Example: Depths of Chinese Hacking the U.S.

Former Top FBI Lawyer and Counterintelligence Official Admits Chinese Hacked His Home Computer

September 8, 2015

China Allegedly Hacked Top Former FBI Lawyer 

Jeff Stein, Newsweek

Marion “Spike” Bowman, a top former FBI lawyer and U.S. counterintelligence official who heads an influential organization of retired American spies, says a hacker from China penetrated his home computer, beginning with an innocent-looking email last spring.

“It was an email supposedly from a woman in China, and I exchanged correspondence with her a couple of times,” says Bowman, who was deputy general counsel to three FBI directors between 1995 and 2006. “She sent me a document that a friend of hers had supposedly written, in English, and wanted my opinion on it,” he tells Newsweek. She also sent him her picture.

“I never got around to replying, so I never heard from her again,” says Bowman, who went on to become deputy director of the National Counterintelligence Executive, which is tasked with developing policies to thwart foreign spies and terrorists.

But then, a week ago, he says, he got another message from China via his email account at George Washington University, where he has lectured on national security law since 2003.

“It was apparently from a university in China asking me come to speak at a conference on the environment”—not even remotely one of his areas of expertise, Bowman says. He called the FBI.

After a forensic examination of his machine, the FBI told him “they had found a malware type that’s designed to find out what’s on my computer,” Bowman says. “It wasn’t anything to infect it.” Still, just being able to read the contents of a target’s computer can reveal lots of valuable information like emails and documents, contact files with phone numbers and other personal data, like home addresses.

“Somebody who really knows what they’re doing” can wreak havoc, he says.

The FBI didn’t tell him exactly who was behind the hack, he says, “but they think they identified the woman” in a picture she sent along with one of her emails last spring. “It was somebody that they knew,” Bowman says. “I didn’t inquire any further.”

Before joining the FBI, Bowman was a Navy lawyer assigned to advise SEAL teams on clandestine operations, among other sensitive matters. His portfolio at the FBI gave him intimate knowledge of the details of operations to counter threats from foreign spy agencies.

“I still carry lots of deep Cold War secrets in my head,” he says, although not on his computer. But he is still very active in national security circles as chairman of the board of directors of the Association of Former Intelligence Officers, an organization with several thousand members nationwide, about half of them former CIA personnel.

Bowman’s revelation follows several months of bad news about the vulnerability of government computers to foreign hackers, the latest being a report published Monday saying that Chinese and Russian intelligence agencies are “aggressively aggregating and cross-indexing hacked U.S. computer databases” to catch American spies working overseas. China-based hackers breached about 22 million files held by the federal Office of Personnel Management, officials say.

“At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result” of the Russian and Chinese exploitation of the files, the Los Angeles Times reported, citing two U.S. officials.

The story, Bowman says, was “pretty much on target.”

*** It obviously is much worse than we know for the Obama administration to sign off on a sanction and or other consequence ahead of the Xi’s visit to the United States next week.

U.S. may punish Chinese hacking before Xi’s visit

Imposing sanctions before this month’s summit could derail other priorities.

Top government officials are floating the idea of retaliating within the next week to Chinese cyberattacks, possibly by imposing targeted sanctions on some officials and firms, people familiar with the discussions say. But outside experts say it would be wiser to wait until after this month’s White House summit with Chinese President Xi Jinping.

“I heard from one person that it could be as early as next week,” Jim Lewis, director of the Center for Strategic and International Studies’ Strategic Technologies Program, told POLITICO. He added, “I still think it would be best to wait for the summit.”

Calls for U.S. retalation to Chinese hacking have risen to a furor since the China-linked breach of highly sensitive security clearance forms from 21.5 million current and former federal employees, disclosed in June.

But imposing sanctions before the late-September summit would risk derailing a serious conversation on cyber issues along with myriad other topics, including China’s economic troubles, Chinese belligerence in the South China Sea and cooperation on climate change.

Some China watchers even suspect that the White House is trying to improve its bargaining position in advance of the summit by floating the possibility of sanctions in a serious way.

“My sense is that they’re floating the idea to try to create some kind of leverage in the meetings,” said Adam Segal, a China scholar and director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations.

If the White House did impose sanctions before the meeting, it would be deeply embarrassing to the Chinese and to Xi personally and risk the Chinese doing something to downgrade the summit’s importance, Segal said. “I think if they’re going to do it before the summit, they’ve got to be prepared for the summit to really take a downward turn,” he said.

Business leaders are also dubious about imposing sanctions before Xi’s visit.

The White House should use the summit “as an opportunity to engage in effective dialogue on the cyber issue. If sanctions jeopardize that opportunity, we’d rather see them put it off,” the leader of a major industry organization said in an interview, speaking without attribution because he was speculating about government policy.

If the White House ultimately imposes targeted sanctions, the association leader added, the sanctions should be “based on transparent, credible evidence that’s legally sound.” They should also be designed with a clear path forward that, ultimately, leads to fewer China-linked cyberattacks, he said.

“Most business executives we’ve spoke with felt the indictments against Chinese PLA officers didn’t meet that test,” he added, referring to the May 2014 U.S. indictments of five hackers employed by China’s People’s Liberation Army. That was the Obama administration’s most significant diplomatic strike against Chinese hacking to date.

“[The indictments] didn’t seem to advance anything and they seemed to increase tension rather than reduce it around the issue,” the official said.

In the wake of the OPM hacks, some political leaders have called for much more belligerent responses to Chinese hacking. They include GOP White House contenders Mike Huckabee, who has urged the U.S. to hack back against the communist nation, and Wisconsin Gov. Scott Walker, who has suggested canceling the Obama-Xi summit entirely.

But even cyber hawks warned that aggressive action could backfire in advance of the summit.

“I think everything is going to basically be on hold until the Iran deal goes through and until after President Xi comes to meet with [President Obama],” said Rep. Dutch Ruppersberger (D-Md.), who was formerly ranking member on the House Intelligence Committee.

Ruppersberger added that “we have to eventually draw a line on cyberattacks,” and that the U.S. bargaining position relative to China may be improved now because of the tailspin in the Chinese stock market and other financial difficulties.

The White House has routinely declined to speak publicly about the possibility of sanctioning China for cyberattacks or any more forceful follow-up to the PLA indictments. Press secretary Josh Earnest has said several times that Obama plans to raise cyber concerns with Xi during their summit.

“There’s no doubt that the president will certainly raise, as he has in every previous meeting with his Chinese counterpart, concerns about China’s behavior in cyberspace,” Earnest said during an Aug. 26 news conference.

White House officials have determined they must respond to China’s hacking of OPM, but have been debating for months what the appropriate response should be and when to impose it, Lewis said.

The option of targeted cyber sanctions, which Obama created by executive order in April, has long been on the table along with additional indictments or some form of diplomatic protest, he said.

White House officials have fingered China for the OPM hack anonymously but have not done so, thus far, on the record.

A forceful response to the OPM hack and to Chinese theft of U.S. companies’ intellectual property and trade secrets has also been delayed by more pressing diplomatic priorities, Lewis said, including securing Chinese cooperation for a deal to halt Iran’s nuclear weapons program

“This administration has done more than any other on cybersecurity, but, in a lot of cases, it ends up being No. 2 because of the need to get agreement on other things,” Lewis said. “Cyber always ends up coming in second place, particularly when it comes to China.”

 

 

 

 

 

Obama and Kerry Have Vertigo Over this Iran Deal

Both Barack Obama and John Kerry are suffering from all the symptoms of vertigo, the spinning of lies, the dizziness of power and the imbalance of a lopsided deal with Iran over the nuclear program.

On September 8, 2015, Former Vice President Dick Cheney spoke at the American Enterprise Institute on the notable terror history and chilling consequences of an Iran deal.

Let us examine some facts with regard to Iran and how the negotiation table was a long flawed dialogue from the start.

During the uprising and war in Yemen last March, the Houthis, an Iranian terror proxy took at least 4 Americans hostage. The State Department chose to keep this a secret during the Iranian talks. It is rumored that 1 hostage has been released, while the conditions of the remaining hostages is unknown. Couple this basis with the 4 Americans jailed in Iran. Yet, no efforts have been forthcoming to ensure Iran releases any of them.

Jeddah, Sana’a and Riyadh, Asharq Al-Awsat—The Iranian embassy in Yemen’s capital Sana’a is offering financial, strategic, and military advisory support to the Houthi rebels in country, Yemen’s Foreign Minister Riyadh Yassin said on Sunday.  

Speaking to Asharq Al-Awsat, Yassin said Iran’s embassy in Sana’a had become a “Houthi operations room” and that Iranian intelligence and military experts at the embassy were helping the Houthis plan attacks against government loyalists and forces from the Saudi-led coalition targeting the group.  

He added that the embassy is “equipped with resources not even the Yemeni government is in possession of” and that it was also being used to distribute financial support to the Houthi militias currently stationed in different parts of the country.  

The Shi’ite Houthis, backed by Iran and Yemen’s ousted former president Ali Abdullah Saleh, occupied Sana’a in September 2014. They then launched a coup the following February deposing Yemen’s internationally recognized President Abd Rabbuh Mansur Hadi and his government.  

Yemeni government loyalist forces and a coalition of Arab counties led by Saudi Arabia are currently engaged in a ground and air offensive against the Houthis, seeking to reinstate Hadi and the government.  

On Sunday coalition warplanes bombed several targets in the capital, according to eyewitnesses speaking to Asharq Al-Awsat.  

They said over 15 individual strikes were carried out, including several targeting the headquarters of Yemen’s Special Security Forces, who are loyal to ex-president Saleh. The sources said most of the HQ’s compound has now been destroyed following the air raids.  

The coalition has announced a plan to retake Sana’a with the aid of government loyalists on the ground, known as the Popular Resistance, to follow gains made in the country’s south which have seen the southern port city of Aden and almost all southern provinces liberated from Houthi control.  

The coalition is now closing in on the Houthis in Sana’a and also in the group’s northern stronghold of Saada. The group last month declared a state of emergency in both areas.  

Local sources told Asharq Al-Awsat on Sunday the Houthis now have a plan in place in anticipation of the impending attack on the capital.  

They said the Houthis plan to “spread a wave of chaos” prior to the entry into the capital of coalition forces and those from the Popular Resistance, which will include assassinations of any figures they deem may cooperate with the latter against them—such as political activists and university professors.  

Meanwhile, on Sunday Saudi hospitals received 852 Yemenis injured as a result of the conflict, in a joint initiative between the King Salman Center for Relief and Humanitarian Works and the Ministry of Health.  

This comes as the King Salman Center on Saturday launched the second phase of a joint humanitarian relief project with the United Nations, delivering aid worth some 22 million US dollars to help Yemenis caught up in the conflict.  

In May Saudi Arabia’s King Salman Bin Abdulaziz increased Saudi Arabia’s aid commitment to Yemen to over half a billion dollars.

 

Meanwhile, ask any sailor deployed in the region about the daily confrontations with Iran.

Iranian warships confront U.S. Navy on ‘daily basis’

U.S. naval forces operating in and around the Strait of Hormuz, a critical shipping lane, are “routinely approached by Iranian warships and aircraft” on a “nearly daily basis,” according to a Pentagon official familiar with operations in the region.

During these interactions between U.S. and Iranian forces, American aircraft and ships are routinely photographed by the Iranians for intelligence purposes, according to the official, who said that most confrontations between the sides are “conducted in a safe and professional manner.”

The disclosure of these daily run-ins comes following the release of footage by the Iranian military purporting to show a reconnaissance mission over a U.S. aircraft carrier station in the Strait of Hormuz. More here from JihadWatch.

Then comes the Iranian Parchin nuclear plant which has been a historical military dimension location going back as far as the Nazi regime that used it for the production of chemical weapons. Today, Iran has declared this location will never be subject to any inspections. Related information on Parchin and images taken from space, click here.

Iran says its construction work at the Parchin military facility, southeast of Tehran, is normal and it will not allow any inspection of the “conventional” site, Press TV reports.  

“Parchin is a conventional military site. The construction there is normal and even it was indeed confirmed by some officials from the United States that Parchin site and the activities there are something normal and it doesn’t have any relevance to the IAEA work,” Iran’s Ambassador to IAEA Reza Najafi said.  

“Of course, this is a military site and Iran will not let any inspector go there,” he added.  

​Najafi’s remarks came after IAEA Director General Yukiya Amano repeated his claims about construction work at Iran’s Parchin military site whose inspection some world powers demand.  

“These activities could undermine the capability of the IAEA on verification but as we do not have inspectors there and by way of observing through satellite imagery, we do not have further insight of these recent activities,” the IAEA chief said.  

 

He added that “much work needs to be done” to finish the probe, but reiterated that the investigations will be complete by mid-December, as agreed in a roadmap between Iran and the IAEA.   

On July 14, Iran and the IAEA signed a roadmap for “the clarification of past and present issues” regarding Iran’s nuclear program in Vienna, Austria.  

Iran provided some additional information on Parchin by August 15, further proving that it was complying with the mutual agreement with the UN agency.  

On August 27, the US Department of State acknowledged that Iran’s Parchin site is a “conventional” military facility. “I think it’s important to remember that when you’re talking about a site like Parchin, you’re talking about a conventional military site, not a nuclear site,” US State Department spokesman John Kirby said.  

“So there wouldn’t be any IAEA or other restrictions on new construction at that site were they to occur,” he added.  

Kirby’s remarks mark a deviation from past claims in the US about Parchin. Iran has repeatedly denied Western allegations about nuclear activity at the site. The comments came after the IAEA voiced reservation about the construction of “a small extension to an existing building” at Parchin.  

“Since (our) previous report (in May), at a particular location at the Parchin site, the agency has continued to observe, through satellite imagery, the presence of vehicles, equipment, and probable construction materials. In addition, a small extension to an existing building appears to have been constructed,” the IAEA report said.  

Following the report, Tehran criticized the agency’s statement about Parchin, saying construction work on the site “does not concern” the nuclear agency.

 

 

Congress: Islamist Terror Threat Matrix

U.S. Terror Matrix

 

 

 

The full House of Representatives 8 page report is here.

 

KEY TAKEAWAYS

The jihadist threat in the U.S. homeland is high and has escalated dramatically this year. There have been more U.S.-based jihadist terror cases in 2015 than in any full year since 9/11. The number of U.S. terrorist cases involving homegrown violent jihadists has gone from 38 in July 2010 to 124 today—more than a three-fold increase in just five years.

ISIS is fueling the Islamist terror wildfire across the globe at unprecedented speed. As of the end of August, the group has inspired or directed 57 terror attack plots against Western targets, including 15 in the United States. A recent train attack in France would have been a mass-casualty attack had it not been for an alert group of Americans. There have now been nearly twice as many ISIS-linked attack plots against the West this year (37) as there were in all of 2014 (20).

Islamist terrorists are intent on killing American law enforcement and military personnel, in addition to innocent civilians. Radicals are increasingly targeting men and women in uniform here in the United States. In August, ISIS supporters released another “hit list” of American government personnel, including service members. Since early 2014, the majority of Islamist terror plots on U.S. soil have featured plans to kill police or U.S. service members.

ISIS has largely maintained its terror safe havens in Syria and Iraq while expanding globally more than a year after the U.S. and its allies launched operations against it. Al Qaeda affiliates from Syria to Yemen have also carved out sanctuary and seized additional terrain. ISIS retained control over its major strongholds in Syria and Iraq while undertaking disruption attacks and offensives in key territory; ISIS-affiliated militants have simultaneously consolidated control in Libya. Foreign fighters continue to swell the ranks of Islamist extremist groups looking to recruit foot soldiers and activate followers to launch attacks in their home countries.

HOMEGROWN ISLAMIST EXTREMISM

The jihadist threat in the U.S. homeland is high and has escalated dramatically this year.

By the numbers

Since September 11, 2001, there have been 124 U.S. terrorist cases involving homegrown violent jihadists. Over 80 percent of these cases—which include plotted attacks and attempts to join foreign terrorist organizations—have occurred or been disrupted since 2009.1

 

• Authorities have arrested or charged at least 52 individuals in the United States this year – 67 since 2014 – in ISIS-related cases. The cases involve individuals: plotting attacks; attempting to travel to join ISIS overseas; sending money, equipment and weapons to terrorists; falsifying statements to federal authorities; and failing to report a felony.2

• FBI Director James Comey has said authorities have hundreds of open investigations of potential ISIS-inspired extremists that cover all 56 of the bureau’s field offices in all 50 states. He stated there may be hundreds or thousands of Americans who are taking in recruitment propaganda over social media applications: “It’s like the devil sitting on their shoulders, saying ‘kill, kill, kill.”

Recent Developments

August 24: Ahmed Mohammed El Gammal, 42, was arrested in Avondale, Arizona, for helping a 24-year-old New York City resident travel to Syria to receive military training from ISIS. El Gammal was an avid ISIS supporter online and engaged the recruit through social media before in-person meetings. El Gammal and the recruit communicated with an unnamed co-conspirator based in Turkey.

TERROR PLOTS AGAINST THE WEST

ISIS is fueling the Islamist terror wildfire across the globe at unprecedented speed.

By the numbers

• Since early 2014, there have been 57 planned or executed ISIS-linked terror plots against Western targets, including 15 inside in the United States.3

• There have been nearly twice as many ISIS-linked plots against Western targets in the first seven months of this year (37) than in all of 2014 (20).4

Recent Developments

• August 21: A 25-year-old Moroccan national, Ayoub El Khazzani, attacked passengers on a train in Thalys, France, before a group led by three Americans, including two service members on vacation, subdued him. Khazzani was armed with an arsenal of weapons and 270 rounds of ammunition. He watched a jihadist propaganda video before attempting to launch his attack. He had lived in and attended a radical mosque in Spain before relocating to France. He had also lived in Belgium and traveled from Germany to Turkey in early May before returning to Europe in June. This trip was reportedly part of a plot to fight with ISIS in Syria.

• August 13: ISIS’s “hacking division” released information regarding 1,400 American government personnel, including service members, and encouraged supporters to track down and attack them. The list included names, e-mail addresses, and phone numbers. ISIS operative and hacker Junaid Hussain had been central to similar plots targeting servicemembers; Hussain was eliminated in an August 24th drone strike in Syria.

FOREIGN FIGHTERS

Undeterred by airstrikes, foreign fighters continue to pour into the conflict zone in Syria and Iraq, bolstering ISIS and representing a potential threat to their home countries—including America—upon return.

By the numbers

• More than 25,000 fighters from 100 countries have traveled to Syria and Iraq to join extremists—the largest convergence of Islamist terrorists in world history. U.S. estimates reportedly put its current manpower at 20,000-30,000 members. “We’ve seen no meaningful degradation in their numbers” since last August, according to a defense official.

• Approximately 4,500 Western fighters have traveled to Syria and Iraq.5 Europol recently assessed that the high-end estimate of EU citizens who left to fight in Syria may have been as high as 5,000 at the beginning of this year.

• An estimated 550 Western women have traveled to the conflict zone.

Read the whole report here.

 

 

Soros and China vs. M1A1’s and F-35’s: Irregular Warfare

A kinder, gentler weapon, software, economic terrorism and exploiting weakness. What the U.S. military knows and what government leaders know but find difficult to defeat, IRREGULAR WARFARE.

The main protagonist in this section of the history book will not be a statesman or a military strategist; rather, it will be George Soros. Of course, Soros does not have an exclusive monopoly on using the financial weapon for fighting wars. Before Soros, Helmut Kohl used the deutsche mark to breach the Berlin Wall–a wall that no one had ever been able to knock down using artillery shells [see Endnote 13]. After Soros began his activities, Li Denghui [Li Teng-hui 2621 4098 6540] used the financial crisis in Southeast Asia to devalue the New Taiwan dollar, so as to launch an attack on the Hong Kong dollar and Hong Kong stocks, especially the “red-chip stocks.” [Translator’s note: “red-chip stocks” refers to stocks of companies listed on the Hong Kong stock market but controlled by mainland interests.] In addition, we have yet to mention the crowd of large and small speculators who have come en masse to this huge dinner party for money gluttons, including Morgan Stanley and Moody’s, which are famous for the credit rating reports that they issue, and which point out promising targets of attack for the benefit of the big fish in the financial world [see Endnote 14]. These two companies are typical of those entities that participate indirectly in the great feast and reap the benefits.

Soros pours out all his bitterness in his book, The Crisis of Global Capitalism. On the basis of a ghastly account of his investments in 1998, Soros analyzes the lessons to be learned from this economic crisis.

When it comes to the axiom, Know Thy Enemy, China has made an art of this objective. China does so by any means possible with notable success.

In 1999, China used analysts to understand their adversaries such that the primary mission was to achieve a wide set of competitive edges, all under the ethos of ‘Unrestricted Warfare’.

Going beyond the common air or ground war operations, there are countless other methods to gain advantage or defeat others in a competitive world.

A 200 page essay published in 1999 came to the attention of U.S. military leaders. It is a compelling read and germane to conflicts today and well into the future.

Unrestricted Warfare  by Qiao Liang and Wang Xiangsui 

Qiao Liang is a Chinese Air Force Major in the People’s Liberation Army and co-authored a book titled  ‘Unrestricted Warfare’. The scope of the book is China’s Master Plan to Destroy America.

Meanwhile, if you can stand more, there is Russia. The two countries are using the very same software warfare tactical playbook and it too has not gone unnoticed.

EU sets up unit to counter Russia’s disinformation campaigns

Janes: The EU announced on 27 August that it is forming a small “rapid response” team of officials within the European External Action Service (EEAS) to deal with Russian propaganda.

To be launched on 1 September, the team will monitor Moscow’s propaganda manoeuvres and advise EU and national authorities and their media campaigns accordingly, said EU officials.

The move comes in response to a request in March by EU leaders to Federica Mogherini, the EU’s chief of foreign and security policy, to mount a response to “Russia’s ongoing disinformation campaign”.

The team will be comprised of 8-10 Russian-speaking officials from Sweden, the UK and other countries within the EEAS, the EU’s foreign policy wing.

***

The Cyber War: As tension between the United States, Russia and China continues to escalate, reports of cyber warfare between the nations has become increasingly prominent. Modern warfare can be waged in numerous ways, and it seems that this virtual form of conflict will be an increasing theme as the 21st century develops.

 

The cyber warfare between the United States, Russia and China is part of an overall epoch-defining conflict between the three nations. This is largely based on economic disagreement and rivalry, but has also spilled over into military and territorial disputes as well. Although this war has remained physically peaceful thus far, the potential for future conflict between the three nations remains significant. And with the likes of Edward Snowden revealing the extent of government snooping, we can expect more reports of governmental cyber attacks in the future.

 

Hillary Server-Gate Operative Pleas 5th?

From this blog in an earlier post, I mentioned Brain Pagliano and he is in the news again today. Wait for it…..he is fending off a subpoena and will likely plea the Constitutional protection of the 5th Amendment. Will Hillary take down the White House?

Staffer who worked on Clinton’s private e-mail server faces subpoena

Washington Post: A former State Department staffer who worked on Hillary Rodham Clinton’s private e-mail server this week tried to fend off a subpoena to testify before Congress, saying he would assert his constitutional right not to answer questions to avoid incriminating himself.

The move by Bryan Pagliano, who had worked on Clinton’s 2008 presidential campaign before setting up the server in her New York home in 2009, came in a Monday letter from his lawyer to the House panel investigating the 2012 attack on the U.S. consulate in Benghazi, Libya.

The letter cited the ongoing FBI inquiry into the security of Clinton’s e-mail system, and it quoted a Supreme Court ruling in which justices described the Fifth Amendment as protecting “innocent men . . . who otherwise might be ensnared by ambiguous circumstances.’ ”

The FBI is investigating whether Clinton’s system — in which she exclusively used private e-mail for her work as secretary of state — may have jeopardized sensitive national security information.

Thousands of e-mails that have been released by the State Department as part of a public records lawsuit show Clinton herself writing at least six e-mails containing information that has since been deemed classified. Large portions of those e-mails were redacted before their release, on the argument that their publication could harm national security.

“While we understand that Mr. Pagliano’s response to this subpoena may be controversial in the current political environment, we hope that the members of the Select Committee will respect our client’s right to invoke the protections of the Constitution,” his attorney, Mark MacDougall, wrote.

Two other Senate committees also have contacted Pagliano in the past week, according to a copy of the letter, which was obtained by The Washington Post. The requests came from the Senate Judiciary Committee and the Homeland Security Committee, according to people familiar with the requests.

The Senate Judiciary Committee confirmed Wednesday that it sought to ask Pagliano about his work for Clinton.

“In response to questions . . . Mr. Pagliano’s legal counsel told the committee yesterday that he would plead the Fifth to any and all questions if he were compelled to testify,” a spokesperson for committee Chairman Charles E. Grassley (R-Iowa) said in a statement.

Rep. Trey Gowdy (R-S.C.), the chairman of the House Benghazi committee, had subpoenaed the computer staffer Aug. 11 and ordered that he appear for questioning before the committee Sept. 10. Gowdy also demanded that Pagliano provide documents related to the servers or systems controlled or owned by Clinton from 2009 to 2013.

Pagliano, who worked in the State Department’s information-technology department from May 2009 until February 2013, left the agency when Clinton departed as secretary. He now works for a technology contractor that provides some services to the State Department.

The committee’s ranking Democrat, Rep. Elijah Cummings (D-Md.), complained yesterday that Gowdy unilaterally issued the subpoena. He said the subpoena of a low-level aide is one of several signs that Gowdy is using the committee for the political purpose of trying to smear a Democratic presidential candidate.

“Although multiple legal experts agree there is no evidence of criminal activity, it is certainly understandable that this witness’s attorneys advised him to assert his Fifth Amendment rights, especially given the onslaught of wild and unsubstantiated accusations by Republican presidential candidates, members of Congress and others based on false leaks about the investigation,” Cummings said. “Their insatiable desire to derail Secretary Clinton’s presidential campaign at all costs has real consequences for any serious congressional effort.”

MacDougall declined to comment late Wednesday evening.

Will Hillary Clinton’s Emails Burn the White House?

DailyBeast: Counterintelligence specialists suspect that the former Secretary of State wasn’t the only member of the Obama administration emailing secrets around.
Hillary Clinton’s email problems are already causing headaches for her presidential campaign. But within American counterintelligence circles, there’s a mounting sense that the former Secretary of State may not be the only Obama administration official in trouble. This is a scandal that has the potential to spread to the White House, as well.

The Federal Bureau of Investigation can be expected to be tight-lipped, especially because this highly sensitive case is being handled by counterintelligence experts from Bureau headquarters a few blocks down Pennsylvania Avenue from the White House, not by the FBI’s Washington Field Office. That will ensure this investigation gets the needed “big picture” view, since even senior FBI agents at any given field office may only have a partial look at complex counterintelligence cases.

And this most certainly is a counterintelligence matter. There’s a widely held belief among American counterspies that foreign intelligence agencies had to be reading the emails on Hillary’s private server, particularly since it was wholly unencrypted for months. “I’d fire my staff if they weren’t getting all this,” explained one veteran Department of Defense counterintelligence official, adding: “I’d hate to be the guy in Moscow or Beijing right now who had to explain why they didn’t have all of Hillary’s email.” Given the widespread hacking that has plagued the State Department, the Pentagon, and even the White House during Obama’s presidency, senior counterintelligence officials are assuming the worst about what the Russians and Chinese know.

EmailGate has barely touched the White House directly, although it’s clear that some senior administration officials beyond the State Department were aware of Hillary’s unorthodox email and server habits, given how widely some of the emails from Clinton and her staff were forwarded around the Beltway. Obama’s inner circle may not be off-limits to the FBI for long, however, particularly since the slipshod security practices of certain senior White House officials have been a topic of discussions in the Intelligence Community for years.

Hillary Clinton was far from the only senior Obama appointee to play fast and loose with classified materials, according to Intelligence Community insiders. While most counterspies agree that Hillary’s practices—especially using her own server and having her staffers place classified information into unclassified emails, in violation of Federal law—were especially egregious, any broad-brush investigation into security matters are likely to turn up other suspects, they maintain.

“The whole administration is filled with people who can’t shoot straight when it comes to classified,” an Intelligence Community official explained to me this week. Three U.S. officials suggested that Susan Rice, the National Security Adviser, might be at particular risk if a classified information probe goes wide. But it should be noted that Rice has made all sorts of enemies on the security establishment for her prickly demeanor, use of coarse language, and  strategic missteps.

However, Clinton should take no comfort from the fact that others may be in trouble with the FBI too. Just how many of her “unclassified” emails were actually classified is a matter of dispute that will take months for the FBI to resolve with assistance from the State Department and Intelligence Community. The current figure bandied about, that something like 300 of the emails scanned to date by investigators contained information that should have been marked as classified, is somewhat notional at this point, not least because the Intelligence Community has yet to weigh in on most of them.

Spy agencies typically take a harder line on classification than the State Department does, including a tendency to retroactively mark as classified mundane things—for instance press reports that comment on security matters can be deemed secret—that other, less secrecy-prone agencies might not. That said, there’s little doubt that our intelligence agencies fear that the compromise engendered by Hillary’s email slipshod practices was significant.

Although it will be months before intelligence agencies have reviewed all Clinton emails, counterintelligence officials expect that the true number of classified emails on Hillary’s servers is at least many hundreds and perhaps thousands, based on the samplings seen to date.

Excuses that most of the classified emails examined to date are considered Confidential, which is the lowest level, cut no ice with many insiders. Although the compromise of information at that level is less damaging than the loss of Secret—or worse Top Secret—information, it is still a crime that’s taken seriously by counterintelligence professionals. Most of the classified that Hillary and her staff seem to have compromised dealt with diplomatic discussions, which is a grave indiscretion as far as diplomats worldwide are concerned.

“Of course they knew what they were doing, it’s a clear as day from the emails,” opined one senior official who is close to the investigation. “I’m a Democrat and this makes me sick. They were fully aware of what they were up to, and the Bureau knows it.” That Hillary and her staff at Foggy Bottom were wittingly involved in a scheme to place classified information into ostensibly unclassified emails to reside on Clinton’s personal, private server is the belief of every investigator and counterintelligence official I’ve spoken with recently, and all were at pains to maintain that this misconduct was felonious.

It’s clear that many people inside the State Department had to be aware, at least to some degree, of what Clinton and her inner staff were engaged in. How far that knowledge went is a key question that the FBI is examining. The name Patrick Kennedy pops up frequently. A controversial character, Kennedy is the State Department’s undersecretary for management (hence his Foggy Bottom nickname “M”). A longtime Clinton protégé, Kennedy is believed by many to be the key to this case, since his sign-off likely would have been needed for some of Clinton’s unorthodox arrangements.