Ooops, Now Failed Policy on Venezuela

When the Venezuelan leader Hugo Chavez died, Barack Obama dispatched a delegation to the funeral as his representatives. 22 heads of state from 54 countries attended the funeral in Caracas. Yet there was more going on before the death of Chavez.

In March, before the death of Chavez:  The administration tried last year to cultivate Chavez’s designated heir, Vice President Nicolas Maduro, holding several phone calls and meetings with him and other top Venezuelans. But at a time when Chavez’s illness was paralyzing the government in Caracas, the Americans stopped getting any response to their inquiries, the U.S. official said.

“We had not gotten very far and were not sure that the government of Venezuela wanted to continue down that road, when [Chavez’s death] occurred,” the official said.

Michael Shifter, president of the Inter-American Dialogue think tank in Washington, said he believed Maduro — considered by many to be the front-runner in the coming presidential election — may be open to a limited thaw in the relationship.

Maduro may, for example, agree to establishing regular communication between the two governments and exchanging ambassadors, Shifter said. He also may be open to cooperation on energy, because Venezuela’s oil industry, which is the source of most of its national income, needs technical help and new investment.

But Shifter noted that the next leader would not want to go too far in a thaw because “if he’s seen as embracing the U.S., it would be fatal with some sectors of Chavism.”]

Things did not work out well for the White House and their outreach plan with Venezuela. Seems Venezuela has turned their loyalty to China.

China has been generously co-signing financial transactions with the Venezuelan government including the borrowing of billions of dollars in exchange for future trade advantages. Since 2007, China has loaned Venezuela a total of $48 billion USD. But China’s help does not stop there. China’s generosity has reinforced the movement towards Latin America integration, fortified regional promotion of a multi-polar world, and it also has diminished somewhat the economic leverage of the United States in the region.

In January 2015, after a trip to Beijing and a meeting with Chinese President Xi Jinping, Venezuelan President Nicolas Maduro announced that Venezuela will receive $20 billion USD in Chinese investments. Maduro also announced that this investment will be used on housing, technology, energy, and infrastructure projects. However the President did not provide further details on whether or not Venezuela will use this investment to import goods or pay old debts.2 Beijing’s financial help has been arousing controversies in the United States and the European Union, since Venezuela has been routinely accused of wanton human rights violations by corporation-funded but heavily biased western media.

The questions raised by western media have mainly focused on the alleged irrationality behind China’s loans to Venezuela. At times they expressed concern that Venezuela will not be able to pay back the nearly $50 billion USD due to falling global oil prices. The reality is that Venezuela already has paid back $24 billion USD, making the Chinese government confident that Caracas will pay back its debt. Due to the country’s heavy dependence on its oil production, when international oil prices plunged last summer, Venezuela’s economy suffered a serious setback. According to OPEC’s statistics, last September’s oil basket prices first dropped below $100, and then continued on a downward slope. As of January, 2015 oil WTI prices have plunged to $44.38. It was not until February, 2015 that oil basket prices first saw a minor recovery.3Real wages in Venezuela also are dropping along with oil production, while inflation rates skyrocket across the country. To add on to Venezuela’s economic misery, its oil production rate is also losing ground. Petróleos de Venezuela, S.A.(PDVSA), state-owned oil company of Venezuela, is now pumping 2.7 million barrels of crude oil per day, 4 compared to 2006 when Venezuela was producing 3.2 million barrels per day.5

Statement by the Press Secretary on Venezuela

Today President Obama issued a new Executive Order to implement and expand upon the Venezuela Defense of Human Rights and Civil Society Act of 2014.  Venezuelan officials past and present who violate the human rights of Venezuelan citizens and engage in acts of public corruption will not be welcome here, and we now have the tools to block their assets and their use of U.S. financial systems.

We are deeply concerned by the Venezuelan government’s efforts to escalate intimidation of its political opponents.  Venezuela’s problems cannot be solved by criminalizing dissent.  We have consistently called on the Venezuelan government to release those it has unjustly jailed as well as to improve the climate of respect for human rights and fundamental freedoms, such as the freedoms of expression and peaceful assembly.  These are essential to a functioning democracy, and the Venezuelan government has an obligation to protect these fundamental freedoms.  The Venezuelan government should release all political prisoners, including dozens of students, opposition leader Leopoldo Lopez and Mayors Daniel Ceballos and Antonio Ledezma.

The only way to solve Venezuela’s problems is through real dialogue – not detaining opponents and attempting to silence critics.  The Venezuelan people deserve a government that lives up to its commitment to democracy, as articulated in the OAS Charter, the Inter American Democratic Charter, and other fundamental instruments related to democracy and human rights.

We’ve seen many times that the Venezuelan government tries to distract from its own actions by blaming the United States or other members of the international community for events inside Venezuela.  These efforts reflect a lack of seriousness on the part of the Venezuelan government to deal with the grave situation it faces.

It is unfortunate that during a time when we have opened up engagement with every nation in the Americas, Venezuela has opted to go in the opposite direction.  Despite the difficulties in our official relationship, the United States remains committed to maintaining our strong and lasting ties with the people of Venezuela and is open to improving our relationship with the Venezuelan government.

Hillary was Hacked, Data Virgin Islands/Ukraine

EmailGate courtesy of Hillary Clinton’s home server has taken on a life of its own.

From the Blaze:

Clinton Email Domain Hosted by a Company That Was Hacked in 2010 and Had Data Redirected to Ukraine — and IP Address Reveals Link to British Virgin Islands

As news of Hillary Clinton using a private email during her tenure as Secretary of State continues to emerge, TheBlaze has learned that the email domain was hosted by a “consumer grade” company whose data was hacked in 2010, with information being sent to Ukraine. Additionally, data reveals that the domain was hosted at one point in the British Virgin Islands. This, experts say, is a big security no-no.

Domain history data reveals Clintonemail.com was registered in 2009 with Network Solutions, shortly after Clinton was appointed as the nation’s top diplomat. But the decision to host the domain for such a high-profile person on a consumer registrar like Network Solutions is questionable to security experts.

Bill Sweetman, a domain registration expert based in Canada who describes himself as part of the “left-leaning camp,” told TheBlaze Friday that the whole Clinton email controversy has struck him as “naive on the part of the players.”

Image source: DomainTools.com
.

“If you’re someone that is concerned about security of your data, you don’t go and register your domain name with a consumer-oriented registrar like Network Solutions or GoDaddy,” Sweetman said.

Image source: DomainTools.com

“You would work either with a corporate domain registrar like MarkMonitor or CVSC, or you would talk to your employer – in this case the government – about their internal solutions that would protect the domain name and would protect the data associated with it.”

Sweetman isn’t alone in thinking this.

Rod Rasmussen, a leading expert on the abuse of domain name systems, wrote in a 2013 column for the trade publication Security Week, that any domain managers using a consumer-grade registrar for a “major enterprise” should lose their jobs. Rasmussen wrote the piece after Network Solutions was hacked in 2010, resulting in thousands of domains being transferred to Confluence Networks, a domain registrar traced to the British Virgin Islands.

“When it comes to Internet security, there is absolutely no way major corporations would use consumer grade anti-malware and anti-phishing solutions as a one-stop security solution. So why would major organizations – we’re talking major Fortune 500 companies, government agencies, financial services and critical infrastructure organizations – put their domains in the hands of consumer grade registrars?” Rasmussen wrote.

Among the companies whose domains were moved offshore at the time of Rasmussen’s column were organizations like LinkedIn, Fidelity, Craigslist, Yelp and the U.S. Postal Service

“We have received reports that Network Solutions customers are seeing malicious code added to their websites, and we are really sorry for this experience,” company spokesman Shashi Bellamkonda wrote in a company blog post at the time. Aside from that admission, Rasmussen wrote that Network Solutions has been “tight-lipped” about the details, only adding that the websites of a “small number” of customers were “inadvertently affected for up to several hours.”

Computer World reported in 2010 that throughout the course of the attack, users of up to 50 domains hosted by Network Solutions were redirected to a Ukrainian attack server.  Historical domain data associated with Clintonemail.com reveals the last recorded change to a Clintonemail.com IP address occurred Dec. 22, 2011. A simple lookup of that particular IP address shows it is hosted in Road Town, British Virgin Islands, although its unclear whether the offshore IP address is a direct result of the Network Solutions hack.

What’s also unclear is whether Clintonemail.com was one of the domains directly involved in the same attack that redirected to a Ukrainian attack server. What is evident, however, is that the security threat posed by Hillary Clinton using a “consumer-grade registrar” for her private email domain, potentially containing classified information, was greater than the threat that could have been posed had she decided to use the State.gov domain.

Since the New York Times broke the story, questions surrounding Clinton’s use of private email have circulated throughout the media and even some members of her own party. Republicans, especially those who are expected to be considering a 2016 presidential run, have also pounced on the issue. After days of silence, Clinton finally tweeted a response to the controversy Thursday.

Clinton’s successor, Secretary of State John Kerry, told the press during a visit to Saudi Arabia that the review would be conducted “as rapidly as possible,” Reuters reported.

But the review of the nearly 55,000 emails Clinton sent from her private email could take some time, as one State Department official acknowledged: ”The review is likely to take several months given the sheer volume of the document set.”   ***    SIX YEARS

Hillary Clinton was in violation of State Department rules governing the use of non-governmental email accounts during her entire tenure as secretary of state and for nearly two years after she left the job, ABC News has learned.

A senior State Department official tells ABC News that under rules in place while Clinton was secretary of state, employees could only use private email accounts for official business if they turned those emails over to be entered into government computers. They were also forbidden from including sensitive but unclassified information on private email, except under some very narrow exceptions.

This policy is still in place, according to the Department. Until any private emails are entered into government computers, the official says, an employee is in violation of the rules.

Clinton used a private email account for her entire tenure as secretary — and did not even have a government-issued email. She only turned over some 55,000 pages of emails to be entered into government computer systems late last year, nearly two years after she stepped down from the State Department.

 

 

2006, GW Bush Spoke About the Coming Caliphate

Before the Military Officers Association, President GW Bush introduced the word ‘caliphate’ in reference to Osama bin Ladin’s terror plans. It was a clarion call to the immediate future. Already war weary and due to the cost of war and unpredictable conditions with a growing enemy, opponents of the Bush Doctrine on the war on terror were fiercely removing support for continued military aggressions.

In the five years since our nation was attacked, we’ve also learned a great deal about the enemy we face in this war. We’ve learned about them through videos and audio recordings and letters and statements they’ve posted on Web sites. We’ve learned about them from captured enemy documents that the terrorists have never meant for us to see.

Together, these documents and statements have given us clear insight into the mind of our enemies, their ideology, their ambitions and their strategy to defeat us.

BUSH: We know what the terrorists intend to do because they’ve told us. And we need to take their words seriously. So today I’m going to describe in the terrorist’s own words what they believe, what they hope to accomplish, and how they intend to accomplish it.

I’ll discuss how the enemy has adapted in the wake of our sustained offensive against them and the threat posed by different strains of violent Islamic radicalism.

Bush had it right yet who is carrying the baton now as that militant future is here upon the Middle East and the West. I’ll explain the strategy we’re pursuing to protect America by defeating the terrorists on the battlefield and defeating their hateful ideology in the battle of ideas.

The terrorists who attacked us on September the 11th, 2001, are men without conscience, but they’re not madmen. They kill in the name of a clear and focused ideology, a set of beliefs that are evil but not insane.

These Al Qaida terrorists and those who share their ideology are violent Sunni extremists. They are driven by a radical and perverted vision of Islam that rejects tolerance, crushes all dissent, and justifies the murder of innocent men, women and children in the pursuit of political power.

They hope to establish a violent political utopia across the Middle East, which they call caliphate, where all would be ruled according to their hateful ideology.

Osama bin Laden has called the 9/11 attacks, in his words, “a great step towards the unity of Muslims and establishing the righteous caliphate.”

BUSH: This caliphate would be a totalitarian Islamic empire encompassing all current and former Muslim lands, stretching from Europe to North Africa, the Middle East and Southeast Asia.

We know this because Al Qaida has told us.

About two months ago, the terrorist Zawahiri — he’s Al Qaida’s second in command — declared that Al Qaida intends to impose its rule in every land that was a home for Islam, from Spain to Iraq. He went on to say, “The whole world is an open field for us.”

We know what this radical empire would look like in practice, because we saw how the radicals imposed their ideology on the people of Afghanistan.

Under the rule of the Taliban and Al Qaida, Afghanistan was a totalitarian nightmare, a land where women were imprisoned in their homes, men were beaten for missing prayer meetings, girls could not go to school, and children were forbidden the smallest pleasures, like flying kites.

Religious police roamed the streets, beating and detaining civilians for perceived offenses. Women were publicly whipped. Summary executions were held in Kabul’s soccer stadium in front of cheering mobs. And Afghanistan was turned into a launching pad for horrific attacks against America and other parts of the civilized world, including many Muslim nations.

BUSH: The goal of these Sunni extremists is to remake the entire Muslim world in their radical image. In pursuit of their imperial aims these extremists say there can be no compromise or dialogue with those they call infidels, a category that includes America, the world’s free nations, Jews, and all Muslims who reject their extreme vision of Islam. They reject the possibility of peaceful coexistence with the free world.

Again, here are the words of Osama bin Laden earlier this year: “Death is better than living on this Earth with the unbelievers among us.”

So, going forward to May of 2011, the raid and killing of Osama bin Ladin at his Abbottabad compound in Pakistan, over 1 million documents were seized speaking to exactly the continued terror plans of al Qaeda. Only 17 documents have been released publically, which begs the question why? Barack Obama took the war on terror to a new lie, al Qaeda has been decimated and is on the run. Just in recent weeks, this has proven to be false. Obama’s tame war strategy has led to leaders falling from power, countries being seized by al Qaeda and other sympathetic factions and death and destruction of epic proportions. Not to be ignored either at this time, Iran had and still does major operations in Afghanistan and continues to have the same in Iraq.
Barack Obama and his inner circle was and is so bent on terminating military actions globally, his team chose to keep bin Ladin’s cache of operations from the very teams that needed and demanded it. An example is this: One of bin Ladin’s top commanders, al Rahman, wrote a letter to bin Ladin asking for permission to order the Libya Islamic Fighting Group whose members had just been released from prison to take advantage of the Arab Spring and being terror operations in Libya, Syria and Yemen. Permission was granted by Osama bin Ladin.
The Weekly Standard below spells it out.

The United States had gotten its hands on al Qaeda’s playbook—its recent history, its current operations, its future plans. An interagency team led by the Central Intelligence Agency got the first look at the cache. They performed a hasty scrub—a “triage”—on a small sliver of the document collection, looking for actionable intelligence. According to Director of National Intelligence James Clapper, the team produced more than 400 separate reports based on information in the documents.

But it is what happened next that is truly stunning: nothing. The analysis of the materials—the “document exploitation,” in the parlance of intelligence professionals—came to an abrupt stop. According to five senior U.S. intelligence officials, the documents sat largely untouched for months—perhaps as long as a year.

In spring 2012, a year after the raid that killed bin Laden and six months before the 2012 presidential election, the Obama administration launched a concerted campaign to persuade the American people that the long war with al Qaeda was ending. In a speech commemorating the anniversary of the raid, John Brennan , Mr. Obama’s top counterterrorism adviser and later his CIA director, predicted the imminent demise of al Qaeda. The next day, on May 1, 2012, Mr. Obama made a bold claim: “The goal that I set—to defeat al Qaeda and deny it a chance to rebuild—is now within our reach.”

The White House provided 17 handpicked documents to the Combatting Terror Center at the West Point military academy, where a team of analysts reached the conclusion the Obama administration wanted. Bin Laden, they found, had been isolated and relatively powerless, a sad and lonely man sitting atop a crumbling terror network.

It was a reassuring portrayal. It was also wrong. And those responsible for winning the war—as opposed to an election—couldn’t afford to engage in such dangerous self-delusion.

“The leadership down at Central Command wanted to know what were we learning from these documents,” says Lt. Gen. Mike Flynn, the former director of the Defense Intelligence Agency, according to the transcript of an interview with Fox News anchor Bret Baier for a coming Fox News Reporting special. “We were still facing a growing al Qaeda threat. And it was not just Pakistan and Afghanistan and Iraq. But we saw it growing in Yemen. We clearly saw it growing still in East Africa.” The threat “wasn’t going away,” he adds, “and we wanted to know: What can we learn from these documents?”

After a pitched bureaucratic battle, a small team of analysts from the Defense Intelligence Agency and Centcom was given time-limited, read-only access to the documents. The DIA team began producing analyses reflecting what they were seeing in the documents.

At precisely the time Mr. Obama was campaigning on the imminent death of al Qaeda, those with access to the bin Laden documents were seeing, in bin Laden’s own words, that the opposite was true. Says Lt. Gen. Flynn: “By that time, they probably had grown by about—I’d say close to doubling by that time. And we knew that.”

This wasn’t what the Obama White House wanted to hear. So the administration cut off DIA access to the documents and instructed DIA officials to stop producing analyses based on them.

Even this limited glimpse into the broader set of documents revealed the problems with the administration’s claims about al Qaeda. Bin Laden had clear control of al Qaeda and was intimately involved in day-to-day management. More important, given the dramatic growth of the terror threat in the years since, the documents showed that bin Laden had expansion plans. Lt. Gen. Flynn says bin Laden was giving direction to “members of the wider al Qaeda leadership team, if you will, that went all the way to places like West Africa where we see a problem today with Boko Haram and [al Qaeda in the Islamic Maghreb], all the way back into the things that were going on in Afghanistan and Pakistan.” Bin Laden advised them on everything from specific operations in Europe to the types of crops his minions should plant in East Africa.

To date, the public has seen only two dozen of the 1.5 million documents captured in Abbottabad. “It’s a thimble-full,” says Derek Harvey, a senior intelligence official who helped lead the DIA analysis of the bin Laden collection.

And while it is impossible to paint a complete picture of al Qaeda based on the small set of documents available to the public, documents we are able to read, including those released last week in a Brooklyn terror trial, reveal stunning new details.

According to one letter, dated July 2010, the brother of Nawaz Sharif, Pakistan’s current prime minister, sought to strike a peace deal with the jihadists. Bin Laden was informed that Shahbaz Sharif, who was then the chief minister of Punjab, wanted to cut a deal with the Pakistani Taliban, whose leadership was close to bin Laden. The government “was ready to reestablish normal relations as long as [the Pakistani Taliban] do not conduct operations in Punjab,” according to the letter from Atiyah Abd al Rahman, one of bin Laden’s top deputies. Attacks elsewhere in Pakistan were apparently acceptable under the terms of the alleged proposal. Al Qaeda intended to guide the Pakistani Taliban throughout the negotiations. The same letter reveals how al Qaeda and its allies used the threat of terrorist attacks as a negotiating tactic in its talks with the Pakistani military.

The letter also shows that Pakistani intelligence was willing to negotiate with al Qaeda. Al Qaeda “leaked” word to the press that “big, earth shaking operations” were planned in Pakistan, the letter says, but bin Laden’s men and their allies would back off if the Pakistani army eased up on its offensive against the jihadists in the north: “In the aftermath” of the al Qaeda leak, “the intelligence people . . . started reaching out to us through some of the Pakistani ‘jihadist’ groups, the ones they approve of.” One of the Pakistani intelligence service’s emissaries was Fazl-ur-Rahman Khalil, a longtime bin Laden ally who leads the Harakat-ul-Mujahideen. Khalil was an early booster of bin Laden’s war against the West, having signed the al Qaeda master’s infamous 1998 fatwa declaring jihad “against the Jews and the Crusaders.” Another government intermediary was Hamid Gul, the one-time head of Pakistan’s Inter-Services Intelligence agency.

Al Qaeda’s network in Iran is also described in bin Laden’s letters. The Iranian regime held some senior al Qaeda leaders, eventually releasing them. This led to disagreements between the two sides. But the mullahs have also allowed al Qaeda to use Iranian soil as a key transit hub, shuttling fighters and cash to and from South Asia. One letter recounts a plan, devised by Yunis al Mauritani, one of bin Laden’s senior lieutenants, to relocate to Iran. Once there, Mauritani would dispatch terrorists to take part in operations around the world.

Mauritani was tasked by bin Laden with planning Mumbai-style shootings in Europe in 2010. The plot was fortunately thwarted. But all of the terrorists selected to take part transited Iran, according to court proceedings in Germany, taking advantage of the Iranian regime’s agreement with al Qaeda.

During the Arab uprisings in 2011, Obama administration officials argued that al Qaeda had been “sidelined” by the peaceful protests. Just weeks before he was killed, however, bin Laden’s men dispatched operatives to Libya and elsewhere to take advantage of the upheaval. “There has been an active Jihadist Islamic renaissance under way in Eastern Libya (Benghazi, Derna, Bayda and that area) for some time, just waiting for this kind of opportunity,” Atiyah Abd al Rahman wrote in early April 2011. Rahman thought there was much “good” in the so-called Arab Spring. And bin Laden believed that the upheaval presented al Qaeda with “unprecedented opportunities” to spread its radical ideology.

The fight over the bin Laden documents continues. Mr. Harvey, the senior DIA official, believes that the documents should be declassified and released to the public as soon as possible, after taking precautions to avoid compromising sources or methods. Rep. Devin Nunes, chairman of the House Intelligence Committee, inserted language in the 2014 intelligence authorization bill requiring just that.

Making the documents public is long overdue. The information in them is directly relevant to many of the challenges we face today—from a nuclear deal with an Iranian regime that supports al Qaeda to the rise of al Qaeda in the Arabian Peninsula and Islamic State in Iraq and Syria; from confidence-building measures meant to please the Afghan Taliban to the trustworthiness of senior Pakistani officials.

Choosing ignorance shouldn’t be an option.

Hillary’s Emails, no Encryption and False Names

There was also stolen White House furniture and then Wall Street. The makings of a Hollywood movie in the text below:

Is the Mysterious ‘Eric Hoteham’ Actually Longtime Clinton Aide Eric Hothem? 

The name of the mysterious individual who registered the servers for Hillary Clinton’s private email address used at the State Department bears a striking resemblance to a longtime Clinton aide.

Clinton and her top aides in the State Department were using email addresses on a private server registered to the Clinton’s home in Chappaqua, New York, according to Internet records reviewed by the Associated Press.

The customer listed in records registering the Internet address to the Chappaqua home was “Eric Hoteham.” The AP, however, was unable to identify an “Eric Hoteham,” stating that the “name does not appear in public records databases, campaign contribution records, or Internet background searches.”

But the name is similar to that of Eric Hothem, who worked as a staff assistant for Clinton during her time as First Lady.

Hothem was involved in multiple personal matters during his service to Clinton and played a role in the controversy surrounding the pardon given to former President Bill Clinton’s half-brother Roger Clinton.

A congressional investigation into Clinton’s clemency decisions found that as Roger Clinton refused to testify to the committee in March 2001, he received a $15,000 wire transfer from a Citibank account in the care of Hothem.

The name of the account was “E.C. 934(A) c/o Eric Hothem.” Lawyers told the committee that “the account is a personal Citibank account of former President and Senator Clinton” and that the money was a loan for Roger Clinton to obtain legal counsel for the investigation.

The congressional report points out that the “payment occurred at the height of public outcry and investigative activity regarding the pardons and at a time when Roger Clinton was deciding whether to provide testimony.”

According to accounts of the final days of the Clinton administration, Hothem told chief White House usher Gary Walters that multiple items of furniture were “the Clintons’ personal property” even though they were not.

The Clintons would later have to return or pay for more than $100,000 in furnishings stolen from the White House.

Hothem also received a special acknowledgement in Hillary Clinton’s book Living History.

Hothem went to work for Citigroup, then moved to JP Morgan Chase in 2013, according to public disclosure reports accessed through the Securities and Exchange Commission.

The documents indicate that Hothem began his financial career in 2002, just a year after his last documented work as an aide to Clinton.

Members of Hothem’s JP Morgan office in Washington, D.C., said on Wednesday that they had “no comment” to any questions regarding Hothem and directed the Washington Free Beacon to the company’s media relations department.

Inquiries made to media relations were not answered by press time. An email sent to an account believed to be Hothem’s was also not returned.

An analysis of Clinton’s personal financial disclosure forms shows she maintained accounts worth millions of dollars at Citibank throughout her years in the Senate. She moved her largest accounts to JP Morgan in 2009.

Her most recent available public financial disclosure in 2012 shows that she holds up to $25 million worth of assets in a JP Morgan account. Hothem did not make the switch to JP Morgan until Clinton was out of federal office in May 2013.

Hothem has maintained ties to Democratic campaigns. His wife, Sue Hothem, has “raised millions of dollars in political contributions,” and helped found a political action committee worth nearly $1 million. She was also the director of development Democratic Leadership Council and the Progressive Policy Institute.

The Clinton Foundation did not respond to a request for comment by press time.

***    

Clinton’s E-Mail System Built For Privacy Though Not Security

No Encryption or protections and once the emails are gone…well they ARE gone?

A week before becoming Secretary of State, Hillary Clinton set up a private e-mail system that gave her a high level of control over communications, including the ability to erase messages completely, according to security experts who have examined Internet records.

“You erase it and everything’s gone,” Matt Devost, a security expert who has had his own private e-mail for years. Commercial services like those from Google Inc. and Yahoo! Inc. retain copies even after users erase them from their in-box.

Although Clinton worked hard to secure the private system, her consultants appear to have set it up with a misconfigured encryption system, something that left it vulnerable to hacking, said Alex McGeorge, head of threat intelligence at Immunity Inc., a Miami Beach-based digital security firm.

The e-mail flap has political significance because Clinton is preparing to announce a bid for the Democratic nomination for president as soon as April. It also reminds voters of allegations of secrecy that surrounded Bill Clinton’s White House. In those years, First Lady Hillary Clinton fought efforts by some White House advisers to turn over information to Whitewater investigators and, later, sought to keep secret records of her task force on health-care reform.

Representative Trey Gowdy, a South Carolina Republican who leads a special committee looking into the events surrounding the 2012 terrorist attack at a U.S. diplomatic facility in Benghazi, Libya, said he will subpoena Clinton’s e-mails.

“We’re going to use every bit of legal recourse at our disposal,” Gowdy said Wednesday during an interview on CNN.

Private Service

The committee also said Wednesday that it has discovered two e-mail addresses used by Clinton while secretary of state.

Nick Merrill, a Clinton spokesman, didn’t immediately respond to a request for comment, though he said in a statement Tuesday that her practices followed “both the letter and spirit of the rules.”

Setting up a private e-mail service was once onerous and rare. Now, it’s relatively easy, said Devost, president of FusionX LLC, based in Arlington, Virginia.

“There are tons of disadvantages of not having teams of government people to make sure that mail server isn’t compromised,” McGeorge said. “It’s just inherently less secure.”

Former Florida Governor and likely 2016 Republican presidential candidate Jeb Bush and used a personal e-mail while he was governor and has done so since, according to his spokeswoman, Kristy Campbell. He kept a server he owned in his state office and didn’t have a private server at home, Campbell said in a phone interview.

Bush E-Mails

Bush differed from Clinton in that it was known he was using a personal e-mail, his aides had regular access to the server and “his office consistently throughout his term complied with Florida’s public records laws,” Campbell said.

In order to ensure her e-mails were private, Clinton’s system appeared to use a commercial encryption product from Fortinet — a good step, McGeorge said.

However, when McGeorge examined the set-up this week he found it used a default encryption “certificate,” instead of one purchased specifically for Clinton’s service. Encryption certificates are like digital security badges, which websites use to signal to incoming browsers that they are legitimate.

“It’s bewildering to me,” he said. “We should have a much better standard of security for the secretary of state.”

Confirmation Hearing

Clinton’s private e-mail — [email protected] — was on a domain set up Jan. 13, 2009, the same day a Senate committee held her confirmation hearing. She was confirmed and sworn in on Jan. 21 as President Barack Obama’s first Secretary of State.

It’s entirely possible that Clinton had a private e-mail system set up at her home as a way to maintain administrative and legal control over her communications, said Tim “T.K.” Keanini, chief technology officer for network security company Lancope Inc. based in Atlanta.

“What we know is that she cared about that communication channel so much that she went out of her way,” and likely hired an expert to configure it for her, Keanini said in a phone interview.

Even so, there’s no guarantee she had complete control over what happened to the e-mails, Keanini said.

Keanini searched Internet records to determine that the computer server supporting Clinton’s e-mail was located in her hometown of Chappaqua, New York. An exact physical address could not be determined. The Internet Protocol address for the server was registered to a person by the name of Eric Hoteham, according to the records.

Kerry’s E-Mail

Supporters note that e-mails sent to State Department employees would have been retained on the government’s system.

However, the e-mail system was also used by at least some close staff, including Huma Abedin, Clinton’s deputy chief of staff at the State Department.

Clinton has yet to speak publicly about her motivation for setting up the system or what discussions she had with her advisers at the time.

Secretary of State John Kerry is the first in his position to rely primarily on a state.gov e-mail account, Deputy Press Secretary Marie Harf said. Harf said that the State Department has “no indication that Secretary Clinton used her personal e-mail account for anything but unclassified purposes.”

While Clinton didn’t have a classified e-mail system, she had multiple ways of communicating in a classified manner, including assistants printing documents for her, secure phone calls and secure video conferences.

Top Aide

Clinton’s top aide during that period, Cheryl Mills, is a respected scandal-defense lawyer. As a member of the White House counsel’s office, Mills helped guide President Bill Clinton through a series of investigations in the 1990s and won praise for her performance in successfully defending him when the Senate voted not to remove him from office in 1999.

Mills would go on to combine two of the most powerful posts at the State Department — chief of staff and counselor — under Hillary Clinton. In that job, she spoke for Clinton on management matters within the department.

Mills didn’t reply to an e-mail seeking comment.

Not long after resigning as secretary of state, Clinton’s private e-mail service was transferred to a commercial provider, MX Logic, Devost said.

“The timing makes sense,” Devost said. “When she left office and was no longer worried as much about control over her e-mails, she moved to a system that was easier to administer.”

Encrypted Connection

It took less than a day for researchers to find potential problems with the Clinton’s system.

Using a scanning tool called Fierce that he developed, Robert Hansen, a web-application security specialist, found what he said were the addresses for Microsoft Outlook Web access server used by Clinton’s e-mail service, and the virtual private network used to download e-mail over an encrypted connection. If hackers located those links, they could search for weaknesses and intercept traffic, according to security experts.

Using those addresses, McGeorge discovered that the certificate appearing on the site Tuesday appeared to be the factory default for the security appliance, made by Fortinet Inc., running the service.

Those defaults would normally be replaced by a unique certificate purchased for a few hundred dollars. By not taking that step, the system was vulnerable to hacking.

Fortinet Statement

It’s unclear whether the site’s settings were the same before news of the private e-mail account emerged this week.

Fortinet issued a statement saying it wasn’t aware the company’s technologies were used by Clinton.

“If they were, our recommendation is to replace provided self-signed certificates with valid digital certificates for the protected domains,” said Andrea Cousens, a Fortinet spokeswoman.

“It may have fallen in the realm of acceptable risk,” Devost said. “They wanted to make sure that when she was in Egypt all of the traffic from her phone to the mail server was encrypted and that was their priority.”

Muslim Brotherhood Embedded in USA Culture

Keep in mind that all Muslim Brotherhood front operations in America have ‘non-profit; status with the Internal Revenue Service.

The Betrayal Papers Part I – Under Obama: U.S. Captured by the Muslim Brotherhood, presented a picture of a conspiracy that is manipulating the American government. Part II – In Plain Sight: A National Security “Smoking Gun” named several people in the Obama administration who have documented associations to Muslim Brotherhood front groups and the State of Qatar. This article will explore the deliberate strategy of the Muslim Brotherhood and the Obama administration to cripple the middle class and to steer the American economy, as well as identify, to the extent possible, their role in many Obama scandals.

Primer 

What do Common Core, “comprehensive” immigration reform, and IRS targeting of conservative groups have in common? They are just a few examples of Muslim Brotherhood-connected policy initiatives that are affecting the lives of Americans every day. Under Obama, many new domestic policies, as well as many scandals, can be traced back to, in varying degrees, the Muslim Brotherhood.

To understand why America no longer feels like America – why it seems that the government has its favorites and while others are targeted and even persecuted – it is important to understand two strong influences on the Muslim Brotherhood. The first is historical: the Nazi Party of Hitler’s Germany. The second is more contemporary: the strategy developed by Al Qaeda’s strategic mastermind, Abu Musab al-Suri.

“The Vampire Economy” and Economic Repression

In 1939, German economist Guenter Reimann published a study of the German economy under Hitler. The Vampire Economy described a corrupt, backwards economy that was not based on any economic logic, much less profit seeking, but instead on the politics of the Fuehrer (i.e., Leader), Adolf Hitler.

Like Communism, Nazism was a form of socialism. (The term Nazi is a contraction of the German word Nationalsozialismus, or National Socialism.) Unlike Soviet Communism, which, at least theoretically, depended on shared ownership of capital to direct the economy, in Nazi Germany the shops, farms, and factories remained, nominally, in private hands. Yet the outcome was basically the same in both Soviet Russia and Nazi Germany: total control over the economy by the Leader and the Party.

In Germany, the pseudo-legal rationale used by the Nazis was regulation, which was subject to change on a whim. If you stepped outside the regulations, you were punished with fines, political persecution, imprisonment, and possibly shipped off to a concentration camp. Sound familiar?

Yet pervasive corruption in the Third Reich ensured the rules applied differently to those in favor, and to those who opposed the Nazis. Specifically, in such an economy, there are party members in good standing, and there were dissidents. Party members can break rules with impunity, while dissidents face public character assassinations and blacklisting.

This calls to mind Obamacare’s implementation. Certain companies, approximately 1,200 in fact, received waivers from the law. Other businesses were forced to provide health coverage for abortions against the will and conscience of the business owners (though the Supreme Court later overruled this regulation). A similar comparison can be made for the fines and prosecutions unequally levied on banks for violating a myriad of complex and overlapping regulations.

Abu Musab Al-Suri’s Plan to Cripple the American Economy

Although most Americans know the name Osama bin Laden, very few know the name Abu Musab al-Suri. While bin Laden provided the charisma and wealth to found Al Qaeda, al-Suri, one of his top lieutenants, provided valuable strategic advice to the fledgling jihadi network. A member of the Muslim Brotherhood from the time he was a student, al-Suri rose to become a member of the Brotherhood’s military command in 1982.

Al-Suri was a calculating thinker, who recognized that to bring down America (and the West in general) would require something different than mass murders. He urged the targeting of high value targets, such as infrastructure, which would force the United States to incur significant economic costs. As an example of this strategy in practice, Al-Suri was the architect of the 2004 Madrid train bombings. There is a good case to be made that the World Trade Center was long in Al Qaeda’s sights precisely because it was a bastion of capitalism, an important hub of New York City’s communications network, and the home of many prominent companies.

Of course, there’s little sense in physically targeting an economy which has already been knuckled-down under onerous, impossible to keep-up-with regulations issued by Obama’s bureaucracies. Various sectors of the American economy have already been effectively taken over by the Muslim Brotherhood Obama administration, including: healthcare, banking, energy, agriculture (think EPA and FDA), and transportation. Last week, the Obama administration, without the consent of Congress or the people, seized untold new powers to regulate the internet.

Meanwhile, as the government unapologetically intrudes into every aspect of life and business, a case could be made that the middle class is being systematically bankrupted. Financial columnist Charles Ortel has shown that the economy is fundamentally as weak as it has been in a generation. Following the collapse in 2008, the government pumped in trillions of dollars to supposedly stabilize and jumpstart the economy (recall the misnamed “Stimulus”). But as of January 2015, there were fewer core jobs in the private sector economy than ten years earlier. Compounding this economic morass is national debt: in roughly the same period (2005-2014), debt has increased $16.5 trillion, to $58 trillion. Finally, information from 2012 and 2013 (the most recent data available), shows pre-tax incomes decreasing for high, middle, and low income earning households.

Abu Musab al-Suri had a terrorist superstar with Osama bin Laden. However, when it comes to economically knee-capping the American economy, Barack Hussein Obama has proved far more effective than the cave rat, Sheikh bin Laden.

U.S. Chamber of Commerce in Doha, Qatar – Bipartisan Influence by Muslim Brotherhood

What would be powerful enough to exert this influence over the American economy? What entity could be that pervasive as to reach into big business across the nation?

In February 2010, the U.S. Chamber of Commerce established their first legal Chamber in Doha, Qatar. Qatar, the reader should be reminded, is a prolific financier of terror. Qatar is also home to the spiritual leader of the Muslim Brotherhood, Yusuf al-Qaradawi, now an Interpol fugitive. The Chamber represents American business and also has an explicitly political and diplomatic mission. In the words of the Chamber’s Executive Vice President and COO, David Chavern, AmCham Qatar is “another concrete example of positive U.S. Engagement with the Muslim world.”

Among the companies and organizations which are premier sponsors of AmCham Qatar are ExxonMobil, The Boeing Corporation, Carnegie Mellon Qatar, Northwestern University in Qatar, and Fluor. Moreover, the following companies have significant involvement with the State of Qatar: Lockheed Martin, Bloomberg, Bank of America, Miramax, among many more.

The U.S. Chamber of Commerce, with its close ties to Qatar, is by far the largest lobbying spender in Washington ($136.3 million in 2012). Business is a bipartisan pursuit, which means that money from Qatar – which is arguably today’s most prolific financial sponsor of Islamic terror – carries great weight in both Republican and Democrat circles.

Indeed, Republican Senator Lindsey Graham is on the record last year as saying, “I’m going to embrace being a Chamber of Commerce Republican.” He was part of a bipartisan Senate delegation to Qatar this January which also included Senators John McCain (R-AZ), Bob Corker (R-TN), John Barrasso (R-WY), Angus King (I-ME) and Tim Kaine (D-VA).

The Brotherhood’s Connections to Policies and Scandals of the Obama Administration

In June 2012, The Daily Caller reported that the CAIR, the Council on American Islamic Relations, had attended “hundreds” meetings with the Obama administration. CAIR, it will be recalled, is a Muslim Brotherhood front organization very closely tied to Hamas.

Why so many meetings? What incredible portfolio of business does CAIR have to discuss with an American administration? What follows is a snapshot of various policies and scandals that are linked, often directly, to Muslim Brotherhood individuals, organizations, and their goal of “civilization jihad.”

Militarization of the Department of Homeland Security: While running for President, Obama stated several times that America needed a civilian national security force that matched the might of the U.S. military. Candidate Obama stated in 2008, “We’ve got to have a civilian national security force that’s just as powerful, just as strong, just as well-funded.”

To many, this sounded like a call for a militarized federal police force. Given that DHS has been advised by such people as Mohammed Elibiary, Arif Alikhan, Eboo Patel, and Mohamed Magid, who each have documented ties with the Muslim Brotherhood, is it not possible that DHS has been weaponized as a force against the American people by the Islamists?

Domestic Spying and Wiretapping: While journalists at AP and Fox News have been subjects of wiretapping ordered by Eric Holder’s misnamed Department of Justice, the NSA’s dragnet on regular Americans has been revealed to be broader than virtually anyone suspected.

Curiously, the spreadsheets that were leaked detailing the email tracking of Muslim American leaders stop in 2008. CAIR Director Nihad Awad is listed as a target, as is Faisal Gill, a Republican operative who held a top-secret security clearance with the Department of Homeland Security. The spreadsheets were leaked in 2014 by former NSA contractor Edward Snowden.

Purge of Military Officers and Christianity: Over the past several years, the U.S. military has been purged of hundreds of high ranking officers. Many of these dedicated military officers were dismissed based on trivial offenses. Occurring simultaneously is a purge of Christianity, indeed even Bibles, from the U.S. military.

 

Anti-Police Protests: In conjunction with the militarization of DHS, state and local law enforcement have been targets of the Obama administration and Eric Holder’s Department of Justice. This anti-police agenda culminated last summer with riots in Ferguson, Missouri and violent protests New York City. Among the most prominent groups involved in these protests was ANSWER, a pro-Palestinian group that had on its original steering committee the Muslim Students Association.

Finally, the NYC cop killer Ismaaiyl Abdullah Brinsley stated on his own Facebook page that he was previously an employee of the (Muslim Brotherhood) Islamic Society of North America (ISNA). At the time of the killing, the president of ISNA was Mohamed Magid, an advisor to Obama, DHS, and the National Security Council.

Immigration and Amnesty: Revealed in a recent editorial, “Between 2010 and 2013, the Obama administration imported almost 300,000 new immigrants from Muslim nations — more immigrants than the U.S. let in from Central America and Mexico combined over that period.” Given the paucity of background and security checks, as well as the high incidence of terrorism from such countries, it is any surprise that the FBI now admits that ISIS is active in all 50 states?

The Muslim Public Affairs Council (MPAC), another Muslim Brotherhood front organization operating in the United States, conveniently issued a policy paper in September 2013 calling for “comprehensive immigration reform.”

Moreover, in January the Obama appointed Fatima Noor, a veiled Muslim woman, to the position of “Special Assistant in the Office of the Director for U.S. Citizenship and Immigration Services in the Department of Homeland Security.” Other than her religion, her credentials are very thin.

It is hardly an exaggeration to state that the administration is taking gradual steps to eliminating the very concept of American citizenship. In fact, a recent White House conference call made it explicit that these new immigrants are not supposed to assimilate into American society, but instead establish their own ethnic communities within the United States. Does this remind anyone of Gaza, or the no-go zones in Europe?

Common Core: Even classroom education has not escaped the tentacles of the Muslim Brotherhood. The connection between Common Core and the international terror group is through, once again, Qatar. The Connect All Schools initiative is a program to promote “One World Education.” It is aligned to Common Core State Standards, and is funded by the Qatar Foundation International (QFI). The director of QFI’s Research Center for Islamic Legislation and Ethics is Tariq Ramadan, grandson of Muslim Brotherhood founder, Hassan al-Banna.

According to WND, in 2011 QFI “partnered with the Department of State and the U.S. Department of Education to facilitate matchmaking between classrooms in the U.S. and international schools through … the “Connect All Schools” project.” QFI explains on its own website that the initiative was founded in response to Obama’s infamous 2009 Cairo speech, during which Obama had the Muslim Brotherhood seated in the front row.

Participation of the Qatar Foundation International puts in proper context the ever more prevalent cases of Sharia (i.e. Islamic law) incursions into American schools, such as: girls forced to cover up like devout Muslims on school sponsored trips to mosques; Islamic vocabulary lessons in high school; the teaching of Islamic culture; teaching the five pillars of Islam and “A call to jihad;” and Qatar investing $5 million to teach Arabic in schools.

Finally, any treatment of Common Core would not be complete without mentioning the involvement of another one of Obama’s mentors, domestic terrorist Bill Ayers. Ayers received $49.2 million from Vartan Gregorian, a board member of Qatar Foundation who is also part of Obama’s White House Fellowships Commission. Gregorian is an integral part of Connect All Schools.

IRS Targeting of Conservative and Pro-Israel Groups: The targeting of Obama’s political enemies is reminiscent of the politicized bureaucracies of all tyrannies, from Nazism to Communism and everything in between. Among the persecuted by apparatchik Lois Lerner were: hundreds of conservative groups, Constitutional groups, groups that criticized Obama, 5 pro-Israel groups, and an 83 year old Nazi concentration camp survivor.

As usual, the pattern of targeting conservatives, Israel, and Jews in general is the trend of the Obama administration … and the Muslim Brotherhood. The IRS targeting nearly mirrors DHS’s profiling of “right wing sovereign citizens and extremist groups” as the primary terrorist threat facing the country, which was CAIR approved.

In addition to suppressing political enemies, the IRS has actually enabled the Muslim Brotherhood through Obama’s half-brother, Malik.
In 2011, the IRS granted a 501(c)(3) statuses to two groups connected to Barack Obama’s half-brother, Malik Obama: the Barack H. Obama Foundation (BHOF), and Mama Sarah Obama Foundation (MSOF).

This would not be of particular concern, but for the fact that Malik Obama has documented associations with the Muslim Brotherhood, wanted terrorists, and terrorist organizations. These include Sudan’s Muslim Brotherhood leader Omar al-Bashir, the organizers of the infamous 2010 Gaza Flotilla, and Hamas. In fact, contravening all standard practices, the IRS granted the tax exempt status to BHOF retroactively, after it was learned that Malik was falsely and criminally representing his organization as a charity (which, at the time, it was not). A full report on these activities was produced by the Shoebat Foundation, and can be read here.

The George Soros Connection

In more than one of these instances, the fingerprints of billionaire investor (and breaker of nations and currencies) George Soros can be found. Soros operates a vast network of various “leftist” front organizations. In reality, these organizations are anything but liberal. They regularly attack capitalism, Israel, and fund the subversion of American society. It is not the intention here to dissect Soros’s network and political machinations, but to place him in context in the above scandals.

Combating “Islamophobia”: Soros has “donated” $10,117,186 to the Center for American Progress since 2000. One of the major initiatives of CAP is to combat “sharia hysteria” by the “religious right.”

Ferguson unrest: Soros’s Open Society Institute donated $33 million in one year to various activist groups in Ferguson who were active in the protests and subsequent destruction.

Immigration: Prominent Muslim American immigration lawyer Rabia Chaudry is employed by another Soros-controlled group, the New America Foundation. Previously Chaudry was Media Relations Director of CAIR-CT.

Common Core: A project of the Soros-funded Center for American Progress (CAP), Common Core was conceived under the direction of John Podesta, while he was President of CAP. Podesta is currently Counselor to Obama, and also a Visiting Professor at Georgetown University Law Center. (Note: Georgetown has a campus of their School of Foreign Service in Doha, Qatar. All campus costs are fully covered by a grant of the Qatar Foundation, which also funds aspects of Common Core.)

Net Neutrality Regulation: According to Washington Examiner, Soros funded “net neutrality” groups to the tune of $196 million. Net neutrality was adopted last week by a committee vote of the FCC, and is widely expected to be used to regulate content on the internet and television.

Conclusion

Tyranny, whatever name it’s given, has one recipe. It starts with a base of fear, it’s spiced with terror, and served with sides of persecution and intimidation. The poorer and more desperate the people become, the more readily they’ll meld into the pottage of political domination by their government.

Taken alone, none of these events would be of much concern in a country of 300+ million people. Even the general feeling of depression and oppression by government could be overlooked as a result of global economic conditions, many which are out of the control of even the President of the United States.

But viewed together through the lens of the Muslim Brotherhood’s plan to dominate America and bring her down from within, dismissing them as coincidence would be to ignore a carefully constructed plan. Whether attacks on cops, downright crazy immigration policies, the persecution of American citizens by the IRS, or the takeover of school curricula, there is a rhythm to all of these scandals that jives seamlessly with the song of the Muslim Brotherhood.

Evidence above suggests a bipartisan infection, a betrayal of the American people by the crony establishment in both parties. What will it take before the pundits, politicians, and regular Americans start to demand answers and accountability from the people in their own government who are each day plotting their demise, and will only be content when the American people are destitute and servile?

*This is Part 3 in a 5 Part Series. Click to read Part 1Part 2, Part 3.