Core of Hillary FBI Investigation, Wilful Drone Discussions

Emails in Clinton probe dealt with planned drone strikes: WSJ

Reuters/WSJ: Emails between U.S. diplomats in Islamabad and State Department officials in Washington about whether to challenge specific U.S. drone strikes in Pakistan are at the center of a criminal probe involving Hillary Clinton’s handling of classified information, the Wall Street Journal reported on Thursday.

The 2011 and 2012 emails were sent via the “low side” -government slang for a computer system for unclassified matters – as part of a secret arrangement that gave the State Department more of a voice in whether a CIA drone strike went ahead, according to congressional and law enforcement officials briefed on the FBI probe, the Journal said.

Some of the emails were then forwarded by Clinton’s aides to her personal email account, which routed them to a server she kept at her home in suburban New York when she was secretary of state, the officials said, according to the newspaper.

Investigators have raised concerns that Clinton’s personal server was less secure than State Department systems, and a recent report by the State Department inspector general found that Clinton had broken government rules by using a private email server without approval, undermining Clinton’s earlier defenses of her emails.

The still-secret emails are a key part of the FBI investigation that has long dogged Clinton’s presidential campaign, the officials told the Journal. Clinton this week clinched the Democratic presidential nomination for the Nov. 8 election.

The vaguely worded messages did not mention the “CIA,” “drones” or details about the militant targets, officials said, according to the Journal.

The emails were written within the often-narrow time frame in which State Department officials had to decide whether or not to object to drone strikes before the CIA pulled the trigger, the officials said, according to the newspaper.

Law enforcement and intelligence officials said State Department deliberations about the covert CIA drone program should have been conducted over a more secure government computer system designed to handle classified information, the Journal reported.

Context at the time:

Pakistan UAV attacks have become one of the Obama administration’s signature efforts in the terror war. Although the CIA does not divulge how many drones it operates, press reports suggest the agency has as many as 16 such systems. But in the early days of his presidency, Barack Obama was advised by at least two former high-ranking CIA officers not to over-rely on the use of drones.

Former CIA analyst Bruce Riedel, commissioned by the president to review US policy on Afghanistan and Pakistan, concluded that robot airplanes could only function successfully when allied to high-quality “on the ground” intelligence.

That view was shared by General Michael Hayden, CIA director at the start of the Obama presidency. In his book Obama’s Wars, Bob Woodward recounts how Hayden believed that “The great lesson of World War II and Vietnam was that attack from the air, even massive bombings, can’t win a war.”

Noah Shachtman, contributing editor of Wired.com, warns that the lesson of not having troops on the ground could be over-learned: “The idea that any terrorist problem could be solved by drones alone just isn’t realistic. Drones are only as effective as the human informants who tell them where to strike.” For him, a drones-only policy could become “a way of maintaining political cover and a veil of secrecy over operations that might ordinarily be wide open”. More here.

**** Additionally for later context:

NPR: In 2013, President Obama tightened rules for drone strikes in order to reduce civilian casualties. NPR’s Audie Cornish talks to Wall Street Journal correspondent Adam Entous who learned that the president secretly waived the new rules for CIA operations in Pakistan.

In 2015: The killings revealed last week of two hostages – an American and an Italian – have raised new questions about how the CIA operates in Pakistan. Warren Weinstein and Giovanni La Porto were aid workers. They were killed in January by a U.S. drone strike aimed at al-Qaida militants. The Wall Street Journal reports the CIA conducted that strike under a secret waiver approved by President Obama in 2013. Obama laid it out in a speech at National Defense University in 2013. And he didn’t reveal all the rules. The actual guidance that he issued is – remains classified. But he did talk about three of them. He said that operations targeting individuals needed to have near certainty that there would be no civilians killed or injured in those strikes. He also said that the CIA and the Pentagon, when conducting strikes like this, need to know that there is an imminent threat to the United States posed by the militants that they intend on targeting. And another guideline that he laid out was the idea that the United States is not going to kill people in order to punish them for acts that they did in the past. This is about preventing them from attacking the United States or U.S. persons or assets overseas in the future.

Pakistan is important because this is the staging area for al-Qaida and other militant groups that are looking to cross the border into Afghanistan and attack American forces there. Attacking al-Qaida in Pakistan is a way to prevent them from later attacking U.S. forces across the border. So the White House and the president said that there would be a thorough review of this incident in order to ensure that mistakes like this do not happen again. And within this debate within the administration, several members of the president’s inner circle are making the case that now is the time to rein in the program.

But it’s really hard to tell what direction this is going to go in the end because of strong support, not only within the administration for the drone program and wanting to have the flexibility to use it, but also within the Congress. You have very powerful committees, members of the president’s own party, who very much support this program and don’t want to see it go away. Additional information here.

Obama Cool with Giving up Internet Control, But Wait…

Duffy And Cruz Introduce the Protecting Internet Freedom Act

Jun 8, 2016
Press Release
Bill prohibits Obama administration from unilaterally giving away the Internet

WASHINGTON, D.C. – Congressman Sean Duffy (R-WI) Senator Ted Cruz (R-Texas) today introduced the Protecting Internet Freedom Act, which would prevent the Obama administration from giving the Internet away to a global organization that will allow over 160 foreign governments to have increased influence over the management and operation of the Internet.

The bill would ensure the continued protection of Internet freedom by prohibiting the National Telecommunications and Information Administration (NTIA) from allowing the Internet Assigned Numbers Authority (IANA) functions contract to expire, unless specifically authorized by Congress. The Protecting Internet Freedom Act would also ensure that the United States maintains sole ownership of the .gov and .mil top-level domains, which are vital to national security.

Obama administration backs plan to relinquish Internet control

FNC: The Obama administration is getting behind a plan that would have the U.S. government relinquish its last bit of control over the Internet – a move Republican lawmakers are fighting tooth-and-nail.

The transfer was set in motion two years ago when a Commerce Department agency said it would cede oversight over an obscure, but powerful, Los Angeles-based nonprofit called the Internet Corporation for Assigned Names and Numbers (ICANN).

The agency, the National Telecommunications and Information Administration, announced Thursday that the game plan they got back from ICANN – which would hand over the reins to a “multi-stakeholder” group, and not a single government – is now in line with what they want.

“The Internet’s multistakeholder community has risen to the challenge we gave them to develop a transition proposal that would ensure the Internet’s domain name system will continue to operate as seamlessly as it currently does,” NTIA Administrator Lawrence Strickling said in a statement. AFP first reported on the decision.

ICANN manages some of the most important elements of the Internet, including the domain name system and IP addressing. Domains include those tiny suffixes at the end of Internet addresses, like .com and .org; Internet Protocol addresses are the numerical sequences assigned to devices in a network.

Foreign governments had complained about the U.S. oversight, maintained through contracts with ICANN.

Yet the Obama administration has faced stiff resistance to a hand-off for months from vocal critics on Capitol Hill and in the tech community. One concern is that, in the void left by America’s transfer of oversight, other nations that don’t share the United States’ commitment to free speech and expression could make a grab at Internet influence.

On Wednesday, Republican Texas Sen. Cruz and Republican Wisconsin Rep. Sean Duffy introduced legislation to prevent the transfer of functions related to the Internet Domain Name System unless specifically authorized by Congress.

The Protecting Internet Freedom Act also aims to ensure that the U.S. maintains sole ownership of the .gov and .mil top-level domains.

“The Obama administration is months away from deciding whether the United States Government will continue to provide oversight over core functions of the Internet and protect it from authoritarian regimes that view the Internet as a way to increase their influence and suppress freedom of speech,” Cruz said in a statement. “This issue threatens not only our personal liberties, but also our national security. We must act affirmatively to protect the Internet and the amazing engine for economic growth and opportunity the Internet has become, and I urge my colleagues to support this legislation.”

In a press release, the lawmakers suggested the plan would “allow over 160 foreign governments to have increased influence over the management and operation of the Internet.”

Groups supporting the Protecting Internet Freedom Act include Americans for Limited Government, National Religious Broadcasters and Frontiers of Freedom.

Strickling reportedly is not calling his agency’s endorsement of the plan a formal “approval” yet – but if Washington stamps the plan, AFP reported, the U.S. government contract with ICANN would expire at the end of September. The plan reportedly is meant to prevent any single government from taking control and is not predicted to cause major changes for ordinary Internet users.

The push to transfer oversight dates back years.

In a July 2012 speech at an Internet governance forum, Strickling discussed giving the “global Internet community” more of a “direct say” in the process, and he said the Obama administration was making a “concerted effort” to expand international participation.

The latest push to transition oversight began with a 2009 agreement between NTIA and ICANN. The Commerce agency, though, has noted that the goal of completely privatizing the domain name system dates back to 1997, and that the U.S. government reiterated that goal when it partnered with ICANN a year later.

Two years ago, Strickling responded to criticism of the plan by asserting the transfer plan “in no way diminishes our commitment to preserving the Internet as an engine for economic growth and innovation.”

 

DHS Wont Tell us but UK’s GCHQ Does

Terrorist groups acquiring the cyber capability to bring major cities to a standstill, warns GCHQ chief

 

Terrorists and rogue states are gaining the capability to bring a major city to a standstill with the click of a button, the Director of GCHQ has warned.

GCHQ Director Robert HanniganHostile groups are acquiring the capability to launch devastating attacks, warns Hannigan Credit: TELEGRAPH

Telegraph: In a rare public appearance, Robert Hannigan said the risk to cities like London would increase as more physical objects, such as cars and household appliances, are connected online – the so-called “internet of things”.

developing the kind of cyber programmes that could attack the UK, but that terrorist groups were also looking to take advantage of the technology.

“At some stage they will get the capability,” he said.

“There are certainly states and groups with the intent to do it, terrorist groups, for example, who have no threshold when it comes to the loss of life.

“We’re not quite there yet, but as the world becomes ever more connected that will become a greater risk.”

Speaking as the controversial Investigatory Powers Bill passed its third reading in the House of Commons, Mr Hannigan also defended the surveillance of internet activity by the intelligence services, saying seven attacks against the UK had been foiled in the last 18 months due to bulk data analysis.

******
Simple Explanation of Internet of Things

Islamic State issues anti-hacking guidelines after Anonymous threats

The extremist terrorist group Isil sent out a warning to members on how to protect from hackers like Anonymous

The warning was put out via Telegram, an encrypted instant messaging app, on the Khilafah news channel, which is thought to be an unofficial pro-ISIS news source.

This was discovered by researchers at the International Centre for the Study of Radicalisation, a London think tank which studies extremism and terrorism.

Nick Kaderbhai, a research fellow from the think tank told the Huffington Post UK, “Anyone can subscribe to it (technically) however the more IS channels you subscribe to the more open you are to investigation.”

The message was titled #Warning, and said “The #Anonymous hackers have threatened in new video release that they will carry out a major hack operation operation on the Islamic state (idiots).”

ISIS sent out a message on encrypted chat app Telegram with instructions to avoid being hacked  Photo: Huffington Post UK

Instructions included warnings to use VPN, a tool ot make the user’s location online, and to change IP address constantly. It also told members to avoid using direct messages on Twitter, because is is open to hackers.

“Do not make your email same as your username on Twitter this mistake cost many their accounts…so be careful,” it read.

The hacker collective, which consists of unrelated volunteers, coders and activists from around the world, launched its anti-Islamic State online campaign, called #OpISIS, after the Charlie Hebdo massacre in Paris last January.

Making good on its threats, Anonymous posted a list of roughly 800 Facebook, Twitter and email accounts believed to be related to ISIL on Monday.

To date, according to an in-depth investigation by Foreign Policy, they have taken down 149 Islamic State-related websites and exposed 101,000 Twitter accounts and 5900 propaganda videos.

Bill Clinton was a Chancellor of a University eh?

An online university at that and oh…imagine it is has been sued as well.

In 2015, Bill Clinton ended his role with a for-profit college system on Friday, nearly two weeks after his wife, Hillary Rodham Clinton, began her second presidential campaign and singled out that industry for criticism. More here from the New York Times.

  

The Clinton University Problem: Laureate Education Lawsuits Present Problem For Clintons

225px-Laureate_International_Universities_Logo220px-Clinton_and_jiangWhile largely ignored by the media, the Clintons have their own university scandal. Donald Trump has been rightfully criticized and sued over his defunct Trump University. There is ample support for claiming that the Trump University was fraudulent in its advertisements and operations. However, the national media has been accused of again sidestepping a scandal involving the Clintons that involves the same type of fraud allegations. The scandal involves the dubious Laureate Education for-profit college and entails many of the common elements with other Clinton scandals: huge sums given to the Clintons and questions of conflicts with Hillary Clinton during her time as Secretary of State. There are distinctions to draw between the two stories, but the virtual radio silence on the Clinton/Laureate story is surprising.


I have long been a critic of most online courses, though I am increasingly in the minority even on my faculty. However, the rise of online courses has allowed for an increase in dubious pitches and practices that prey upon people who cannot afford or attend a traditional academic institution.

Laureate Education has been sued over such programs as its Walden University Online offering, which many have alleged is a scam designed to bilk students of tens of thousands of dollars for degrees. Students says that they were repeatedly delayed and given added costs as they tried to secure degrees, leaving them deeply in debt.

The respected Inside Higher Education reported that Laureate Education paid Bill Clinton an obscene $16.5 million between 2010 and 2014 to serve as an honorary chancellor for Laureate International Universities. While Bill Clinton worked as the group’s pitchman, the State Department funneled $55 million to Laureate when Hillary Clinton was secretary of state. That would seem a pretty major story but virtually no mainstream media outlet has reported it while running hundreds of stories on the Trump University scandal.

There was even a class action — like the Trump University scandal. Travis et al v. Walden University LLC, was filed in U.S. District Court in the District of Maryland but dismissed in 2015. It is not clear why it was dismissed. However, the size of the contract to Clinton, the payment from State and the widespread complaints over alleged fraud should warrant a modicum of attention to the controversy. The controversy has many of the familiar complaints over fraudulent online programs that take advantage of hard working people.

As an academic, I find both Trump University and Laureate to be deeply troubling stories. Yet, only one has been pursued by the media to any significant degree. I am not suggesting that Laureate as a whole is fraudulent. Moreover, there are distinctions that can be drawn with a university like Trump that is based entirely on the presumptive nominee and his promises in advertising. However, the money given to the Clintons, the involvement of the State Department, and the claims of fraud make this an obviously significant story in my view.

What do you think?

CIA Personnel may have been Compromised Due to Hillary Emails

Anyone remember the Valerie Plame affair, the outing of her position at the CIA?

The names of some CIA personnel could have been compromised in release of Clinton emails

WASHINGTON (AP) – The names of CIA personnel could have been compromised not only by hackers who may have penetrated Hillary Clinton’s private computer server or the State Department system, but also by the release itself of tens of thousands of her emails, security experts say.

Clinton, the presumptive Democratic presidential nominee, turned over to the State Department 55,000 emails from her private server that were sent or received when she was secretary of state.

Some contained information that has since been deemed classified, and those were redacted for public release with notations for the reason of the censorship.

At least 47 of the emails contain the notation “B3 CIA PERS/ORG,” which indicates the material referred to CIA personnel or matters related to the agency. And because both Clinton’s server and the State Department systems were vulnerable to hacking, the perpetrators could have those original emails, and now the publicly released, redacted versions showing exactly which sections refer to CIA personnel.

“Start with the entirely plausible view that foreign intelligence services discovered and rifled Hillary Clinton’s server,” said Stewart Baker, a Washington lawyer who spent more than three years as an assistant secretary of the Homeland Security Department and is former legal counsel for the National Security Agency.

If so, those infiltrators would have copies of all her emails with the names not flagged as being linked to the agency.

In the process of publicly releasing the emails, however, classification experts seem to have inadvertently provided a key to anyone who has the originals. By redacting names associated with the CIA and using the “B3 CIA PERS/ORG” exemption as the reason, “Presto – the CIA names just fall off the page,” Baker said.

The CIA declined to comment.

A U.S. official said the risk of the names of CIA personnel being revealed in this way is “theoretical and probably remains so at this time.” The official, who did not have the authority to publicly address the matter, spoke on condition of anonymity and would not elaborate.

Steven Aftergood, who directs the Federation of American Scientists’ Project on Government Secrecy, said even if any identities were revealed, they might be the names of analysts or midlevel administrators, not undercover operatives.

“I don’t think there’s any particular vulnerability here,” Aftergood said.

Clinton has acknowledged that the email server, set up in the basement of her New York home, was a mistake. But she says she never sent or received anything that was marked classified at the time of transmission. Clinton, who was secretary of state from 2009 to 2013, insists the personal server she used was never actually breached.

hillary clinton emails

The AP discovered last year that Clinton’s private server was directly connected to the internet in ways that made it more vulnerable to hackers. A recent State Department inspector general’s report indicated the server was temporarily unplugged by a Clinton aide at one point during attacks by hackers, but her campaign has said there’s no evidence the server was hacked.

In each year from 2011 to 2014, the State Department’s poor cybersecurity was identified by its inspector general as a “significant deficiency” that put the department’s information at risk. Another State Department inspector general report revealed that hacking attempts forced Clinton off her private email at one point in 2011.

Then in 2014, the State Department’s unclassified email system was breached by hackers with links to Russia. They stole an unspecified number of emails. The hack was so deep that State’s email system had to be cut off from the internet while experts worked to eliminate the infestation.

Baker points out another instance where Clinton’s server might have been hacked.

A March 2, 2009, email warned against State Department officials using Blackberries. Eric Boswell, assistant secretary of state, says the “vulnerabilities and risks associated with the use of Blackberries … considerably outweigh their convenience.”

Nine days later, another email states that Clinton approached Boswell and says she “gets” the risk. The email also said: “Her attention was drawn to the sentence that indicates we (the diplomatic security office officials) have intelligence concerning this vulnerability during her recent trip to Asia.”

Clinton traveled to China, Indonesia, Japan and South Korea in February 2009.