Obama’s White House Shouting ‘Oh Ashley!’ After the Hack of Database

In part from Wired: Hackers who stole sensitive customer information from the cheating site AshleyMadison.com appear to have made good on their threat to post the data online.

A data dump, 9.7 gigabytes in size, was posted on Tuesday to the dark web using an Onion address accessible only through the Tor browser. The files appear to include account details and log-ins for some 32 million users of the social networking site, touted as the premier site for married individuals seeking partners for affairs. Seven years worth of credit card and other payment transaction details are also part of the dump, going back to 2007. The data, which amounts to millions of payment transactions, includes names, street address, email address and amount paid, but not credit card numbers; instead it includes four digits for each transaction that may be the last four digits of the credit card or simply a transaction ID unique to each charge. AshleyMadison.com claimed to have nearly 40 million users at the time of the breach about a month ago, all apparently in the market for clandestine hookups.

“Ashley Madison is the most famous name in infidelity and married dating,” the site asserts on its homepage. “Have an Affair today on Ashley Madison. Thousands of cheating wives and cheating husbands signup everyday looking for an affair…. With Our affair guarantee package we guarantee you will find the perfect affair partner.”

The data released by the hackers includes names, addresses and phone numbers submitted by users of the site, though it’s unclear if members provided legitimate details. A sampling of the data indicates that users likely provided random numbers and addresses, but files containing credit card transactions will yield real names and addresses, unless members of the site used anonymous pre-paid cards. One analysis of email addresses found in the data dump also shows that some 15,000 are .mil. or .gov addresses. Read more here.

Between being unable to respond to terror attacks (Benghazi) and being unable to kill terrorists massing on the Iraq border (ISIS) to being dumb enough to register for an infidelity hook-up site with their White House email accounts.

From Twitter: I’ve come to the conclusion that the Obama administration IS the JV team they warned us to look out for.

Embedded image permalink

For access to the database, go here.

Terrorism Works, U.S. Chart Proves Vulnerability

Chart Lists Terrorists in U.S. Due to Lax Immigration Policies

The Obama administration’s lax immigration policies have allowed a large number of terrorists with documented ties to ISIS and other radical Islamic groups into the United States, including individuals from Yemen, Saudi Arabia, Somalia and Uzbekistan who have been criminally charged in recent years.

Examples include a naturalized U.S. citizen from Somalia (Hinda Osman Dhirane) charged with conspiracy to provide material support to a foreign terrorist organization, a lawful permanent resident (Akhror Saidakhmetov) from Kazakhstan charged with conspiracy to provide material support to Al Qaeda in Iraq, a Yemeni national named Mufid A. Elfgeeh who also supported a foreign terrorist organization, possessed illegal firearms and attempted to kill U.S. government officers and a Syrian national named Mohamad Saeed Kodaimati who knowingly made false, fraudulently and fictitious statements to the FBI.

That’s just a snippet of a long list of foreigners with terrorist ties who have been granted U.S. entry by the Obama administration. The document was provided this month by a pair of federal lawmakers attempting to pinpoint the tragic consequences of Obama’s negligent immigration policies. The legislators, both U.S. senators, are asking Attorney General Loretta Lynch and Secretary of State John Kerry to provide details on the immigration history of the individuals—as well as their family—that appear on the chart. The list features 72 people involved with or sentenced for terrorist activity in the last year alone.

They include individuals who have engaged in or attempted to engage in acts of terrorism; conspired or attempted to conspire to provide material support to a terrorist organization; engaged in criminal conduct inspired by terrorist ideology; or who have been sentenced for any of the foregoing, the senators, Jeff Sessions of Alabama and Ted Cruz of Texas, reveal. “We would like to understand more about these individuals, and others similarly situated in recent history, and the nexus between terrorism and our immigration system,” they write in a letter to Lynch and Kerry. Sessions chairs the Senate Judiciary Committee’s Subcommittee on Immigration and Cruz chairs the Subcommittee on Oversight, Agency Action, Federal Rights and Federal Courts.

They ask that the State Department and Department of Justice (DOJ) coordinate with other relevant agencies to provide answers to their questions by early next month. Among the senators’ inquires is an unredacted copy of each non-citizen or naturalized citizen’s alien file and a breakdown by immigration status of those who at any time after entering the U.S. got flagged as a member of a terrorist organization or political/social group that endorses or espouses terrorist activity. The lawmakers seek other information as well, including the identification of subjects with terrorist ties who have been deported from the U.S. and those who have been placed in removal proceedings but were allowed to remain inside the country.

As if it weren’t bad enough that terrorists are entering the U.S. legally thanks to our weak immigration policies, the Obama administration also has a terrorist “hands off” list that permits individuals with extremist ties to enter the country. The disturbing details of this secret list come from internal Department of Homeland Security (DHS) documents exposed last year by a U.S. senator. Specifically, an electronic email exchange between U.S. Immigration and Customs Enforcement (ICE) and U.S. Customs and Border Protection (CBP) asks whether to admit an individual with ties to various terrorist groups. The individual had scheduled an upcoming flight into the U.S. and was believed to be a member of the Muslim Brotherhood and a close associate and supporter of Hamas, Hezbollah and the Palestinian Islamic Jihad.

Islamic terrorists are also sneaking into the U.S. through the porous southern border. Judicial Watch has reported this for years and, more recently, published a series of stories documenting how Mexican drug cartels are smuggling foreigners with terrorist links into the El Paso, Texas region. The foreigners are classified as Special Interest Aliens (SIA) by the government and they are being transported to stash areas in Acala, a rural crossroads located around 54 miles from El Paso on a state road – Highway 20. Once in the U.S., the SIAs wait for pick-up in the area’s sand hills just across Highway 20. JW has also reported that Mexican smugglers are moving ISIS operatives through the desert and across the U.S.-Mexico border with tremendous ease.

The First Lie About the IRS Hack Gets Some Truth?

Social security numbers are the basis and entry point to hack when it comes to the cyber intrusion into the IRS. Given the software platform the IRS uses, which is outdated completely, there are warnings there could be more intrusions.

IRS Hack Far Worse Than First Thought

USAToday:

SAN FRANCISCO — A hack of the Internal Revenue service first reported in May was nearly three times as large as previously stated, the agency said Monday.

Thieves have accessed as many as 334,000 taxpayer accounts, the IRS said.

In May, the IRS reported that identity thieves were able to use the agency’s Get Transcript program to get personal information about as many as 114,000 taxpayers.

On Monday, the IRS said an additional 220,000 accounts had also been hacked. In all, 334,000 accounts were accessed, though whether information was stolen from every one of them is not known.

The hackers made use of an IRS application called Get Transcript, which allows users to view their tax account transactions, line-by-line tax return information or wage and income reported to the IRS for a specific tax year.

To enter the Get Transcript system, the user must correctly answer multiple identity verification question.

The hackers took information about taxpayers acquired from other sources and used it to correctly answer the questions, allowing them to gain access to a plethora of data about individual taxpayers.

The Get Transcript service was shut down in May.

Hackers love authentication-based systems because it’s very difficult to distinguish between “the good guys and the bad guys” when someone is trying to get in, said Jeff Hill of STEALTHbits Technologies, a cyber security company.

“Here we have a case where a successful authentication-based attack was discovered in May, and yet the IRS is still unclear of the extent of the breach’s damage months later. Even now, how confident is the IRS they fully understand the extent of the attack completely, or should we expect yet another shoe to drop in the coming weeks?” Hill said.

Notification of the increased number of hacked accounts came Monday.

In a statement the agency said, “as part of the IRS’s continued efforts to protect taxpayer data, the IRS conducted a deeper analysis over a wider time period covering the 2015 filing season, analyzing more than 23 million uses of the Get Transcript system.”

That analysis revealed an additional 220,000 accounts had also potentially been accessed.

In addition to accounts the hackers were successfully able to access, the IRS disclosed hack attempts that didn’t succeed. There were 111,000 attempts on accounts disclosed in May and 170,000 disclosed on Monday, for a total of 281,000 of accounts where the hackers “failed to clear the authentication processes,” the agency said.

Taxpayers whose information was potentially breached will get letters in the mail from the IRS in the coming days.

They will also get access to free credit protection and Identity Protection PINs, the IRS said in a statement.

Taxpayers Fleeced

1/2 TRILLION spent on IT upgrades, but IRS, Feds still use DOS, old Windows

Examiner: President Obama’s team has spent more than a half trillion dollars on information technology but some departments, notably the IRS, still run on DOS and old Windows, which isn’t serviced anymore, according to House chairman.

“Since President Obama has taken office, the federal government has spent in excess of $525 billion dollars on IT. And it doesn’t work,” said Rep. Jason Chaffetz, chairman of the House Oversight and Government Reform Committee.

In an address to the centrist Ripon Society, Chaffetz suggested that the slow change of the federal government’s IT led to the recent and historic hack of personal data of millions of current and former federal workers, including CIA and other clandestine employees.

“The IRS still uses the DOS operating system. You have a Patent office that just got Windows 97. They don’t even service Windows 97 anymore. And yet they just got it. So the procurement process is really, really broken in this regard,” he added.

Chaffetz also offered to praise for Obama’s pick to head the Office of Personnel Management, home to the massive computer hack.

 

Refugee, Spy, Hacker, Thief Problems with China?

Not just in the United States, but add Canada as well. Seems there could be many moving parts to this and many questions. Apparently this is a big enough issue that Barack Obama dispatched one of his pesky sternly worded letters to China.

Operation Fox Hunt

Obama Administration Warns Beijing About Covert Agents Operating in U.S.

NYT: WASHINGTON — The Obama administration has delivered a warning to Beijing about the presence of Chinese government agents operating secretly in the United States to pressure prominent expatriates — some wanted in China on charges of corruption — to return home immediately, according to American officials.

The American officials said that Chinese law enforcement agents covertly in this country are part of Beijing’s global campaign to hunt down and repatriate Chinese fugitives living abroad and, in some cases, recover allegedly ill-gotten gains. The Chinese government has officially named the effort Operation Fox Hunt.

The American warning, which was delivered to Chinese officials in recent weeks and demanded a halt to the activities, reflects escalating anger in Washington about intimidation tactics used by the agents. And it comes at a time of growing tension between Washington and Beijing on a number of issues: from the computer theft of millions of government personnel files that American officials suspect was directed by China, to China’s crackdown on civil liberties, to the devaluation of its currency.

Those tensions are expected to complicate the state visit to Washington next month by Xi Jinping, the Chinese president.

The work of the agents is a departure from the routine practice of secret government intelligence gathering that the United States and China have carried out on each other’s soil for decades. The Central Intelligence Agency has a cadre of spies in China, just as China has long deployed its own intelligence operatives into the United States to steal American political, economic, military and industrial secrets.

In this case, American officials said, the Chinese agents are undercover operatives with the Ministry of Public Security, China’s law enforcement branch charged with carrying out Operation Fox Hunt.

The campaign, a central element of Mr. Xi’s wider battle against corruption, has proved popular with the Chinese public. Since 2014, according to the Ministry of Public Security, more than 930 suspects have been repatriated, including more than 70 who have returned this year voluntarily, the ministry’s website reported in June. According to Chinese media accounts, teams of agents have been dispatched around the globe.

American officials said they had solid evidence that the Chinese agents — who are not in the United States on acknowledged government business, and most likely are entering on tourist or trade visas — use various strong-arm tactics to get fugitives to return. The harassment, which has included threats against family members in China, has intensified in recent months, officials said.

The United States has its own history of sending operatives undercover to other nations — sometimes under orders to kidnap or kill. In the years after the Sept. 11 terrorist attacks, the C.I.A. dispatched teams abroad to snatch Qaeda suspects and spirit them either to secret C.I.A prisons or hand them over to other governments for interrogation.

Smoke Coming From the Hillary Server Fire is Worse

Strip the security clearance from this woman. There are many calling for this exact action and the State Department will not comment if she in fact still has it. At least during this investigation, her clearance should be suspended.

Posted on this site was a timeline and factual information when it comes to the Hillary Servergate affair. A few hours have passed and there of course is more to report.

More factual intrigue is listed below and it is not in any real date order given what and how information is being obtained. This comes as the FBI begins the data and material investigations.

1. Barack Obama drafted and signed a lengthy Executive Order #13526 spelling out the comprehensive conditions of all classified and top secret information. The Democrats and those supporting the Hillary camp in Severgate can NO longer claim restrictive laws are passed AFTER her term as Secretary of State. Further and quite important, Hillary was ONE of 20 who were designate with authority to apply classified codes to documents making it all the more curious on how she can claim ignorance in top secret or restricted documents.

2, It is now confirmed, the second server in question which held the material involved in Servergate, located in New Jersey and seized by the FBI was stripped of data. The FBI does in fact have the skills to rebuild and retrace all administrative actions in the server.

3, Now another at the core of this investigation is Huma Abedin who was and is Hillary’s personal confidant and aide de camp. To date, she has not signed nor turned over as order by Judge Sullivan the certification under penalty of perjury or the email materials which hovers in the range of 7000 communication transmissions.

4. As discussed before, not only was there 3 thumb drives of the Hillary email transaction surrendered to the FBI and 3 servers, but the FBI will likely need to obtain or gain a search warrant for 3 additional communication devices held by Hillary, those being her Blackberry, her iPhone and her iPad.

5. When it comes to the SIGINT or geo-spatial top secret email in question, it appears it was relating to a drone image of terror groups in Pakistan. This speaks to sources and methods such that the top secret designations would have originated with the original transmission of the critic (critical communications).

6. Platte River was NOT an approved facility to house or support classified material. Outside vendors are to be approved in the case of top secret material that have hardened rooms preventing espionage or eavesdropping.

7. There will be more Hillary personnel caught up in the investigation snare and those likely will include Mike Morrell, Deputy Director of the CIA; Phillippe Reines, Hillary’s gatekeeper; Jeremy Bash, former Chief of Staff for Leon Panetta; Andrew Shapiro, Hillary’s Policy Advisor; and several others now at Beacon Global Strategies, Hillary’s personnel policy think tank.

8. The contracted server company, Platte River is now raising deeper questions due in part to a lawsuit and investigation from November 2014. The lawsuit document is found here. They stole phone numbers and metadata from White House military advisors.

The Internet company used by Hillary Clinton to maintain her private server was sued for stealing dozens of phone lines including some which were used by the White House.

Platte River Networks is said to have illegally accessed the master database for all US phone numbers.

It also seized 390 lines in a move that created chaos across the US government.

Among the phone numbers which the company took – which all suddenly stopped working – were lines for White House military support desks, the Department of Defense and the Department of Energy, a lawsuit claims.

Others were the main numbers for major financial institutions, hospitals and the help desk number for T2 Communications, the telecom firm which owned them.

A lawsuit filed on behalf of T2 claims that the mess took 11 days to fix and demands that Platte River pay up $360,000 in compensation.

More to come for sure…..stay tuned.