security companies followed the Redmond, Washington-based company’s lead in detecting malicious files. They declined to give a detailed account of any specific attack.

Microsoft’s antimalware research director, Dennis Batchelder, told Reuters in April that he recalled a time in March 2013 when many customers called to complain that a printer code had been deemed dangerous by its antivirus program and placed in “quarantine.”

Batchelder said it took him roughly six hours to figure out that the printer code looked a lot like another piece of code that Microsoft had previously ruled malicious. Someone had taken a legitimate file and jammed a wad of bad code into it, he said. Because the normal printer code looked so much like the altered code, the antivirus program quarantined that as well.

Over the next few months, Batchelder’s team found hundreds, and eventually thousands, of good files that had been altered to look bad. Batchelder told his staff not to try to identify the culprit.

“It doesn’t really matter who it was,” he said. “All of us in the industry had a vulnerability, in that our systems were based on trust. We wanted to get that fixed.”

In a subsequent interview on Wednesday, Batchelder declined to comment on any role Kaspersky may have played in the 2013 printer code problems or any other attacks. Reuters has no evidence linking Kaspersky to the printer code attack.

As word spread in the security industry about the induced false positives found by Microsoft, other companies said they tried to figure out what went wrong in their own systems and what to do differently, but no one identified those responsible.

At Avast, a largely free antivirus software maker with the biggest market share in many European and South American countries, employees found a large range of doctored network drivers, duplicated for different language versions.

Avast Chief Operating Officer Ondrej Vlcek told Reuters in April that he suspected the offenders were well-equipped malware writers and “wanted to have some fun” at the industry’s expense. He did not respond to a request on Thursday for comment on the allegation that Kaspersky had induced false positives.

WAVES OF ATTACKS

The former employees said Kaspersky Lab manipulated false positives off and on for more than 10 years, with the peak period between 2009 and 2013.

It is not clear if the attacks have ended, though security executives say false positives are much less of a problem today.

That is in part because security companies have grown less likely to accept a competitor’s determinations as gospel and are spending more to weed out false positives.

AVG’s former chief technology officer, Yuval Ben-Itzhak, said the company suffered from troves of bad samples that stopped after it set up special filters to screen for them and improved its detection engine.

“There were several waves of these samples, usually four times per year. This crippled-sample generation lasted for about four years. The last wave was received at the beginning of the year 2013,” he told Reuters in April.

AVG’s chief strategy officer, Todd Simpson, declined to comment on Wednesday.

Kaspersky said it had also improved its algorithms to defend against false virus samples. It added that it believed no antivirus company conducted the attacks “as it would have a very bad effect on the whole industry.”

“Although the security market is very competitive, trusted threat-data exchange is definitely part of the overall security of the entire IT ecosystem, and this exchange must not be compromised or corrupted,” Kaspersky said.