NSA Contractor Stole Names of Covert Agents

WDEF: The former National Security Agency (NSA) contractor who’s been charged with stealing and keeping highly classified material over the course of two decades put U.S. intelligence officers and operations at risk by possessing their names, according to a court filing Thursday.

In the filing with a Maryland federal court, the Justice Department confirmed for the first time specific details about the type of information Harold Martin took from the NSA.

Indictment document is here.

Harold Martin’s Detention order filed on October 27, 2016 is found here. His bail hearing held on October 28 resulted in a denial of freedom and a bail release.

“As an example, information stolen by the Defendant includes numerous names of intelligence officers of the United States,” the filing said. “These officers operate under cover outside the United States, and putting the secrecy of their identities at risk by removing information about those identities from appropriate, secure storage not only endangers the lives and safety of those officers and the individuals with whom they work, but also risks exposure of American intelligence operations.”

The Justice Department added that if numerous intelligence sources and methods for highly sensitive intelligence operations fell into the wrong hands, they “could be rendered nearly useless.”

Prosecutors estimate that a substantial portion of the 50 terabytes of digital information found in Martin’s possession contains “highly classified information.” Authorities also found thousands of hard-copy documents containing “highly classified information” in his possession.

In the filing Thursday, the Justice Department did not say whether the names of intelligence officers were shared with U.S. adversaries and it’s still unclear whether Martin was selling this information or if he was simply hoarding the information in his home.

Regardless of his intentions, the Justice Department plans to charge Martin under the Espionage Act. He has already been charged with theft of government property and removal and retention of classified materials for stealing half a billion pages of U.S. secrets and records between 1996 and 2016.

Martin, 51, of Glen Burnie, Maryland, made his first public court appearance in a Baltimore federal courtroom on Friday and the judge ruled that he must remain detained because he poses a “serious risk to the public.”

In court documents filed last week, government lawyers said that Martin committed theft that was “breathtaking in its longevity and scale.”

The Justice Department revealed only earlier this month that Martin had been arrested in late August when officials used search warrants to look through his home, two storage sheds and car. Martin was a Booz Allen Hamilton Employee.

This comes three years after Edward Snowden, a NSA contractor who also worked for Booz Allen Hamilton, leaked top secret U.S. government documents from the agency.

FBI to Re-Open Hillary Clinton ServerGate Case Confirmed

Update: There are countless investigations ongoing and as it relates to this reopen of the Hillary case:

New emails found on a government official’s device, likely Huma Abedin tied to the FBI’s Clinton inquiry were discovered during the investigation into Anthony Weiner’s sexting.

It appears there are countless emails coming into evidence that are the cause of the House Oversight Committee and the FBI may be re-opening the email/server investigation. Given the handful of days remaining before the general presidential election, it is assured that something significant has come to the surface that would approve this decision.

Speaker Paul Ryan has just called for cancelling all security briefings for Hillary Clinton.

Jason Chaffetz@jasoninthehouse

FBI Dir just informed me, “The FBI has learned of the existence of emails that appear to be pertinent to the investigation.” Case reopened.

Back in September:

Smith Calls for FBI to Reopen Clinton Investigation

Sep 28, 2016
Press Release

WASHINGTON – U.S. Rep. Lamar Smith (R-Texas), chairman of the U.S. House Science, Space, and Technology Committee, today urged FBI Director James Comey to reopen the FBI’s investigation of former Secretary of State Hillary Clinton’s private email server.

At today’s House Judiciary Committee hearing titled Oversight of the Federal Bureau of Investigation, Rep. Smith questioned Director Comey and described several recent developments that would justify a reopening of the investigation, including:

  • Reports that an employee at a company that managed former Secretary Clinton’s private email server said on the forum Reddit.com, “ . . . I need to strip out a VIP’s (VERY VIP) email address from a bunch of archived emails….” This same employee called a new retention policy designed to delete emails after 60 days a “Hillary cover-up operation.”
  • A former Clinton Foundation employee who also managed the Clinton server destroyed devices used by Clinton by smashing them with a hammer.
  • Two employees involved in maintaining the Clinton server recently pleading the Fifth Amendment to Congress to avoid self-incrimination.

Rep. Smith also urged Director Comey to ensure that the FBI complied with the Science Committee’s recent subpoena of documents related to the server. More here.

****

Related reading: House Oversight Chairman promises years of Clinton investigations: ‘She’s not getting a clean slate’

We don’t know if another whistleblower has come forward or if the WikiLeaks emails are at the center of the decision to re-open the Hillary servergate issue but the letter signed by James Comey does offer some clues.

****

BusinessInsider: NBC News also reported that the FBI will reopen its investigation. In a letter to Congress, FBI director James Comey wrote that the investigative team in charge of looking into Clinton’s server briefed him on Thursday on new emails they found that might contain classified information.

“The FBI cannot assess whether or not this material may be significant,” Comey wrote.

 

****

NYPost: For months now, we’ve been told that Hillary Clinton’s 33,000 missing emails were permanently erased and destroyed beyond recovery. But newly released FBI notes strongly suggest they still exist in several locations — and they could be recovered, if only someone would impanel a grand jury and seize them.

In a May interview with FBI agents, an executive with the Denver contractor that maintained Clinton’s private server revealed that an underling didn’t bleach-clean all her subpoenaed emails, just ones he stored in a data file he used to transfer the emails from the server to Clinton’s aides, who in turn sorted them for delivery to Congress.

The Platte River Networks executive, whose name was redacted from the interview report, said PRN tech Paul Combetta “created a ‘vehicle’ to transfer email files from the live mailboxes of [Clinton Executive Services Corp.] email accounts [and] then later used BleachBit software to shred the ‘vehicle,’ but the email content still existed in the live email accounts.”

Unless one of Clinton’s aides had the capability to log in to the PRN server as an administrator and remove a mailbox, her archived mailboxes more than likely still reside somewhere in that system. And they may also materialize on an internal “shared drive” that PRN created to control access to the Clinton email accounts among PRN employees. PRN has been under FBI order to preserve all emails and other evidence since the start of its investigation last year.

Clinton’s missing “personal” emails may also be captured on a Google server. According to FBI notes, Combetta “transferred all of the Clinton email content to a personal Google email address he created.” Only the FBI never subpoenaed Google to find out.

The FBI documents also reveal that Hillary’s server was mirrored on a cloud server in Pennsylvania maintained by Datto Inc., a tech firm that performs cloud-to-cloud data protection.

When PRN contracted with Datto, it requested that Hillary’s server be backed up locally and privately. But the techs forgot to order the private node, and they sent the server backup data “remotely to Datto’s secure cloud and not to a local private node.” The FBI never subpoenaed Datto’s server, either.

Then there’s the laptop Combetta loaded with the Clinton email archive and allegedly shipped back to a Clinton aide in Washington, who claims it got “lost” in the mail. Not so fast: The latest FBI document dump includes a series of interviews with an unidentified former “special assistant” to Clinton at the State Department who said the elusive Apple MacBook laptop was actually “shipped to the Clinton Foundation in New York City.”

But in a June follow-up interview, FBI agents inexplicably left it up to this critical witness to “inquire about the shipment” with the foundation’s mailroom manager, who works in Rockefeller Center. The FBI still does not have the laptop in its possession.

It turns out that investigators also know the whereabouts of the original Apple server Clinton used in her first two months in office. Recovering that equipment is critical because it contains a mass of unseen emails from Jan. 21, 2009, to March 18, 2009 — a critical period in Clinton’s tenure at State. Witnesses say the equipment was not discarded, as first believed, but “repurposed” as a “work station” used by staff in Clinton’s Chappaqua residence.

Yet the FBI says it “was unable to obtain the original Apple server for a forensic review.” Instead of seizing it, the agency has taken Clinton’s aides’ and lawyers’ word that the server’s bereft of relevant emails. In fact, the agency confesses on Page 27 of its 47-page investigative case summary that it failed to recover other equipment and data as well: “The FBI’s inability to recover all server equipment and the lack of complete server log data for the relevant time period limited the FBI’s forensic analysis of the server systems. As a result, FBI cyber analysis relied, in large part, on witness statements.”

Congressional investigators say FBI Director James Comey in his year-long “investigation” didn’t even bother to send agents to search Clinton’s homes in Chappaqua or Washington, DC. Nor did he dispatch them to the offices of the Clinton Foundation or Clinton Executive Services Corp. in New York City.

“The Clinton residences and other locations should have been treated like any other criminal investigation — with federal grand jury subpoenas or search warrants issued by judges and served in the middle of the night,” said veteran FBI special agent Michael M. Biasello, who worked criminal cases out of New York and other field offices for 27 years.

“Never — I repeat, never — in my career have I or any FBI agent known to me investigated a criminal case without the use of a federal grand jury, grand jury subpoenas or search warrants,” he said. “It’s disgraceful they weren’t used in this case.”

The most damning evidence against Clinton may never have been actually destroyed. It was simply left untouched by the FBI.

*****

It should also be noted that many schedules have been applied to continue Congressional oversight after lawmakers return to session:

Chaffetz, Goodlatte Request Perjury Investigation of Hillary Clinton

Published: Jul 11, 2016

WASHINGTON, D.C.—Today, House Oversight and Government Reform Committee Chairman Jason Chaffetz (UT-03) and House Judiciary Committee Chairman Bob Goodlatte (VA-06) sent a letter to the U.S. Attorney for the District of Columbia requesting an investigation into whether former Secretary of State Hillary Clinton committed perjury and made false statements when testifying under oath before Congress.

The letter states:

“The evidence collected by the FBI during its investigation of Secretary Clinton’s use of a personal email system appears to directly contradict several aspects of her sworn testimony.  In light of those contradictions, the Department should investigate and determine whether to prosecute Secretary Clinton for violating statutes that prohibit perjury and false statements to Congress, or any other relevant statutes.”

Background:

During a July 5, 2016 hearing before the House Oversight Committee, Federal Bureau of Investigation (FBI) Director James Comey stated the truthfulness of Secretary Clinton’s testimony before Congress was not within the scope of the FBI’s investigation. According to Director Comey the Department of Justice requires a criminal referral from Congress to initiate an investigation into Secretary Clinton’s congressional testimony.

Additionally, Chairman Chaffetz sent a letter to Director Comey requesting the FBI’s full investigative file from its review of former Secretary Clinton’s use of an authorized private email server.

Chairman Goodlatte sent a letter to Director Comey pressing for more information about the FBI’s investigation and also led a letter signed by over 200 members of Congress demanding answers from FBI Director Comey regarding the many questions surrounding his announcement that he does not recommend federal prosecution against former Secretary Hillary Clinton for mishandling classified information through private email servers.

Full text of letter:

The Honorable Channing D. Phillips
U.S. Attorney for the District of Columbia
555 Fourth Street NW
Washington, D.C. 20530

Dear Mr. Phillips:

We write to request an investigation to determine whether former Secretary of State Hillary Clinton committed perjury and made false statements during her testimony under oath before congressional committees.

While testifying before the House Committee on Oversight and Government Reform on July 7, 2016, Federal Bureau of Investigation (FBI) Director James Comey stated the truthfulness of Secretary Clinton’s testimony before Congress was not within the scope of the FBI’s investigation.  Nor had the FBI even considered any of Secretary Clinton’s testimony.  Director Comey further testified the Department of Justice requires a criminal referral from Congress to initiate an investigation of Secretary Clinton’s congressional testimony.  We are writing for that purpose.

The evidence collected by the FBI during its investigation of Secretary Clinton’s use of a personal email system appears to directly contradict several aspects of her sworn testimony.  In light of those contradictions, the Department should investigate and determine whether to prosecute Secretary Clinton for violating statutes that prohibit perjury and false statements to Congress, or any other relevant statutes.

Thank you for your attention to this important matter.

Justice Department’s Bank Terrorism Funding Radical Orgs/Activism

Congress held hearings, defunded several of these programs, but Eric Holder and Loretta Lynch found innovative methods to continue the funding by financial terrorism and extortion. This is all without the oversight of Congress and mostly in legal secrecy.

 

In part from the report by the Government Accountability Institute:

House Judiciary Committee Chairman Rep. Lamar Smith took a very direct approach

in his January 25, 2012 correspondence addressed to Eric Holder. He stated:

I am concerned that the terms of the Justice Department’s recent settlement

with Countrywide Financial Corporation and certain affiliates (collectively,

“Countrywide”) will allow the Department to give large sums of money to

individuals and organizations with questionable backgrounds or close

political ties to the White House without any guidelines or oversight. If that is

to be the case, this sort of backdoor funding of the president’s political allies

would be an abuse of the Department’s law enforcement authority.85

He was specifically addressing a December 28, 2011 DOJ settlement with Countrywide,

which required that Countrywide deposit $335 million into an interest-bearing escrow

account to remedy alleged violations of the Equal Credit Opportunity Act and Fair Housing

Act.86

****

The Rise and Fall of ACORN

Saul Alinsky’s influence is undeniable. Since the publication of Reveille for Radicals

in 1946 and Rules for Radicals in 1971, grassroots organizations have been launched for the

purpose of community organizing and systemic social/political change.91 As the movement

grew, organizers created several national support organizations including the Industrial

Areas Foundation (IAF) which was founded by Alinsky. Other organizations that grew out

of the Alinsky philosophies included NACA, and ACORN. One of the first was The National

Welfare Rights Organization (NWRO), an activist organization founded in 1966, focused on

welfare rights.92 Both John Calkins, founder of The Direct Action and Research Training

Center (DART) and Wade Rathke founder of ACORN worked with the NWRO.93 Other

groups that appeared on the community organizing scene who modeled Alinsky’s style of

activism were groups like DART, National People’s Action (NPA) and La Raza.

One of the chief beneficiaries of this wealth redistribution by the federal

government has been ACORN. In its July 2006 report, “Rotten ACORN, America’s Bad Seed,”

the Employment Policies Institute described ACORN as a “multi-million-dollar

multinational conglomerate.”94 The report described ACORN’s hunger and pursuit of

political power:

ACORN’s no-holds-barred take on politics originates from its philosophy,

which is centered on power. An internal ACORN manual instructed

organizers to sign up as many residents as possible because “this is a mass

organization directed at political power where might makes right.95

This sentiment aligns with the Marxist underpinnings of the Students for a

Democratic Society, a group that housed Rathke. ACORN enjoyed rapid growth facilitated

 

through government grants and contracts before, during, and after the 2008 election.

Handwritten notes obtained from an FBI investigative file by Judicial Watch through a FOIA

request indicate ACORN’s headquarters was working for the Democratic Party.96 During

and after the 2008 election there were numerous allegations of massive fraud on the part

of ACORN.97 In 2009, several major scandals involving ACORN and its affiliated groups

broke into the national news. These included rampant embezzlement, fraud, and evidence

that ACORN and their affiliated groups were advising individuals how to break the law.98

A July 23, 2009 Staff Report for the U.S. House of Representatives Committee on

Oversight and Government Reform in its title asked, “Is ACORN Intentionally Structured as

a Criminal Enterprise?” Then offers the following findings in its executive summary:

The Association of Community Organizations for Reform Now (ACORN) has

repeatedly and deliberately engaged in systemic fraud. Both structurally and

operationally, ACORN hides behind a paper wall of nonprofit corporate protections

to conceal a criminal conspiracy on the part of its directors, to launder federal

money in order to pursue a partisan political agenda and to manipulate the

American electorate.

Emerging accounts of widespread deceit and corruption raise the need for a

criminal investigation of ACORN. By intentionally blurring the legal distinctions

between 361 tax-exempt and non-exempt entities, ACORN diverts taxpayer and taxexempt

monies into partisan political activities. Since 1994, more than $53 million

in federal funds have been pumped into ACORN, and under the Obama

administration, ACORN stands to receive a whopping $8.5 billion in available

stimulus funds.

Operationally, ACORN is a shell game played in 120 cities, 43 states and the District

of Columbia through a complex structure designed to conceal illegal activities, to use

taxpayer and tax-exempt dollars for partisan political purposes, and to distract

investigators. Structurally, ACORN is a chess game in which senior management is

shielded from accountability by multiple layers of volunteers and compensated

employees who serve as pawns to take the fall for every bad act.99

One of the events described in the report was the cover-up of the embezzlement of

$948,607.50 by Dale Rathke, the brother of ACORN founder Wade Rathke.100 These and

other events led to a ban on all federal funding for ACORN affiliated groups in 2009.101

Fox News reported that the former director of New York ACORN, Jon Kest, and his

top aides renamed New York ACORN to New York Communities for Change (NYCC), used

the same office and stationary as New York ACORN and employed many of the same staff as

previously employed by New York ACORN.106 In 2013, Fox News and several other news

outlets reported that contracts for services known as Navigator grants under Obamacare

were awarded to former associates of ACORN and its affiliated organizations. Wade Rathke

had announced in September 2013 that The United Labor Unions Council Local 100, a New

Orleans-based nonprofit, would take part in a multi-state “navigator” drive to help people

enroll in Obamacare.107

****

In the most recent consent orders from Bank of America, Citigroup and

JPMorgan settlements offered credit for giving to nonprofits. These not only require banks

to make donations to nonprofits but incentivize them to give more than the required

amount. The evolution of these consent orders illustrates the growing effort by the current

administration to funnel money to these nonprofit groups.

The DOJ limited distributions to “HUD approved housing counseling agencies,” such

as the groups set to receive mandatory minimum payments under the Citigroup and Bank

of America settlements, and incentivized payments under many of these settlements. These

organizations had been preapproved by prior administrations. These included La Raza,

Neighborhood Assistance Corporation of America (NACA) and part of the old ACORN

network who in the wake of the scandal and congressional prohibition against further

funding restyled itself as the Mutual Housing Association of New York (MHANY). The HUD

website lists MHANY’s contact as Ismene Speliotis. Speliotis previously served as the New

York director of ACORN Housing. Furthermore, an examination of tax returns for the

nonprofit reveals that MHANY Management, Inc. maintained the EIN (72-1303737)

previously used by New York ACORN Housing Company, Inc. Between the 2007 and 2008

tax filings, only the group’s name had changed.147 This corporate entity was merely New

York ACORN Housing Company, Inc. rebranded with a new name and clothed in a new

“moral garment.” Despite the prohibition on ACORN funding from Congress, New York

ACORN Housing Company, Inc. had sidestepped congressional intent by simply changing its

name.

****

In September 2012, FHC hosted its annual conference in Orlando. The keynote

speaker for day two: Judith Browne Dianis,198 longtime liberal activist, attorney, and

scholar.199 In its 2012 post-election newsletter, FHC published Browne Dianis’s editorial on

that election.200 She did not mention the word “housing” once. Instead, she denounced what

she termed “the greatest rollback on voting rights in more than a century.” This was her

terminology for the “partisan” voter ID laws passed that year, and the subject of so much

litigation. Furthermore, as its website clearly shows, Browne Dianis’s Advancement Project

 

was in the thick of this litigation.201 In her FHC editorial, she condemned those laws at

length, and called for Election Day to be made a national holiday, and a “next generation

voting-rights movement.”202 She denounced other practices that she claimed amount to

voter suppression. She quoted the recently re-elected Barack Obama on these same issues.

So who was she and how did she find her way to the editorial page of the FHC

newsletter and the keynote speaker slot at the FHC convention? Advancement Project’s tax

return for 2012 lists a grant of $25,000203 to a 501(c)(4) advocacy group known as Florida

New Majority.204 The grant was designated as “Voter Protection Program” – amounting to

nearly one-tenth of the approximately $280,000.00 in grants given out by Browne-Dianis’s

nonprofit, the Advancement Project, for such purposes that year.205 Interestingly, the

Florida New Majority’s 990 for 2012 says nothing about protecting voters, but includes

nearly half-a-million dollars to “reach and mobilize voters during the 2012 elections with

the objective of promoting progressive federal and state legislators…” (emphasis added)206

****

Asian Americans for Equality: Margaret Chin and John Choe

Margaret Chin cut her political teeth as a student activist in the Communist Workers

Party (CWP) while attending the City College in the 1970s. It was Chin who stood before

the cameras and condemned the killing of five of her party members in Greensboro, North

Carolina where the CWP had sponsored a “Death to the Klan” rally which led to an armed

confrontation with the Klan.221 The “Communist” moniker would not serve them well in

their efforts to influence politics in New York City, but a solution was forthcoming. In 1974,

protests erupted in Manhattan’s Chinatown and Asian Americans for Equal Employment

was formed to fight discriminatory hiring practices on a federally-financed construction

project. A “stunning civil rights victory” ultimately led to the founding of Asian Americans

for Equality (AAFE) and a continued focus on “civil liberties” issues.222 Chin, a founding

member of AAFE223 and other members of the CWP, found great success in identifying an

issue important to the community and wrapping themselves in it. We know this because of

the overlap of individuals involved the CWP and AAFE. Many of the founders of AAFE were

also active with the CWP. AAFE shared an address and phone number with the CWP for

several years. It seemed that CWP veterans regularly ended up as AAFE officers. Chin

served as President of AAFE from 1982 to 1986 and was associated with AAFE until 2008

when she began efforts to run for the city council. Her work at AAFE served as a launching

pad into New York politics and in 1986 and with the help of the progressive liberal group,

the Village Independent Democrats, she was elected to the Democratic State Committee

were she served two terms. The AAFE afforded Chin the kind of resources and respectable

platform from which she could chase her political aspirations.224

In 2009, AAFE announced it had joined the NeighborWorks America charter.225 With

this came the “seal of approval” from HUD and federal funding. NeighborWorks funding also

increased—from just over $250,000 in 2008, the year before the announcement, to over

$700,000 in 2013 alone. In total, since 2008, AAFE has received over $4 million in grants from

NeighborWorks.226 Some have not only lamented, but have charged that the AAFE has left

its activist routes to become no more than a “housing developer.” As the New York Times

described it:

Down from the ramparts, fists unclenched, their protest signs long ago set aside,

Asian Americans for Equality — leaders among a cadre of community groups that

brought thousands of demonstrators into the streets of Chinatown and to the steps

of City Hall in the mid-1970’s — is now a major landlord and residential developer.

That same article published the following criticisms:

“I think AAFE has aligned itself with business interests and political interests at the

expense of Chinatown’s residential and low-wage workers,” said Margaret Fung,

executive director of the Asian American Legal Defense and Education Fund. ”They

want to acquire properties or city-owned buildings so that they can be the

developers, instead of some other group. They favor themselves.”

****

A Rising New Star

In January 1993, an article in Chicago Magazine described how “a huge black turnout

in November 1992 altered Chicago’s electoral landscape-and raised new political

star.”243 Leading up to the election George Bush had been making gains on Bill Clinton in

Illinois. Carol Moseley Braun who had previously been seen as “unstoppable” was on the

ropes amidst allegations regarding her mother’s Medicare liability. Even so, she was able to

win her seat and Bill Clinton won the state. The article attributed their success to “…the

most effective minority voter registration drive in memory…” which was the result of the

efforts of Project Vote. At the helm of Project Vote was a young lawyer named Barack

Obama.

Sandy Newman, a lawyer and civil rights activist who founded Project Vote

explained the work of the nonprofit organization in the election as follows:

Project Vote! is nonpartisan, strictly nonpartisan. But we do focus our efforts on

minority voters, and on states where we can explain to them why their vote will

matter. Braun made that easier in Illinois. (emphasis added)

Project Vote’s work in voter registration was hailed as the reason Braun was elected

drawing a direct correlation with voter registration activities and election outcomes.

Indeed, in another portion of the article the writer contrasts the old way of doing things

and the new paradigm created by Mr. Obama’s efforts through the nonprofit:

To understand the full implications of Obama’s effort, you first need to understand

how voter registration often has worked in Chicago. The Regular Democratic Party

spearheaded most drives, doing so using one primary motivator: money. The party

would offer bounties to registrars for every new voter they signed up (typically a

dollar per registration). The campaigns did produce new voters. “But bounty

systems don’t really promote participation,” says David Orr, the Cook County

clerk….

The article suggests that the old political engine previously supplied by the “Regular

Democratic Party” had now been replaced by a 501(c)(3) nonprofit and its leader, Barack

Obama.244

****

Billionaire George Soros founded data utility company, Catalist, to mobilize liberal

voters through nonprofits. Catalist provides the advanced data analysis necessary for

micro-targeting and is building a base of voters and contributors for the exclusive use of

progressive left-leaning groups. Its compatriot is an organization called Nonprofit VOTE

whose goals include providing “high quality resources for nonprofits and social service

agencies to promote voter participation and engage with candidates on a nonpartisan

basis.”247 Their website mentions that Nonprofit VOTE is a nonpartisan organization, and

they acknowledge the demographics of the voters that nonprofits are most likely to reach

are “young, low-income, and diverse populations.”248 Studies have shown that this

demographic is most likely to vote Democrat. As the Wyss memorandum points out these

populations “tend to be reliably progressive on economic […] issues.”249

In 2012 and 2014 Nonprofit VOTE ran pilot projects to increase voter turnout

through nonprofits. The project report acknowledged the help of Catalist, LLC, an

organization that “works with and for data-driven progressive organizations to help them

effect change: issue advocates, labor organizers, pollsters, analysts, consultants, campaigns,

and more.”

The two stated goals of the project were to:

“For nonprofits already doing voter engagement and those considering it, the goal

of Track the Vote program was to provide tangible data to assess the impact of

nonprofits on increasing voter participation—using that data to ground their work

in outcomes and make the case for voter engagement as an ongoing priority.”

Read the full report here.

 

POTUS Lied about Knowing of the Private Hillary Email Server

…and Cheryl Mills knew Obama lied…

Politico: A top Hillary Clinton aide expressed alarm in early 2015 that President Barack Obama claimed he was unaware of Clinton’s private email server until he learned about it in the news.

“We need to clean this up – he has emails from her – they do not say state.gov,” said Clinton adviser Cheryl Mills in a hacked email posted Tuesday on WikiLeaks.

As the scandal over Clinton’s use of a private email server was still emerging in March 2015, Obama told CBS News that he learned about the arrangement through the media. “The same time everybody else learned it through news reports,” Obama told CBS News’ Bill Plante.

White House Press Secretary Josh Earnest later clarified that while the president knew about Clinton’s email address, he “was not aware of the details of how that email address and that server had been set up.”

Clinton’s campaign declined to confirm the authenticity of the emails. White House spokesman Eric Schultz pointed to Earnest’s comments from March when asked for comment about the email exchange.

In part from FreeBeacon:

The email came less than a week after the New York Times broke the story on Clinton’s use of a private email address to conduct official State Department business.

Subsequent interviews by the FBI in the course of its probe into Clinton’s email practices revealed that Obama had emailed Clinton at her personal address using a pseudonym.

Two days after Mills’ email, White House press secretary Josh Earnest acknowledged that Obama had emailed Clinton at her personal address, but said that was consistent with his public remarks.

“The point that the president was making is not that he didn’t know Secretary Clinton’s email address, he did,” Earnest said. “But he was not aware of the details of how that email address and that server had been set up or how Secretary Clinton and her team were planning to comply with the Federal Records Act.”

However, the wording of the question to Obama appears to contradict that explanation.

Though personal email accounts can be hosted by virtually every major email provider—services such as Gmail and Yahoo—Obama was asked specifically about Clinton’s use of an email system “outside the U.S. government,” which would include not just a private email server but an account hosted by anyone other than the State Department.

Mills’ email was one of thousands released by the group Wikileaks after hackers believed to be acting in concert with the Russian government breached Podesta’s personal email account.

Additional hacked emails show Clinton confidantes worried about the fallout from the Times story, including one who suggested that Clinton and other aides using her private email system knew what they were doing could land them in hot water.

“Why didn’t they get this stuff out like 18 months ago? So crazy,” wrote Center for American Progress president and informal Clinton adviser Neera Tanden in an email to Podesta on the day the Times story broke.

“I guess I know the answer,” she wrote in a follow-up. “They wanted to get away with it.”

Podesta appeared to acknowledge that Mills and Clinton aides David Kendall and Phillip Reines had been misleading about their roles in about the email controversy.

“Speaking of transparency, our friends Kendall, Cheryl and Phillipe sure weren’t forthcoming on the facts here,” he wrote to Tanden.

Reines was later denied an official role on the Clinton campaign after a long email diatribe in response to Washington Free Beacon inquiries into his and Clinton’s email practices.

**** What may have been was exponentially worse:

a1

a3

 

 

Friday’s Web Outage, Gonna Be Worse due to Selling Access

Hackers Sell $7,500 IoT Cannon To Bring Down The Web Again

Forbes: Think Friday’s massive outage was bad? Worse is expected, as hackers are selling access to a huge army of hacked Internet of Things (IoT) devices designed to launch attacks capable of severely disrupting web connections, FORBES has learned. The finding was revealed just days after compromised cameras and other IoT machines were used in an attack that took down Twitter, Amazon Web Services, Netflix, Spotify and other major web companies.

In what is a first for the security company, RSA discovered in early October hackers advertising access to a huge IoT botnet on an underground criminal forum, though the company declined to say which one. (F-Secure chief research officer Mikko Hypponen said on Twitter after publication that it was the Tor-based Alpha Bay market). “This is the first time we’ve seen an IoT botnet up for rent or sale, especially one boasting that amount of firepower. It’s definitely a worrying trend seeing the DDoS capabilities grow,” said Daniel Cohen, head of RSA’s FraudAction business unit.

The seller claimed they could generate 1 terabit per second of traffic. That would almost equal the world record DDoS attack, which hit French hosting provider OVH earlier this month at just over 1 terabit. For $4,600, anyone could buy 50,000 bots (hacked computers under the control of hackers), whilst 100,000 cost $7,500. Together, those bots can combine resources to overwhelm targets with data, in what’s known as a distributed denial of service (DDoS) attack.

Cohen said he didn’t know if the botnet for hire was related to Mirai, the epic network of weaponized IoT computers used to swamp DYN – a domain name system (DNS) provider and the chief target of Friday’s attack – with traffic. But FORBES was able to find a forum post on Alpha Bay from the seller, who went by the name loldongs, which noted they had created a Mirai-based botnet. The original post was on 4 October, just a few days after the Mirai source code was made available to everyone. In a later post, in response to another user’s request, loldongs claimed: “I can take down OVH easily.”

Internet of Things botnet sold on undeground hacker forum

RSA uncovered a botnet for hire, made up of IoT devices like connected cameras and fridges. It could generate an astonishing amount of power, the company warned.

Statement By Secretary Johnson On Recent Cyber Incident

Release Date:
October 24, 2016

For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010

The Department of Homeland Security is closely monitoring events arising from the distributed denial of service attack on Dyn on Friday, October 21. Later that day, the Department convened a conference call of about 18 major communication service providers to share information about the incident. At this time, we believe the attack has been mitigated. We have shared relevant information with our partners and through our Automated Indicator Sharing program.

We are aware of one type of malware potentially used in this incident. This malware is referred to as Mirai and compromises Internet of Things devices, such as surveillance cameras and entertainment systems connected to the Internet. The NCCIC is working with law enforcement, the private sector and the research community to develop ways to mitigate against this and other related malware.

The Department has also been working to develop a set of strategic principles for securing the Internet of Things, which we plan to release in the coming weeks.