FBI to Re-Open Hillary Clinton ServerGate Case Confirmed

Update: There are countless investigations ongoing and as it relates to this reopen of the Hillary case:

New emails found on a government official’s device, likely Huma Abedin tied to the FBI’s Clinton inquiry were discovered during the investigation into Anthony Weiner’s sexting.

It appears there are countless emails coming into evidence that are the cause of the House Oversight Committee and the FBI may be re-opening the email/server investigation. Given the handful of days remaining before the general presidential election, it is assured that something significant has come to the surface that would approve this decision.

Speaker Paul Ryan has just called for cancelling all security briefings for Hillary Clinton.

Jason Chaffetz@jasoninthehouse

FBI Dir just informed me, “The FBI has learned of the existence of emails that appear to be pertinent to the investigation.” Case reopened.

Back in September:

Smith Calls for FBI to Reopen Clinton Investigation

Sep 28, 2016
Press Release

WASHINGTON – U.S. Rep. Lamar Smith (R-Texas), chairman of the U.S. House Science, Space, and Technology Committee, today urged FBI Director James Comey to reopen the FBI’s investigation of former Secretary of State Hillary Clinton’s private email server.

At today’s House Judiciary Committee hearing titled Oversight of the Federal Bureau of Investigation, Rep. Smith questioned Director Comey and described several recent developments that would justify a reopening of the investigation, including:

  • Reports that an employee at a company that managed former Secretary Clinton’s private email server said on the forum Reddit.com, “ . . . I need to strip out a VIP’s (VERY VIP) email address from a bunch of archived emails….” This same employee called a new retention policy designed to delete emails after 60 days a “Hillary cover-up operation.”
  • A former Clinton Foundation employee who also managed the Clinton server destroyed devices used by Clinton by smashing them with a hammer.
  • Two employees involved in maintaining the Clinton server recently pleading the Fifth Amendment to Congress to avoid self-incrimination.

Rep. Smith also urged Director Comey to ensure that the FBI complied with the Science Committee’s recent subpoena of documents related to the server. More here.

****

Related reading: House Oversight Chairman promises years of Clinton investigations: ‘She’s not getting a clean slate’

We don’t know if another whistleblower has come forward or if the WikiLeaks emails are at the center of the decision to re-open the Hillary servergate issue but the letter signed by James Comey does offer some clues.

****

BusinessInsider: NBC News also reported that the FBI will reopen its investigation. In a letter to Congress, FBI director James Comey wrote that the investigative team in charge of looking into Clinton’s server briefed him on Thursday on new emails they found that might contain classified information.

“The FBI cannot assess whether or not this material may be significant,” Comey wrote.

 

****

NYPost: For months now, we’ve been told that Hillary Clinton’s 33,000 missing emails were permanently erased and destroyed beyond recovery. But newly released FBI notes strongly suggest they still exist in several locations — and they could be recovered, if only someone would impanel a grand jury and seize them.

In a May interview with FBI agents, an executive with the Denver contractor that maintained Clinton’s private server revealed that an underling didn’t bleach-clean all her subpoenaed emails, just ones he stored in a data file he used to transfer the emails from the server to Clinton’s aides, who in turn sorted them for delivery to Congress.

The Platte River Networks executive, whose name was redacted from the interview report, said PRN tech Paul Combetta “created a ‘vehicle’ to transfer email files from the live mailboxes of [Clinton Executive Services Corp.] email accounts [and] then later used BleachBit software to shred the ‘vehicle,’ but the email content still existed in the live email accounts.”

Unless one of Clinton’s aides had the capability to log in to the PRN server as an administrator and remove a mailbox, her archived mailboxes more than likely still reside somewhere in that system. And they may also materialize on an internal “shared drive” that PRN created to control access to the Clinton email accounts among PRN employees. PRN has been under FBI order to preserve all emails and other evidence since the start of its investigation last year.

Clinton’s missing “personal” emails may also be captured on a Google server. According to FBI notes, Combetta “transferred all of the Clinton email content to a personal Google email address he created.” Only the FBI never subpoenaed Google to find out.

The FBI documents also reveal that Hillary’s server was mirrored on a cloud server in Pennsylvania maintained by Datto Inc., a tech firm that performs cloud-to-cloud data protection.

When PRN contracted with Datto, it requested that Hillary’s server be backed up locally and privately. But the techs forgot to order the private node, and they sent the server backup data “remotely to Datto’s secure cloud and not to a local private node.” The FBI never subpoenaed Datto’s server, either.

Then there’s the laptop Combetta loaded with the Clinton email archive and allegedly shipped back to a Clinton aide in Washington, who claims it got “lost” in the mail. Not so fast: The latest FBI document dump includes a series of interviews with an unidentified former “special assistant” to Clinton at the State Department who said the elusive Apple MacBook laptop was actually “shipped to the Clinton Foundation in New York City.”

But in a June follow-up interview, FBI agents inexplicably left it up to this critical witness to “inquire about the shipment” with the foundation’s mailroom manager, who works in Rockefeller Center. The FBI still does not have the laptop in its possession.

It turns out that investigators also know the whereabouts of the original Apple server Clinton used in her first two months in office. Recovering that equipment is critical because it contains a mass of unseen emails from Jan. 21, 2009, to March 18, 2009 — a critical period in Clinton’s tenure at State. Witnesses say the equipment was not discarded, as first believed, but “repurposed” as a “work station” used by staff in Clinton’s Chappaqua residence.

Yet the FBI says it “was unable to obtain the original Apple server for a forensic review.” Instead of seizing it, the agency has taken Clinton’s aides’ and lawyers’ word that the server’s bereft of relevant emails. In fact, the agency confesses on Page 27 of its 47-page investigative case summary that it failed to recover other equipment and data as well: “The FBI’s inability to recover all server equipment and the lack of complete server log data for the relevant time period limited the FBI’s forensic analysis of the server systems. As a result, FBI cyber analysis relied, in large part, on witness statements.”

Congressional investigators say FBI Director James Comey in his year-long “investigation” didn’t even bother to send agents to search Clinton’s homes in Chappaqua or Washington, DC. Nor did he dispatch them to the offices of the Clinton Foundation or Clinton Executive Services Corp. in New York City.

“The Clinton residences and other locations should have been treated like any other criminal investigation — with federal grand jury subpoenas or search warrants issued by judges and served in the middle of the night,” said veteran FBI special agent Michael M. Biasello, who worked criminal cases out of New York and other field offices for 27 years.

“Never — I repeat, never — in my career have I or any FBI agent known to me investigated a criminal case without the use of a federal grand jury, grand jury subpoenas or search warrants,” he said. “It’s disgraceful they weren’t used in this case.”

The most damning evidence against Clinton may never have been actually destroyed. It was simply left untouched by the FBI.

*****

It should also be noted that many schedules have been applied to continue Congressional oversight after lawmakers return to session:

Chaffetz, Goodlatte Request Perjury Investigation of Hillary Clinton

Published: Jul 11, 2016

WASHINGTON, D.C.—Today, House Oversight and Government Reform Committee Chairman Jason Chaffetz (UT-03) and House Judiciary Committee Chairman Bob Goodlatte (VA-06) sent a letter to the U.S. Attorney for the District of Columbia requesting an investigation into whether former Secretary of State Hillary Clinton committed perjury and made false statements when testifying under oath before Congress.

The letter states:

“The evidence collected by the FBI during its investigation of Secretary Clinton’s use of a personal email system appears to directly contradict several aspects of her sworn testimony.  In light of those contradictions, the Department should investigate and determine whether to prosecute Secretary Clinton for violating statutes that prohibit perjury and false statements to Congress, or any other relevant statutes.”

Background:

During a July 5, 2016 hearing before the House Oversight Committee, Federal Bureau of Investigation (FBI) Director James Comey stated the truthfulness of Secretary Clinton’s testimony before Congress was not within the scope of the FBI’s investigation. According to Director Comey the Department of Justice requires a criminal referral from Congress to initiate an investigation into Secretary Clinton’s congressional testimony.

Additionally, Chairman Chaffetz sent a letter to Director Comey requesting the FBI’s full investigative file from its review of former Secretary Clinton’s use of an authorized private email server.

Chairman Goodlatte sent a letter to Director Comey pressing for more information about the FBI’s investigation and also led a letter signed by over 200 members of Congress demanding answers from FBI Director Comey regarding the many questions surrounding his announcement that he does not recommend federal prosecution against former Secretary Hillary Clinton for mishandling classified information through private email servers.

Full text of letter:

The Honorable Channing D. Phillips
U.S. Attorney for the District of Columbia
555 Fourth Street NW
Washington, D.C. 20530

Dear Mr. Phillips:

We write to request an investigation to determine whether former Secretary of State Hillary Clinton committed perjury and made false statements during her testimony under oath before congressional committees.

While testifying before the House Committee on Oversight and Government Reform on July 7, 2016, Federal Bureau of Investigation (FBI) Director James Comey stated the truthfulness of Secretary Clinton’s testimony before Congress was not within the scope of the FBI’s investigation.  Nor had the FBI even considered any of Secretary Clinton’s testimony.  Director Comey further testified the Department of Justice requires a criminal referral from Congress to initiate an investigation of Secretary Clinton’s congressional testimony.  We are writing for that purpose.

The evidence collected by the FBI during its investigation of Secretary Clinton’s use of a personal email system appears to directly contradict several aspects of her sworn testimony.  In light of those contradictions, the Department should investigate and determine whether to prosecute Secretary Clinton for violating statutes that prohibit perjury and false statements to Congress, or any other relevant statutes.

Thank you for your attention to this important matter.

Justice Department’s Bank Terrorism Funding Radical Orgs/Activism

Congress held hearings, defunded several of these programs, but Eric Holder and Loretta Lynch found innovative methods to continue the funding by financial terrorism and extortion. This is all without the oversight of Congress and mostly in legal secrecy.

 

In part from the report by the Government Accountability Institute:

House Judiciary Committee Chairman Rep. Lamar Smith took a very direct approach

in his January 25, 2012 correspondence addressed to Eric Holder. He stated:

I am concerned that the terms of the Justice Department’s recent settlement

with Countrywide Financial Corporation and certain affiliates (collectively,

“Countrywide”) will allow the Department to give large sums of money to

individuals and organizations with questionable backgrounds or close

political ties to the White House without any guidelines or oversight. If that is

to be the case, this sort of backdoor funding of the president’s political allies

would be an abuse of the Department’s law enforcement authority.85

He was specifically addressing a December 28, 2011 DOJ settlement with Countrywide,

which required that Countrywide deposit $335 million into an interest-bearing escrow

account to remedy alleged violations of the Equal Credit Opportunity Act and Fair Housing

Act.86

****

The Rise and Fall of ACORN

Saul Alinsky’s influence is undeniable. Since the publication of Reveille for Radicals

in 1946 and Rules for Radicals in 1971, grassroots organizations have been launched for the

purpose of community organizing and systemic social/political change.91 As the movement

grew, organizers created several national support organizations including the Industrial

Areas Foundation (IAF) which was founded by Alinsky. Other organizations that grew out

of the Alinsky philosophies included NACA, and ACORN. One of the first was The National

Welfare Rights Organization (NWRO), an activist organization founded in 1966, focused on

welfare rights.92 Both John Calkins, founder of The Direct Action and Research Training

Center (DART) and Wade Rathke founder of ACORN worked with the NWRO.93 Other

groups that appeared on the community organizing scene who modeled Alinsky’s style of

activism were groups like DART, National People’s Action (NPA) and La Raza.

One of the chief beneficiaries of this wealth redistribution by the federal

government has been ACORN. In its July 2006 report, “Rotten ACORN, America’s Bad Seed,”

the Employment Policies Institute described ACORN as a “multi-million-dollar

multinational conglomerate.”94 The report described ACORN’s hunger and pursuit of

political power:

ACORN’s no-holds-barred take on politics originates from its philosophy,

which is centered on power. An internal ACORN manual instructed

organizers to sign up as many residents as possible because “this is a mass

organization directed at political power where might makes right.95

This sentiment aligns with the Marxist underpinnings of the Students for a

Democratic Society, a group that housed Rathke. ACORN enjoyed rapid growth facilitated

 

through government grants and contracts before, during, and after the 2008 election.

Handwritten notes obtained from an FBI investigative file by Judicial Watch through a FOIA

request indicate ACORN’s headquarters was working for the Democratic Party.96 During

and after the 2008 election there were numerous allegations of massive fraud on the part

of ACORN.97 In 2009, several major scandals involving ACORN and its affiliated groups

broke into the national news. These included rampant embezzlement, fraud, and evidence

that ACORN and their affiliated groups were advising individuals how to break the law.98

A July 23, 2009 Staff Report for the U.S. House of Representatives Committee on

Oversight and Government Reform in its title asked, “Is ACORN Intentionally Structured as

a Criminal Enterprise?” Then offers the following findings in its executive summary:

The Association of Community Organizations for Reform Now (ACORN) has

repeatedly and deliberately engaged in systemic fraud. Both structurally and

operationally, ACORN hides behind a paper wall of nonprofit corporate protections

to conceal a criminal conspiracy on the part of its directors, to launder federal

money in order to pursue a partisan political agenda and to manipulate the

American electorate.

Emerging accounts of widespread deceit and corruption raise the need for a

criminal investigation of ACORN. By intentionally blurring the legal distinctions

between 361 tax-exempt and non-exempt entities, ACORN diverts taxpayer and taxexempt

monies into partisan political activities. Since 1994, more than $53 million

in federal funds have been pumped into ACORN, and under the Obama

administration, ACORN stands to receive a whopping $8.5 billion in available

stimulus funds.

Operationally, ACORN is a shell game played in 120 cities, 43 states and the District

of Columbia through a complex structure designed to conceal illegal activities, to use

taxpayer and tax-exempt dollars for partisan political purposes, and to distract

investigators. Structurally, ACORN is a chess game in which senior management is

shielded from accountability by multiple layers of volunteers and compensated

employees who serve as pawns to take the fall for every bad act.99

One of the events described in the report was the cover-up of the embezzlement of

$948,607.50 by Dale Rathke, the brother of ACORN founder Wade Rathke.100 These and

other events led to a ban on all federal funding for ACORN affiliated groups in 2009.101

Fox News reported that the former director of New York ACORN, Jon Kest, and his

top aides renamed New York ACORN to New York Communities for Change (NYCC), used

the same office and stationary as New York ACORN and employed many of the same staff as

previously employed by New York ACORN.106 In 2013, Fox News and several other news

outlets reported that contracts for services known as Navigator grants under Obamacare

were awarded to former associates of ACORN and its affiliated organizations. Wade Rathke

had announced in September 2013 that The United Labor Unions Council Local 100, a New

Orleans-based nonprofit, would take part in a multi-state “navigator” drive to help people

enroll in Obamacare.107

****

In the most recent consent orders from Bank of America, Citigroup and

JPMorgan settlements offered credit for giving to nonprofits. These not only require banks

to make donations to nonprofits but incentivize them to give more than the required

amount. The evolution of these consent orders illustrates the growing effort by the current

administration to funnel money to these nonprofit groups.

The DOJ limited distributions to “HUD approved housing counseling agencies,” such

as the groups set to receive mandatory minimum payments under the Citigroup and Bank

of America settlements, and incentivized payments under many of these settlements. These

organizations had been preapproved by prior administrations. These included La Raza,

Neighborhood Assistance Corporation of America (NACA) and part of the old ACORN

network who in the wake of the scandal and congressional prohibition against further

funding restyled itself as the Mutual Housing Association of New York (MHANY). The HUD

website lists MHANY’s contact as Ismene Speliotis. Speliotis previously served as the New

York director of ACORN Housing. Furthermore, an examination of tax returns for the

nonprofit reveals that MHANY Management, Inc. maintained the EIN (72-1303737)

previously used by New York ACORN Housing Company, Inc. Between the 2007 and 2008

tax filings, only the group’s name had changed.147 This corporate entity was merely New

York ACORN Housing Company, Inc. rebranded with a new name and clothed in a new

“moral garment.” Despite the prohibition on ACORN funding from Congress, New York

ACORN Housing Company, Inc. had sidestepped congressional intent by simply changing its

name.

****

In September 2012, FHC hosted its annual conference in Orlando. The keynote

speaker for day two: Judith Browne Dianis,198 longtime liberal activist, attorney, and

scholar.199 In its 2012 post-election newsletter, FHC published Browne Dianis’s editorial on

that election.200 She did not mention the word “housing” once. Instead, she denounced what

she termed “the greatest rollback on voting rights in more than a century.” This was her

terminology for the “partisan” voter ID laws passed that year, and the subject of so much

litigation. Furthermore, as its website clearly shows, Browne Dianis’s Advancement Project

 

was in the thick of this litigation.201 In her FHC editorial, she condemned those laws at

length, and called for Election Day to be made a national holiday, and a “next generation

voting-rights movement.”202 She denounced other practices that she claimed amount to

voter suppression. She quoted the recently re-elected Barack Obama on these same issues.

So who was she and how did she find her way to the editorial page of the FHC

newsletter and the keynote speaker slot at the FHC convention? Advancement Project’s tax

return for 2012 lists a grant of $25,000203 to a 501(c)(4) advocacy group known as Florida

New Majority.204 The grant was designated as “Voter Protection Program” – amounting to

nearly one-tenth of the approximately $280,000.00 in grants given out by Browne-Dianis’s

nonprofit, the Advancement Project, for such purposes that year.205 Interestingly, the

Florida New Majority’s 990 for 2012 says nothing about protecting voters, but includes

nearly half-a-million dollars to “reach and mobilize voters during the 2012 elections with

the objective of promoting progressive federal and state legislators…” (emphasis added)206

****

Asian Americans for Equality: Margaret Chin and John Choe

Margaret Chin cut her political teeth as a student activist in the Communist Workers

Party (CWP) while attending the City College in the 1970s. It was Chin who stood before

the cameras and condemned the killing of five of her party members in Greensboro, North

Carolina where the CWP had sponsored a “Death to the Klan” rally which led to an armed

confrontation with the Klan.221 The “Communist” moniker would not serve them well in

their efforts to influence politics in New York City, but a solution was forthcoming. In 1974,

protests erupted in Manhattan’s Chinatown and Asian Americans for Equal Employment

was formed to fight discriminatory hiring practices on a federally-financed construction

project. A “stunning civil rights victory” ultimately led to the founding of Asian Americans

for Equality (AAFE) and a continued focus on “civil liberties” issues.222 Chin, a founding

member of AAFE223 and other members of the CWP, found great success in identifying an

issue important to the community and wrapping themselves in it. We know this because of

the overlap of individuals involved the CWP and AAFE. Many of the founders of AAFE were

also active with the CWP. AAFE shared an address and phone number with the CWP for

several years. It seemed that CWP veterans regularly ended up as AAFE officers. Chin

served as President of AAFE from 1982 to 1986 and was associated with AAFE until 2008

when she began efforts to run for the city council. Her work at AAFE served as a launching

pad into New York politics and in 1986 and with the help of the progressive liberal group,

the Village Independent Democrats, she was elected to the Democratic State Committee

were she served two terms. The AAFE afforded Chin the kind of resources and respectable

platform from which she could chase her political aspirations.224

In 2009, AAFE announced it had joined the NeighborWorks America charter.225 With

this came the “seal of approval” from HUD and federal funding. NeighborWorks funding also

increased—from just over $250,000 in 2008, the year before the announcement, to over

$700,000 in 2013 alone. In total, since 2008, AAFE has received over $4 million in grants from

NeighborWorks.226 Some have not only lamented, but have charged that the AAFE has left

its activist routes to become no more than a “housing developer.” As the New York Times

described it:

Down from the ramparts, fists unclenched, their protest signs long ago set aside,

Asian Americans for Equality — leaders among a cadre of community groups that

brought thousands of demonstrators into the streets of Chinatown and to the steps

of City Hall in the mid-1970’s — is now a major landlord and residential developer.

That same article published the following criticisms:

“I think AAFE has aligned itself with business interests and political interests at the

expense of Chinatown’s residential and low-wage workers,” said Margaret Fung,

executive director of the Asian American Legal Defense and Education Fund. ”They

want to acquire properties or city-owned buildings so that they can be the

developers, instead of some other group. They favor themselves.”

****

A Rising New Star

In January 1993, an article in Chicago Magazine described how “a huge black turnout

in November 1992 altered Chicago’s electoral landscape-and raised new political

star.”243 Leading up to the election George Bush had been making gains on Bill Clinton in

Illinois. Carol Moseley Braun who had previously been seen as “unstoppable” was on the

ropes amidst allegations regarding her mother’s Medicare liability. Even so, she was able to

win her seat and Bill Clinton won the state. The article attributed their success to “…the

most effective minority voter registration drive in memory…” which was the result of the

efforts of Project Vote. At the helm of Project Vote was a young lawyer named Barack

Obama.

Sandy Newman, a lawyer and civil rights activist who founded Project Vote

explained the work of the nonprofit organization in the election as follows:

Project Vote! is nonpartisan, strictly nonpartisan. But we do focus our efforts on

minority voters, and on states where we can explain to them why their vote will

matter. Braun made that easier in Illinois. (emphasis added)

Project Vote’s work in voter registration was hailed as the reason Braun was elected

drawing a direct correlation with voter registration activities and election outcomes.

Indeed, in another portion of the article the writer contrasts the old way of doing things

and the new paradigm created by Mr. Obama’s efforts through the nonprofit:

To understand the full implications of Obama’s effort, you first need to understand

how voter registration often has worked in Chicago. The Regular Democratic Party

spearheaded most drives, doing so using one primary motivator: money. The party

would offer bounties to registrars for every new voter they signed up (typically a

dollar per registration). The campaigns did produce new voters. “But bounty

systems don’t really promote participation,” says David Orr, the Cook County

clerk….

The article suggests that the old political engine previously supplied by the “Regular

Democratic Party” had now been replaced by a 501(c)(3) nonprofit and its leader, Barack

Obama.244

****

Billionaire George Soros founded data utility company, Catalist, to mobilize liberal

voters through nonprofits. Catalist provides the advanced data analysis necessary for

micro-targeting and is building a base of voters and contributors for the exclusive use of

progressive left-leaning groups. Its compatriot is an organization called Nonprofit VOTE

whose goals include providing “high quality resources for nonprofits and social service

agencies to promote voter participation and engage with candidates on a nonpartisan

basis.”247 Their website mentions that Nonprofit VOTE is a nonpartisan organization, and

they acknowledge the demographics of the voters that nonprofits are most likely to reach

are “young, low-income, and diverse populations.”248 Studies have shown that this

demographic is most likely to vote Democrat. As the Wyss memorandum points out these

populations “tend to be reliably progressive on economic […] issues.”249

In 2012 and 2014 Nonprofit VOTE ran pilot projects to increase voter turnout

through nonprofits. The project report acknowledged the help of Catalist, LLC, an

organization that “works with and for data-driven progressive organizations to help them

effect change: issue advocates, labor organizers, pollsters, analysts, consultants, campaigns,

and more.”

The two stated goals of the project were to:

“For nonprofits already doing voter engagement and those considering it, the goal

of Track the Vote program was to provide tangible data to assess the impact of

nonprofits on increasing voter participation—using that data to ground their work

in outcomes and make the case for voter engagement as an ongoing priority.”

Read the full report here.

 

POTUS Lied about Knowing of the Private Hillary Email Server

…and Cheryl Mills knew Obama lied…

Politico: A top Hillary Clinton aide expressed alarm in early 2015 that President Barack Obama claimed he was unaware of Clinton’s private email server until he learned about it in the news.

“We need to clean this up – he has emails from her – they do not say state.gov,” said Clinton adviser Cheryl Mills in a hacked email posted Tuesday on WikiLeaks.

As the scandal over Clinton’s use of a private email server was still emerging in March 2015, Obama told CBS News that he learned about the arrangement through the media. “The same time everybody else learned it through news reports,” Obama told CBS News’ Bill Plante.

White House Press Secretary Josh Earnest later clarified that while the president knew about Clinton’s email address, he “was not aware of the details of how that email address and that server had been set up.”

Clinton’s campaign declined to confirm the authenticity of the emails. White House spokesman Eric Schultz pointed to Earnest’s comments from March when asked for comment about the email exchange.

In part from FreeBeacon:

The email came less than a week after the New York Times broke the story on Clinton’s use of a private email address to conduct official State Department business.

Subsequent interviews by the FBI in the course of its probe into Clinton’s email practices revealed that Obama had emailed Clinton at her personal address using a pseudonym.

Two days after Mills’ email, White House press secretary Josh Earnest acknowledged that Obama had emailed Clinton at her personal address, but said that was consistent with his public remarks.

“The point that the president was making is not that he didn’t know Secretary Clinton’s email address, he did,” Earnest said. “But he was not aware of the details of how that email address and that server had been set up or how Secretary Clinton and her team were planning to comply with the Federal Records Act.”

However, the wording of the question to Obama appears to contradict that explanation.

Though personal email accounts can be hosted by virtually every major email provider—services such as Gmail and Yahoo—Obama was asked specifically about Clinton’s use of an email system “outside the U.S. government,” which would include not just a private email server but an account hosted by anyone other than the State Department.

Mills’ email was one of thousands released by the group Wikileaks after hackers believed to be acting in concert with the Russian government breached Podesta’s personal email account.

Additional hacked emails show Clinton confidantes worried about the fallout from the Times story, including one who suggested that Clinton and other aides using her private email system knew what they were doing could land them in hot water.

“Why didn’t they get this stuff out like 18 months ago? So crazy,” wrote Center for American Progress president and informal Clinton adviser Neera Tanden in an email to Podesta on the day the Times story broke.

“I guess I know the answer,” she wrote in a follow-up. “They wanted to get away with it.”

Podesta appeared to acknowledge that Mills and Clinton aides David Kendall and Phillip Reines had been misleading about their roles in about the email controversy.

“Speaking of transparency, our friends Kendall, Cheryl and Phillipe sure weren’t forthcoming on the facts here,” he wrote to Tanden.

Reines was later denied an official role on the Clinton campaign after a long email diatribe in response to Washington Free Beacon inquiries into his and Clinton’s email practices.

**** What may have been was exponentially worse:

a1

a3

 

 

Friday’s Web Outage, Gonna Be Worse due to Selling Access

Hackers Sell $7,500 IoT Cannon To Bring Down The Web Again

Forbes: Think Friday’s massive outage was bad? Worse is expected, as hackers are selling access to a huge army of hacked Internet of Things (IoT) devices designed to launch attacks capable of severely disrupting web connections, FORBES has learned. The finding was revealed just days after compromised cameras and other IoT machines were used in an attack that took down Twitter, Amazon Web Services, Netflix, Spotify and other major web companies.

In what is a first for the security company, RSA discovered in early October hackers advertising access to a huge IoT botnet on an underground criminal forum, though the company declined to say which one. (F-Secure chief research officer Mikko Hypponen said on Twitter after publication that it was the Tor-based Alpha Bay market). “This is the first time we’ve seen an IoT botnet up for rent or sale, especially one boasting that amount of firepower. It’s definitely a worrying trend seeing the DDoS capabilities grow,” said Daniel Cohen, head of RSA’s FraudAction business unit.

The seller claimed they could generate 1 terabit per second of traffic. That would almost equal the world record DDoS attack, which hit French hosting provider OVH earlier this month at just over 1 terabit. For $4,600, anyone could buy 50,000 bots (hacked computers under the control of hackers), whilst 100,000 cost $7,500. Together, those bots can combine resources to overwhelm targets with data, in what’s known as a distributed denial of service (DDoS) attack.

Cohen said he didn’t know if the botnet for hire was related to Mirai, the epic network of weaponized IoT computers used to swamp DYN – a domain name system (DNS) provider and the chief target of Friday’s attack – with traffic. But FORBES was able to find a forum post on Alpha Bay from the seller, who went by the name loldongs, which noted they had created a Mirai-based botnet. The original post was on 4 October, just a few days after the Mirai source code was made available to everyone. In a later post, in response to another user’s request, loldongs claimed: “I can take down OVH easily.”

Internet of Things botnet sold on undeground hacker forum

RSA uncovered a botnet for hire, made up of IoT devices like connected cameras and fridges. It could generate an astonishing amount of power, the company warned.

Statement By Secretary Johnson On Recent Cyber Incident

Release Date:
October 24, 2016

For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010

The Department of Homeland Security is closely monitoring events arising from the distributed denial of service attack on Dyn on Friday, October 21. Later that day, the Department convened a conference call of about 18 major communication service providers to share information about the incident. At this time, we believe the attack has been mitigated. We have shared relevant information with our partners and through our Automated Indicator Sharing program.

We are aware of one type of malware potentially used in this incident. This malware is referred to as Mirai and compromises Internet of Things devices, such as surveillance cameras and entertainment systems connected to the Internet. The NCCIC is working with law enforcement, the private sector and the research community to develop ways to mitigate against this and other related malware.

The Department has also been working to develop a set of strategic principles for securing the Internet of Things, which we plan to release in the coming weeks.

The New Drug Cartel Generation and Weapons

Northwest Mexico Erupts in Violence in Next Generation Cartel Wars

InSight: A bloody cartel war raging in the state of Baja California Sur hints at the new strategies and alliances forming as Mexico‘s fragmented underworld reorganizes.

A Zeta magazine investigation into drug war violence in the city of La Paz, the capital of Baja California Sur, has revealed how a spate of macabre murders is connected to a campaign waged by a new alliance between the Jalisco Cartel– New Generation (CJNG) and the remnants of the Tijuana Cartel against Los Dámaso, a network connected to the Sinaloa Cartel.

According to Zeta, the CJNG and Tijuana Cartel factions are operating under the name the Tijuana Cartel– New Generation (CTNG) and have been kidnapping, torturing and murdering rivals in an attempt to seize control of local drug sales and distribution.

Their targets, according to a Zeta source from the local Public Security Coordination Group (Grupo de Coordinación de Seguridad Pública), are rival hitmen, operatives that have switched sides, plaza chiefs linked to the Sinaloa Cartel and local drug distributors. Their aim is not only to remove these people but also to obtain information on the large scale Sinaloa distributors that continue providing drugs to the region.

However, the source said, identifying the relationship between the local criminal cells and larger cartels is difficult due to the fragmented nature of the current underworld and the constantly shifting allegiences of local networks.

InSight Crime Analysis

The battle for La Paz reflects a new dynamic in the Mexican underworld, as fragmented remains of once all-powerful cartels confront or ally themselves with new players as they compete for control of local as well as transnational criminal markets.

The relatively new CJNG has been one of the most expansionist groups in Mexico in recent years, and it is little surprise that it has now moved into Bajo California Sur. It was once believed to be in alliance with the Sinaloa Cartel, but there are now growing signs the organization is looking to capitalize on what appears to be a fragmentation of the Sinaloa Cartel in the wake of the capture of the cartel’s most prominent leader, Joaquin “El Chapo” Guzman.

SEE ALSO: Jalisco Cartel – New Generation Profile

In contrast, the Tijuana Cartel has been in long term decline, and so an alliance with an up-and-coming group such as the CJNG represents the remaining cartel factions’ best chance of clinging on to some level of criminal power.

Los Dámaso, meanwhile, have long been operatives for the Sinaloa Cartel. However, there have been numerous reports suggesting the network has been in conflict with other Sinaloan factions.

As highlighted by Zeta’s source, these national actors are increasingly dependent on alliances with local criminal cells that have more autonomy and less loyalty to larger organizations than in the past. This makes for a much more complex and often chaotic dynamic in this latest generation of Mexico‘s cartel wars.

*** Improvised armored vehicle captured from the Zetas cartel.

Juan Cedillo : Improvised armored vehicle captured from the Zetas cartel.

Time Magazine has provided more information:

As Mexican gangsters shot it out with troops in the border city of Reynosa this month, residents posted warnings on social media of where not to drive. Not only was the gunfire itself a problem but cartel gunmen had covered some roads with perilous spikes that they call ponchallantas or “tire punchers.” The hazard can appear suddenly as the cartels have customized vans with tubes that eject the spikes. If a car drives into them too fast, it can spin into a lethal crash. Gangsters also set grounded vehicles on fire, creating more debris in the way of security forces.

The tire punchers used in the April 17 firefight, in which soldiers arrested an alleged kingpin called José Tiburcio Hernández, are the latest example of the homemade battle technology developed by Mexico’s cartels. Gangsters have also built fighting vehicles with four inch-thick armor, sometimes referred to as “monsters” or “narco tanks.” And in October, police in the western state of Jalisco even busted a clandestine factory where traffickers assembled their own assault rifles.

The development of this narco technology south of the Rio Grande has grabbed the attention of U.S. security thinkers such as Robert Bunker, an external researcher for the U.S. Army War College. He compares it to the homemade war tools used by insurgent forces round the world. “Each battle technology has been adapted to both the conflict environment and the ideological and illicit economic motivations of the irregular forces,” Bunker says. “Caltrops and spike traps have been a component of warfare going back to the ancient Greeks. In many ways, we can think of them as pre-modern landmines.”

While there is no declared war in Mexico, fighting between rival cartels and the security forces has claimed more than 83,000 lives since 2007, according to a count by Mexico’s federal intelligence agency. Gangsters use traditional weapons, including Kalashnikovs, which are often smuggled from the United Sates. The Bureau of Alcohol Tobacco and Firearms has traced 73,684 guns seized in Mexico to U.S. gun sellers since 2009. Cartels also have rocket-propelled grenades, which may be stolen from Central American military caches.

However, it is harder for them to buy actual military vehicles leading to them inventing their own. The Zetas cartel, which was led by former soldiers, first developed its own armored vehicles, both converting regular trucks and building others from scratch. Their “monsters” resemble machines from the fantasy road wars of Mad Max, with gun turrets, battering rams and walls of armor.

The Mexican army has taken many of these makeshift tanks off the road, holding more than 40 of them in its base in Reynosa. But some are still at large and causing havoc. Last year, a Zeta monster attacked a hotel in the border town of Ciudad Mier, where executives from the oil services multinational Weatherford were staying. (The executives were shaken but unscathed).

Furthermore, vigilante groups that formed to fight cartels also built their own armored vehicles. “We were going into heavy gunfire and we needed protection. So we made these monsters of our own, based on the vehicles that the Zetas had built,” said Francisco Espinosa, a cattle rancher turned vigilante. With the help of local metal workers, they also used thick layers of armor, and added some of their own features such as mobile sand trenches.

The gun factory busted in October belonged to rising gang called the Jalisco New Generation Cartel. The cartel has gained infamy for a series of attacks on Mexican officials, including an ambush on April 7 that killed 15 policemen. Hidden in two farm houses in the tequila-producing region, the factory used industrial metal cutters and blow torches to assemble AR15 rifles from components. “It’s highly sophisticated machinery with very precise software that allows them to make the cuts to finish the guns, which work perfectly,” Jalisco Attorney General Luis Carlos Najera said.

The factory likely uses gun parts that are sold on line, producing untraceable AR15’s, says Bunker, the security scholar. “I consider it conceptually sophisticated but not technologically sophisticated. The next step in this process will be the addition of a 3D metal printer. I’m sure this will come in time as more of these improvised arms factories spring up, metal printer technology matures, and prices for them drop.”

The cartels’ ability to make their own guns, customized vehicles and spike ejectors make them difficult for Mexico’s government to wipe out. Under President Enrique Pena Nieto, troops have arrested a string of cartel leaders, including the head of the Zetas and Sinaloan chief Joaquin “Chapo” Guzman. This has helped reduce the total number of homicides, which went down from a peak of more than 22,000 in 2011 to 15,649 last year, according to a police count. But incidents such as the chaos in Reynosa and ambushes in Jalisco continue to shake the nation.

Bunker warns that cartels may keep on developing their battle tech. They could use drones for surveillance in the near future, giving them a fighting edge. Mexican gangsters have also used small car bombs, and could potentially harness bigger improvised explosive devices like those in the Middle East. “One area that we should keep an eye on is car bomb and IED use potentials,” Bunker says. “I could envision IEDs being placed in a city or town under certain circumstances.”