Cyberwar, Deeper Truth on China’s Unit 61398

The NSA has been hacking China for years, so it is a cyberwar. What the United States cyber experts have known at least since 2009 spells out that there has been no strategy to combat cyber intrusions much less a declaration that these hacks are an act of war.

The NSA Has A Secret Group Called ‘TAO’ That’s Been Hacking China For 15 Years

China hacking charges: the Chinese army’s Unit 61398
Operating out of a tower block in Shanghai, Unit 61398 allegedly hacks Western companies in support of the Chinese government’s political and economic aims.

From DarkReading:

According to the DOJ indictment, Huang Zhenyu was hired between 2006 and 2009 or later to do programming work for one of the companies (referred to as “SOE-2” in the indictment). Huang was allegedly tasked with constructing a “secret” database to store intelligence about the iron and steel industry, as well as information about US companies.

“Chinese firms hired the same PLA Unit where the defendants worked to provide information technology services,” according to the indictment, which the US Department of Justice unsealed Monday. “For example, one SOE involved in trade litigation against some of the American victims herein hired the Unit, and one of the co-conspirators charged herein, to hold a ‘secret’ database to hold corporate ‘intelligence.'”

The for-hire database project sheds some light on the operations of China’s most prolific hacking unit, Unit 61398 of the Third Department of China’s People’s Liberation Army (also known as APT1), where the alleged hackers work. US Attorney General Eric Holder announced an unprecedented move Monday: The Justice Department had indicted the five men with the military unit for allegedly hacking and stealing trade secrets of major American steel, solar energy, and other manufacturing companies, including Alcoa, Allegheny Technologies Inc., SolarWorld AG, Westinghouse Electric, and US Steel, as well as the United Steel Workers Union.

It has never been a secret, it has only been a topic debated with no resolutions behind closed doors. China has a database on Americans and is filling it with higher details, growing their intelligence on everything America.

China has launched a strategic plan when one examines the order of hacks of American companies, the timing and the data. A full report was published on Unit 61398.

New York Times report

Hacked in the U.S.A.: China’s Not-So-Hidden Infiltration Op

From Bloomberg: The vast cyber-attack in Washington began with, of all things, travel reservations.

More than two years ago, troves of personal data were stolen from U.S. travel companies. Hackers subsequently made off with health records at big insurance companies and infiltrated federal computers where they stole personnel records on 21.5 million people — in what apparently is the largest such theft of U.S. government records in history.

Those individual attacks, once believed to be unconnected, now appear to be part of a coordinated campaign by Chinese hackers to collect sensitive details on key people that went on far longer — and burrowed far deeper — than initially thought.

 

But time and again, U.S. authorities missed clues connecting one incident to the next. Interviews with federal investigators and cybersecurity experts paint a troubling portrait of what many are calling a serious failure of U.S. intelligence agencies to spot the pattern or warn potential victims. Moreover, the problems in Washington add new urgency to calls for vigilance in the private sector.

In revealing the scope of stolen government data on Thursday, Obama administration officials declined to identify a perpetrator. Investigators say the Chinese government was almost certainly behind the effort, an allegation China has vehemently denied.

‘Facebook of Intelligence’

Some investigators suspect the attacks were part of a sweeping campaign to create a database on Americans that could be used to obtain commercial and government secrets.

“China is building the Facebook of human intelligence capabilities,” said Adam Meyers, vice president of intelligence for cybersecurity company CrowdStrike Inc. “This appears to be a real maturity in the way they are using cyber to enable broader intelligence goals.”

The most serious breach of records occurred at the U.S. Office of Personnel Management, where records for every person given a government background check for the past 15 years may have been compromised. The head of the government personnel office, Katherine Archuleta, resigned Friday as lawmakers demanded to know what went wrong.

The campaign began in early 2013 with the travel records, said Laura Galante, manager of threat intelligence for FireEye Inc., a private security company that has been investigating the cyber-attacks.

Stockpiling Records

By mid-2014, it became clear that the hackers were stockpiling health records, Social Security numbers and other personal information on Americans -– a departure from the country’s traditional espionage operations focusing on the theft of military and civilian technology.

“There was a clear and apparent shift,” said Jordan Berry, an analyst at FireEye.

Recognition came too late for many of the victims. Vendors of security devices say health-care companies are spending tens of millions of dollars this year to upgrade their computer systems but much of the data is already gone.

U.S. intelligence agencies were collecting information on the theft of personal data but failed to understand the scope and potential damage from the aggressive Chinese operation, according to one person familiar with the government assessment of what went wrong.

In the last two years, much of the attention of U.S. national security agencies was focused on defending against cyber-attacks aimed at disrupting critical infrastructure like power grids.

 

Iran Deal, Deviled Details and $300 Billion

Both sides are saying the others are throwing sand in the gears to publishing a final document of the Joint Plan of Action with Iran and the P5+1.

In part from FarsNews: “We have reached a stage now that the other side should decide if it is seeking an agreement or pressure; we have said many times that agreement and pressure cannot come together and one of them should be chosen,” Zarif told reporters in Vienna.

He reiterated that if the other side shows political will and inclination for a balanced and good deal it will be achievable.

Zarif, however, said that unfortunately the other side is showing change in stances and raising excessive demands which make the conditions difficult, adding, “We are doing our best as Supreme Leader (of the Islamic Revolution Ayatollah Seyed Ali Khamenei) and other Iranian officials have said many times we are looking for a good deal and we will continue the negotiations; we have never left the negotiations and we will not in future.”

The Geneva interim deal envisaged the removal of all the UN and unilateral US and EU sanctions against Iran under a final comprehensive deal.

Also, in a framework agreement approved by the six powers and Iran in April known as the Lausanne Statement, the seven nations agreed that a final deal would include removal of all sanctions as well as a UN Security Council resolution which would call all the five UNSC sanctions resolutions imposed against Iran’s nuclear activities as “null and void”.

The first two UNSC resolutions boycotted export of military, specially missile, hardware and software to Iran, a sanction that – along with all the other embargoes imposed against Iran under the five UNSC resolutions – would be automatically removed under the new UNSC resolution that, according to the Lausanne framework agreement, should be issued on the same day that the final deal is endorsed.

Hence, the debate over the removal of the UN Security Council arms embargoes against Iran means US defiance of both agreements.

From the WSJ: If no deal is reached by Monday night, the two sides must again agree to extend the terms of their November 2013 interim nuclear deal or risk seeing two years of high-stakes diplomacy unravel. That accord offered modest sanctions relief for Iran in exchange for Tehran freezing parts of its nuclear program.

Among the final issues to be resolved are disagreements about the timing and sequencing of sanctions relief for Iran and the continuation of a ban on sales of arms and ballistic-missile parts to Iran. Officials have also been toiling over the text of a new U.N. Security Council resolution that would keep some restrictions on Iran and outline steps the country would take to detail its past nuclear activities.

One European official said Sunday there was “no way” negotiations could continue beyond Monday.

“Everything can fail still, but we are really near the end,” said a German official late Sunday. “With the willingness of Tehran to take the final steps, it could now go quickly. We are ready to negotiate all night.”

The matter of lifting sanctions, suspending other over 15 years funds future terrorism by infusing Iran with $300 billion.

From Foreign Policy Magazine: Barack Obama’s administration and the other parties to the interim nuclear deal with Iran now seem to be saying they are willing to release to Iran between a third and a half a trillion dollars over the next 15 years in order for Iran not to give up the program, but to freeze it. In other words, we are not restoring Iran’s assets and income sources in exchange for permanently and irreversibly accepting international standards; we are just renting the country’s restraint, offering it access to hundreds of billions of dollars to make any future nuclear program development the problem of the next U.S. president — or the one after that.

The problem is compounded by the fact that Iran’s nuclear program is not viewed by its neighbors as the main threat the country poses. A systematic, 35-year campaign of regional meddling, destabilization, and extension of Iranian influence is seen as a much bigger issue. And restoring cash flows and assets to Iran, as well as giving the country greater international standing, clearly exacerbates that threat. It gives Tehran the wherewithal to continue to underwrite terrorists like Hezbollah and Hamas, prop up dictators like Syria’s Bashar al-Assad, and buy ever greater influence in places like Iraq and Yemen.

The consequences of Iran’s regional strategy were on display this week in Washington when Iraqi Prime Minister Haider al-Abadi essentially read from Iranian talking points when addressing the conflict in Yemen. He took a stance against Saudi intervention to stop Iranian-backed Houthis, suggested Iran’s role in Yemen was overstated, and even went so far as to suggest Obama had told him that he was not supportive of the Saudis. The White House immediately denied the last accusation but can’t have been too happy with the rest of the statement that came from the leader of a country the United States had spent hundreds of billions to “liberate.”

 

Numbers Even Backdoor to Front-door entry into U.S.

There are almost 20 different visa applications forms, each for unique circumstances to enter into the United States. Some are easier and more likely used than others for fast processing and requiring less background investigations.

The State Department outsources the processing of visas and in some visa classifications there are annual quotas that can be finessed by waivers and or exemptions.  There are even legal cottage industry members that handle the complex legal process with enough money, they know how to skirt the process and hasten the approval process.

Now, that these people have front-door entry, who are they and what happens if they overstay the visa time limit? Short answer is not much.

In March of 2012, John Cohen, the Deputy Counter-terrorism Coordinator for DHS provided written testimony to the House Sub-committee on DHS which fully explains the convoluted process and lack of resources.  In the same hearing, Peter T. Edge, Deputy Executive Associate Director of DHS Investigations for ICE offered his written testimony on the scope of fraud of the visa program. This was in response to Amine el-Khalifi, an individual who allegedly attempted to conduct a suicide attack at the U.S. Capitol, is not the first time terrorists have exploited the visa process.  In fact, el-Khalifi follows a long line of terrorists, including several of the 9/11 hijackers, who overstayed their visa and went on to conduct terror attacks.

Of particular note, the Visa Security program of 2002 is the basis of law today and reads in part from 2012 statistics:

The Visa Security Program
The Homeland Security Act of 2002 directs the Department of Homeland Security (DHS) to assist in the identification of visa applicants who seek to enter the United States for illegitimate purposes, including criminal offenses and terrorism-related activities. The visa adjudication process often presents the first opportunity to assess whether a potential nonimmigrant visitor or immigrant poses a threat to the United States. The Visa Security Program (VSP) is one of several ICE programs focused on minimizing global risks.
Through the Visa Security Program (VSP), ICE deploys trained special agents overseas to high-risk visa activity posts in order to identify potential terrorist and criminal threats before they reach the United States. ICE special agents conduct targeted, in-depth reviews of individual visa applications and applicants prior to issuance, and recommend to consular officers refusal or revocation of applications when warranted. DHS actions complement the consular officers’ initial screenings, applicant interviews, and reviews of applications and supporting documentation.
ICE now conducts visa security investigations at 19 high-risk visa adjudication posts in 15 countries. In FY 2012 to date, VSP has screened 452,352 visa applicants and, in collaboration with DOS colleagues, determined that 121,139 required further review. Following the review of these 121,139 applications, ICE identified derogatory information on more than 4,777 applicants.

In 2012: The Obama administration doesn’t consider deporting people whose only offense is overstaying a visa a priority. It has focused immigration enforcement efforts on people who have committed serious crimes or are considered a threat to public or national security.

A House Homeland Security subcommittee is conducting an oversight hearing Tuesday. The panel’s chairwoman, Rep. Candice Miller, R-Mich., said El Khalifi “follows a long line of terrorists, including several of the 9/11 hijackers, who overstayed their visa and went on to conduct terror attacks.” His tourist visa expired the same year he arrived from his native Morocco as a teenager in 1999.

Going back to 2006, it was stated: “Many immigrants who are in the United States illegally never jumped a fence, hiked through the desert or paid anyone to help them sneak into the country. According to a recent study, 45 percent of illegal immigrants came here on a legal visa, and then overstayed that visa.” For the audio interview and Pew Research summary report, click here.

In closing, the LA Times proves the process on visa overstays with a few key cases.

* Laura Lopez first came to the U.S. at 15. She had joined a group of students from Guatemala who were visiting Orange County.

She remembers her first trip to Disneyland, eating at Taco Bell and strolling through the streets of downtown Santa Ana, with its impressive red sandstone courthouse.

“I felt so much energy,” said Lopez, now 30. “I looked around and saw that courthouse, and it was like something that spoke about freedom. I just didn’t want to leave.”

Lopez returned to Santa Ana two years later on a tourist visa. This time, she never left.

*Billy Lee came to California from South Korea with his mother when he was 5. Their trip included exploring Hollywood and spending time with relatives. “They told my mother they had great jobs, great schools — that this was a wonderful, open place to live and that we should take a risk and copy them,” said Lee, now 31.

So they stayed.

“Homeland Security Department officials estimate that up to 40% of the roughly 11 million people in the U.S. illegally arrived this way.  Jorge-Mario Cabrera, spokesman for the Coalition for Humane Immigrant Rights of Los Angeles. “It happens all the time.”

Yet, he said, no system exists “to follow up on what these folks do once they’re in the States. There’s no process by which officials can track if someone stayed the proper amount of time or beyond that.” For more cases covered by the LA Times, click here.

In the Obama administration, nobody knows anything or for that matter really investigates or reports the numbers.

Nobody is sure how many people are in the U.S. on expired visas.

A long-standing problem in immigration enforcement — identifying foreigners who fail to go home when their visas expire — is emerging as a key question as senators and President Barack Obama chart an overhaul of immigration law. The Senate is discussing an overhaul that would require the government to track foreigners who overstay their visas. The problem is the U.S. currently doesn’t have a reliable system for doing this.

The Center for Immigration Studies is the best source for visa overstays, yet few listen.

The General Accountability Offices does offer some insight that is useful.

Lastly, the piece parts are offered here from a 2013 hearing.

Written testimony of ICE Homeland Security Investigations Executive Associate Director James Dinkins, CBP Office of Field Operations Acting Deputy Assistant Commissioner John Wagner, and NPPD Office of Biometric Identity Management Deputy Director Shonnie Lyon for a House Committee on Homeland Security, Subcommittee on Border and Maritime Security hearing titled “Visa Security and Overstays: How Secure is America?”

In closing, the system is broken simply due to lack of will, enforcement and resources. Adjustments do need to be made especially when it comes to ‘visa waiver companies and countries, which should both be terminated.

 

 

 

Sinaloa Leader Escape Prison, 2nd Time Fast and Furious

From testimony, reported by The Blaze: A high-ranking Mexican drug cartel operative currently in U.S. custody is making startling allegations that the failed federal gun-walking operation known as “Fast and Furious” isn’t what you think it is.

It wasn’t about tracking guns, it was about supplying them — all part of an elaborate agreement between the U.S. government and Mexico’s powerful Sinaloa Cartel to take down rival cartels.

The explosive allegations are being made by Jesus Vicente Zambada-Niebla, known as the Sinaloa Cartel’s “logistics coordinator.” He was extradited to the Chicago last year to face federal drug charges.  More here.

The DEA went rogue and made a deal with the Sinaloa cartel to rat out other rival cartels to stem the violence in Mexico. Court testimony is found here.

From the BusinessInsider: Sinaloa, led by Joaquin “El Chapo” Guzman, supplies 80% of the drugs entering the Chicago area and has a presence in cities across the U.S.
Suspected Mexican drug trafficker Vicente Zambada-Niebla

 

Mexico’s president Nieto said Guzman will never escape again, yet today it is reported that El Chapo Guzman did just that through a tunnel in his cell bathroom. Nieto was in route to a visit to France as this escaped occurred.

NBC left out a few details but here is some background on El Chapo

Who Is ‘El Chapo?’: A Look at the Master of the Underground Tunnel

He’s known as “Shorty,” but perhaps “The Mole” would be more accurate.

That’s because Joaquin “El Chapo” Guzman lives by his underground tunnels, frustrating all those who try to catch him.

The secretive and barely literate Mexican drug lord oversaw the explosion of subterranean networks used to smuggle massive amounts of narcotics across the U.S. border. After escaping prison in a laundry cart in 2001, the head of the Sinaloa cartel outfitted many his safe houses with secret doors that opened to tunnels leading to municipal sewer systems. He used one of them, accessed through the bottom of a bathtub, to escape authorities in February 2014.

Guzman was caught a few days later, an arrest that was hailed as a major victory in the international war on drugs. He ended up in a maximum security federal prison in southern Mexico, where he began plotting another underground escape.

 

On Saturday, he disappeared underneath the prison through an elaborate tunnel that must have taken months to build. Equipped with ventilation ducts, stairs and a motorbike on rails, the tunnel was about the same height as Guzman, who stands 5 feet 8 inches tall, and ran for 1,600 yards, emerging in a house under construction in a nearby neighborhood.

Guzman, believed to be about 60, has made a living of dodging death and evading capture while building the multibillion-dollar Sinaloa cartel into the world’s most powerful — and ruthless — drug trafficking organization. Tales of his avoiding bullets and handcuffs burnished a legend that is chronicled in folk song. Young people in his impoverished home state rally in support of him, despite his being responsible for the murders of thousands of Mexicans, including police officers and innocent civilians.

The son of a poor farmer, Guzman was born in Sinaloa and entered the local drug economy in the 1970s, after dropping out of school. He rose gradually within the Sinaloa cartel, and in the early 1990s took control.

In 1993, Guzman was arrested in Guatemala, and extradited to Mexico, where he was put in a maximum security prison. He continued to run the organization behind bars while maintaining a comfortable lifestyle, surrounded by associates and paid-off guards. In January 2001, some of them helped him slip out of the prison while hidden in a laundry cart.

As one of the world’s most sought-after fugitives, Guzman amassed even more power, taking over trade routes in South America and across the globe. He protected himself within a network of loyal workers, paid-off informers and corrupt officials. Despite his secrecy, however, Guzman enjoyed living the high life, including lavish dinners and a coterie of mistresses and prostitutes. He’s reportedly been married multiple times, his current wife being a former teenage beauty queen with American citizenship.

In addition to being wanted for his original 20-year prison sentence, Guzman is under federal indictment for drug trafficking in San Diego, Brooklyn, N.Y., El Paso, Miami and Chicago, which named him the city'[s first “public enemy No. 1” since Al Capone. The DEA announced a $5 million reward for his capture in 2005.

“The U.S. government stands ready to work with our Mexican partners to provide any assistance that may help support his swift recapture,” Attorney General Loretta Lynch said in a statement Sunday after his escape.

As his power grew, Guzman relied on increasingly ingenious tactics to stay ahead of authorities. That included the use of trains, submarines, and tunnels.

By several accounts, including an examination by The New Yorker, Guzman helped invent the drug tunnel, commissioning his personal architect, Felipe de Jesus Corona-Verbera, to design several that burrowed beneath the U.S. border and emerged in warehouses on the other side. Together, they built dozens, some equipped with mini rail cars.

For years, American investigators tracked Guzman through wiretaps, and fed that information to Mexican officials. But Guzman always slipped their grasp at the last minute, including the Feburary 2014 escape from a home in the Sinaloan town of Culiacan. But authorities tracked him to another home, where they arrested him a few days later.

At the time, authorities boasted that the arrest was a milestone in the cross-border drug war. Then-U.S. Attorney General Eric Holder called Guzman’s capture “a landmark achievement, and a victory for the citizens of both Mexico and the United States.”

Federal prosecutors in several cities said they wanted to have Guzman extradited to the United States to stand trial. But Mexican officials said they were confident they could keep him imprisoned at home.

Now, he’s gone. Again.

 

IRS Mafia Tactics Proven in Wisconsin Against Gov. Walker

It begins with something in Wisconsin called the ‘Wisconsin Government Accountability Board’….what is in a name after all. How bad can it be?

Fire all of them and then prosecute all of them.

Alright, start here with the lawsuit against GAB and Kevin Kennedy.

From The Watchdog:  Kevin Kennedy, the director of Wisconsin’s speech regulator integrally tied to the probe into dozens of conservative organizations, is a longtime “professional friend” of former IRS tax-exempt director Lois Lerner.

Lerner led the Obama administration’s IRS division accused of targeting conservative groups seeking 501(c)(4) nonprofit status. The Senate Finance Committee is looking into more than 6,000 emails from Lerner once thought to be lost.

The Wall Street Journal opinion piece published Thursday and headlined “Wisconsin’s friend at the IRS” reveals that Lerner and Wisconsin Government Accountability Board’s Kennedy were in contact between 2011 and 2013 — when the GAB assisted partisan prosecutors in investigating scores of conservatives and in raiding several of their homes.

“Emails we’ve seen show that between 2011 and 2013 the two were in contact on multiple occasions, sharing articles on topics including greater donor disclosure and Wisconsin’s recall elections,” the op-ed notes.

“The emails indicate the two were also personal friends who met for dinner and kept in professional touch. ‘Are you available for the 25th?’ Ms. Lerner wrote in January 2012. ‘If so, perhaps we could work two nights in a row.’”

Kennedy’s GAB is Wisconsin’s political speech regulator. It oversees elections, campaign finance and lobbying laws.

It is also the subject of a state lawsuit that claims the agency manipulated state campaign finance laws and regulations in advising Democrat Milwaukee County District Attorney John Chisholm, his assistants and other prosecutors in their political probe.

The multi-year, multi-county investigation included pre-dawn, paramilitary-style raids at the homes of John Doe targets, including a raid that, according to a recent story in National Review, victimized a 16-year-old boy who was home alone at the time.

As Wisconsin Watchdog has reported, John Doe prosecutors conducted an extensive spying operation on conservatives described by one target as worse than the National Security Agency’s domestic surveillance program. Affidavits reviewed by Wisconsin Watchdog show prosecutors seeking and receiving warrants and subpoenas to tap into conservatives’ Internet service providers, some of whom still don’t know they were targets of the investigation.

The probe followed the partisan recall campaigns by unions and the Democratic Party of Wisconsin against Republican Gov. Scott Walker and several state senators. Walker and most of the senators survived.

But the secret John Doe investigation would drag Walker and his conservative allies through the political mud for years to come, thanks to many, many leaks.

AP file photo

POLITICAL SPEECH COP: Kevin Kennedy and the GAB are the subject of a state lawsuit alleging the agency manipulated campaign finance laws in an abusive investigation at taxpayers expense. Sources say top GAB officials have been deposed in the lawsuit.

Prosecutors confiscated more than 3 million records — a conservative count in a Wisconsin Watchdog analysis — of targets. The investigation has been based on the idea the groups illegally coordinated with Walker’s campaign during the recall campaigns. Multiple courts have rejected that theory, including the John Doe presiding judge, who tossed out several subpoenas because they had failed to show evidence a campaign finance crime had been committed.

While all of this was going on, the IRS was increasing its harassment of conservative nonprofits.

The Wall Street Journal reports that Lerner’s lawyer declined to comment. Kennedy, in an email, told the newspaper “Ms. Lerner is a professional friend who I have known for 20 years.” He declined to say more.

The opinion piece notes:

“In an email exchange in July 2011, Mr. Kennedy sent Ms. Lerner an article in the Racine Journal-Times on the declining relevance of public campaign financing amid more private and ‘special interest’ money. ‘Note the last paragraph where the paper supports more transparency,’ Mr. Kennedy writes to Ms. Lerner. ‘The Legislature has killed our corporate disclosure rules.’”

John Doe investigators asked the IRS to look into a conservative group that was a primary target of the probe, sources told the Journal.

“The IRS doesn’t appear to have followed up, but the request shows Wisconsin prosecutors saw their pursuit of independent groups as part of a common agenda with national Democrats,” the op-ed states.

That’s the point, the Wall Street Journal contends. John Doe transcends Wisconsin, with interconnections revealing “the use of tax and campaign laws to limit political speech was part of a larger and systematic Democratic campaign.”

President Obama laid it all out at the University of Wisconsin-Madison in 2010 when he blasted the U.S. Supreme Court’s Citizens United decision.

“Thanks to a recent Supreme Court decision, (Republicans) are being helped along this year, as I said, by special interest groups that are allowed to spend unlimited amounts of money on attack ads. They don’t even have to disclose who’s behind the ads,” Obama said.

“Conservative nonprofits like the Wisconsin Club for Growth and Wisconsin Manufacturers and Commerce were later subpoenaed and bound by secrecy orders as their fundraising all but ceased,” the opinion piece notes.

“Liberals worked together to turn the IRS and the GAB into partisan political weapons.”

Earlier this week, Judicial Watch reported that newly discovered Department of Justice and IRS documents show there was “an October 2010 meeting between Lois Lerner, DOJ officials and the FBI to plan for the possible criminal prosecution of targeted nonprofit organizations for alleged illegal political activity.”

Eric O’Keefe, director of the Wisconsin Club for Growth, told Wisconsin Watchdog the Wall Street Journal has “exposed a whole new dimension of government abuse.”

“The permanent government does not believe that we, the people, are capable of governing ourselves. They want to control everything,” said O’Keefe, who is suing the GAB for its costly investigation.

Part 217 of 218 in the series Wisconsin’s Secret War

Many more details here. Consider: collusion, fraud, RICO, financial terror, targeting, who gave the orders and where it all leads. Imagine that the IRS got with the FBI and the DoJ to investigate and prosecute conservatives too. These are White House mafia tactics…..there is no dispute.